Warning: Permanently added '10.128.0.183' (ECDSA) to the list of known hosts. 2022/11/30 04:28:06 fuzzer started 2022/11/30 04:28:06 dialing manager at 10.128.0.163:38561 [ 26.673186][ T23] audit: type=1400 audit(1669782489.068:74): avc: denied { mounton } for pid=1800 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.674010][ T1800] cgroup: Unknown subsys name 'net' [ 26.696077][ T23] audit: type=1400 audit(1669782489.068:75): avc: denied { mount } for pid=1800 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.723420][ T23] audit: type=1400 audit(1669782489.098:76): avc: denied { unmount } for pid=1800 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.859328][ T1800] cgroup: Unknown subsys name 'rlimit' 2022/11/30 04:28:09 syscalls: 2806 2022/11/30 04:28:09 code coverage: enabled 2022/11/30 04:28:09 comparison tracing: enabled 2022/11/30 04:28:09 extra coverage: enabled 2022/11/30 04:28:09 delay kcov mmap: enabled 2022/11/30 04:28:09 setuid sandbox: enabled 2022/11/30 04:28:09 namespace sandbox: enabled 2022/11/30 04:28:09 Android sandbox: enabled 2022/11/30 04:28:09 fault injection: enabled 2022/11/30 04:28:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/11/30 04:28:09 net packet injection: enabled 2022/11/30 04:28:09 net device setup: enabled 2022/11/30 04:28:09 concurrency sanitizer: enabled 2022/11/30 04:28:09 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/11/30 04:28:09 NIC VF setup: PCI device 0000:00:11.0 is not available 2022/11/30 04:28:09 USB emulation: /dev/raw-gadget does not exist 2022/11/30 04:28:09 hci packet injection: /dev/vhci does not exist 2022/11/30 04:28:09 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2022/11/30 04:28:09 802.15.4 emulation: enabled [ 26.949027][ T23] audit: type=1400 audit(1669782489.348:77): avc: denied { mounton } for pid=1800 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.973836][ T23] audit: type=1400 audit(1669782489.348:78): avc: denied { mount } for pid=1800 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.997134][ T23] audit: type=1400 audit(1669782489.348:79): avc: denied { create } for pid=1800 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.017635][ T23] audit: type=1400 audit(1669782489.348:80): avc: denied { write } for pid=1800 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.037984][ T23] audit: type=1400 audit(1669782489.348:81): avc: denied { read } for pid=1800 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/11/30 04:28:12 suppressing KCSAN reports in functions: '__writeback_single_inode' 'xas_clear_mark' 'io_wq_worker_running' 'generic_write_end' 'exit_mm' 'shmem_file_read_iter' 'jbd2_journal_stop' 'dont_mount' 'd_delete' 'ext4_fill_raw_inode' '__mark_inode_dirty' 'vfs_fsync_range' 'jbd2_journal_dirty_metadata' '__xa_set_mark' 'fsnotify_detach_mark' 'filemap_read' 'can_send' 'can_receive' 'ext4_free_inodes_count' 'filemap_fdatawrite_wbc' 'unix_poll' 'io_wqe_activate_free_worker' 'do_sys_poll' '__xa_clear_mark' 'blk_mq_sched_dispatch_requests' 2022/11/30 04:28:12 fetching corpus: 0, signal 0/2000 (executing program) 2022/11/30 04:28:12 fetching corpus: 47, signal 15410/19206 (executing program) 2022/11/30 04:28:12 fetching corpus: 97, signal 27458/32901 (executing program) 2022/11/30 04:28:12 fetching corpus: 147, signal 31640/38787 (executing program) 2022/11/30 04:28:12 fetching corpus: 197, signal 35908/44691 (executing program) 2022/11/30 04:28:12 fetching corpus: 247, signal 40145/50541 (executing program) 2022/11/30 04:28:12 fetching corpus: 297, signal 43836/55747 (executing program) 2022/11/30 04:28:12 fetching corpus: 347, signal 47301/60728 (executing program) 2022/11/30 04:28:12 fetching corpus: 397, signal 50063/64990 (executing program) 2022/11/30 04:28:12 fetching corpus: 447, signal 53755/70060 (executing program) 2022/11/30 04:28:12 fetching corpus: 497, signal 56239/73975 (executing program) 2022/11/30 04:28:12 fetching corpus: 547, signal 58466/77597 (executing program) 2022/11/30 04:28:12 fetching corpus: 597, signal 61170/81714 (executing program) 2022/11/30 04:28:12 fetching corpus: 647, signal 63468/85405 (executing program) 2022/11/30 04:28:13 fetching corpus: 697, signal 65230/88579 (executing program) 2022/11/30 04:28:13 fetching corpus: 747, signal 66850/91549 (executing program) 2022/11/30 04:28:13 fetching corpus: 797, signal 68477/94526 (executing program) 2022/11/30 04:28:13 fetching corpus: 847, signal 70187/97557 (executing program) 2022/11/30 04:28:13 fetching corpus: 897, signal 72616/101171 (executing program) 2022/11/30 04:28:13 fetching corpus: 947, signal 75787/105348 (executing program) 2022/11/30 04:28:13 fetching corpus: 997, signal 77030/107865 (executing program) 2022/11/30 04:28:13 fetching corpus: 1047, signal 78542/110640 (executing program) 2022/11/30 04:28:13 fetching corpus: 1097, signal 80219/113534 (executing program) 2022/11/30 04:28:13 fetching corpus: 1147, signal 82738/117068 (executing program) 2022/11/30 04:28:13 fetching corpus: 1197, signal 84729/120123 (executing program) 2022/11/30 04:28:13 fetching corpus: 1247, signal 86023/122575 (executing program) 2022/11/30 04:28:13 fetching corpus: 1297, signal 87466/125161 (executing program) 2022/11/30 04:28:13 fetching corpus: 1347, signal 89396/128065 (executing program) 2022/11/30 04:28:13 fetching corpus: 1397, signal 90785/130532 (executing program) 2022/11/30 04:28:13 fetching corpus: 1447, signal 92238/133075 (executing program) 2022/11/30 04:28:13 fetching corpus: 1497, signal 93371/135271 (executing program) 2022/11/30 04:28:13 fetching corpus: 1547, signal 94430/137429 (executing program) 2022/11/30 04:28:13 fetching corpus: 1597, signal 96201/140168 (executing program) 2022/11/30 04:28:13 fetching corpus: 1647, signal 97096/142213 (executing program) 2022/11/30 04:28:13 fetching corpus: 1697, signal 98215/144379 (executing program) 2022/11/30 04:28:13 fetching corpus: 1747, signal 99554/146665 (executing program) 2022/11/30 04:28:13 fetching corpus: 1797, signal 100697/148842 (executing program) 2022/11/30 04:28:14 fetching corpus: 1847, signal 102033/151128 (executing program) 2022/11/30 04:28:14 fetching corpus: 1897, signal 104171/153957 (executing program) 2022/11/30 04:28:14 fetching corpus: 1947, signal 104968/155819 (executing program) 2022/11/30 04:28:14 fetching corpus: 1997, signal 105861/157698 (executing program) 2022/11/30 04:28:14 fetching corpus: 2047, signal 107306/159978 (executing program) 2022/11/30 04:28:14 fetching corpus: 2097, signal 108839/162288 (executing program) 2022/11/30 04:28:14 fetching corpus: 2147, signal 110365/164637 (executing program) 2022/11/30 04:28:14 fetching corpus: 2197, signal 111570/166683 (executing program) 2022/11/30 04:28:14 fetching corpus: 2247, signal 112647/168579 (executing program) 2022/11/30 04:28:14 fetching corpus: 2297, signal 114047/170757 (executing program) 2022/11/30 04:28:14 fetching corpus: 2347, signal 114895/172553 (executing program) 2022/11/30 04:28:14 fetching corpus: 2397, signal 116200/174635 (executing program) 2022/11/30 04:28:14 fetching corpus: 2447, signal 116881/176235 (executing program) 2022/11/30 04:28:14 fetching corpus: 2497, signal 117691/177976 (executing program) 2022/11/30 04:28:14 fetching corpus: 2547, signal 118758/179856 (executing program) 2022/11/30 04:28:14 fetching corpus: 2597, signal 119691/181621 (executing program) 2022/11/30 04:28:14 fetching corpus: 2647, signal 120679/183397 (executing program) 2022/11/30 04:28:14 fetching corpus: 2697, signal 121645/185132 (executing program) 2022/11/30 04:28:14 fetching corpus: 2747, signal 122551/186854 (executing program) 2022/11/30 04:28:14 fetching corpus: 2797, signal 123335/188467 (executing program) 2022/11/30 04:28:14 fetching corpus: 2847, signal 124711/190412 (executing program) 2022/11/30 04:28:14 fetching corpus: 2897, signal 126368/192463 (executing program) 2022/11/30 04:28:14 fetching corpus: 2947, signal 126968/193922 (executing program) 2022/11/30 04:28:15 fetching corpus: 2997, signal 128553/195886 (executing program) 2022/11/30 04:28:15 fetching corpus: 3047, signal 129335/197392 (executing program) 2022/11/30 04:28:15 fetching corpus: 3097, signal 129916/198861 (executing program) 2022/11/30 04:28:15 fetching corpus: 3147, signal 130707/200397 (executing program) 2022/11/30 04:28:15 fetching corpus: 3197, signal 131426/201857 (executing program) 2022/11/30 04:28:15 fetching corpus: 3247, signal 132085/203318 (executing program) 2022/11/30 04:28:15 fetching corpus: 3297, signal 132693/204707 (executing program) 2022/11/30 04:28:15 fetching corpus: 3347, signal 133579/206257 (executing program) 2022/11/30 04:28:15 fetching corpus: 3397, signal 134287/207687 (executing program) 2022/11/30 04:28:15 fetching corpus: 3447, signal 135223/209217 (executing program) 2022/11/30 04:28:15 fetching corpus: 3497, signal 135941/210628 (executing program) 2022/11/30 04:28:15 fetching corpus: 3545, signal 136736/212055 (executing program) 2022/11/30 04:28:15 fetching corpus: 3595, signal 137344/213355 (executing program) 2022/11/30 04:28:15 fetching corpus: 3645, signal 137769/214561 (executing program) 2022/11/30 04:28:15 fetching corpus: 3695, signal 138436/215941 (executing program) 2022/11/30 04:28:15 fetching corpus: 3745, signal 139110/217308 (executing program) 2022/11/30 04:28:15 fetching corpus: 3795, signal 139708/218648 (executing program) 2022/11/30 04:28:15 fetching corpus: 3845, signal 140415/219968 (executing program) 2022/11/30 04:28:15 fetching corpus: 3895, signal 140982/221279 (executing program) 2022/11/30 04:28:15 fetching corpus: 3945, signal 141986/222729 (executing program) 2022/11/30 04:28:15 fetching corpus: 3995, signal 143054/224168 (executing program) 2022/11/30 04:28:15 fetching corpus: 4045, signal 143583/225417 (executing program) 2022/11/30 04:28:15 fetching corpus: 4095, signal 144276/226687 (executing program) 2022/11/30 04:28:15 fetching corpus: 4145, signal 145112/228018 (executing program) 2022/11/30 04:28:16 fetching corpus: 4195, signal 145662/229238 (executing program) 2022/11/30 04:28:16 fetching corpus: 4245, signal 146195/230472 (executing program) 2022/11/30 04:28:16 fetching corpus: 4295, signal 147162/231815 (executing program) 2022/11/30 04:28:16 fetching corpus: 4345, signal 147888/233107 (executing program) 2022/11/30 04:28:16 fetching corpus: 4395, signal 148455/234268 (executing program) 2022/11/30 04:28:16 fetching corpus: 4445, signal 149485/235638 (executing program) 2022/11/30 04:28:16 fetching corpus: 4495, signal 150157/236821 (executing program) 2022/11/30 04:28:16 fetching corpus: 4545, signal 150687/237914 (executing program) 2022/11/30 04:28:16 fetching corpus: 4595, signal 151593/239124 (executing program) 2022/11/30 04:28:16 fetching corpus: 4645, signal 152126/240207 (executing program) 2022/11/30 04:28:16 fetching corpus: 4695, signal 152949/241449 (executing program) 2022/11/30 04:28:16 fetching corpus: 4745, signal 153492/242553 (executing program) 2022/11/30 04:28:16 fetching corpus: 4795, signal 154011/243600 (executing program) 2022/11/30 04:28:16 fetching corpus: 4845, signal 154605/244703 (executing program) 2022/11/30 04:28:16 fetching corpus: 4895, signal 155259/245826 (executing program) 2022/11/30 04:28:16 fetching corpus: 4945, signal 155805/246918 (executing program) 2022/11/30 04:28:16 fetching corpus: 4995, signal 156299/247945 (executing program) 2022/11/30 04:28:16 fetching corpus: 5045, signal 156783/248971 (executing program) 2022/11/30 04:28:16 fetching corpus: 5095, signal 157276/250028 (executing program) 2022/11/30 04:28:16 fetching corpus: 5145, signal 158199/251175 (executing program) 2022/11/30 04:28:16 fetching corpus: 5195, signal 159222/252346 (executing program) 2022/11/30 04:28:16 fetching corpus: 5245, signal 159779/253365 (executing program) 2022/11/30 04:28:16 fetching corpus: 5295, signal 160283/254359 (executing program) 2022/11/30 04:28:16 fetching corpus: 5345, signal 160944/255379 (executing program) 2022/11/30 04:28:17 fetching corpus: 5395, signal 161331/256343 (executing program) 2022/11/30 04:28:17 fetching corpus: 5445, signal 161892/257307 (executing program) 2022/11/30 04:28:17 fetching corpus: 5495, signal 162332/258294 (executing program) 2022/11/30 04:28:17 fetching corpus: 5545, signal 163147/259322 (executing program) 2022/11/30 04:28:17 fetching corpus: 5595, signal 163550/260289 (executing program) 2022/11/30 04:28:17 fetching corpus: 5645, signal 163908/261231 (executing program) 2022/11/30 04:28:17 fetching corpus: 5695, signal 164366/262132 (executing program) 2022/11/30 04:28:17 fetching corpus: 5745, signal 164914/263089 (executing program) 2022/11/30 04:28:17 fetching corpus: 5795, signal 165937/264130 (executing program) 2022/11/30 04:28:17 fetching corpus: 5844, signal 166354/265071 (executing program) 2022/11/30 04:28:17 fetching corpus: 5894, signal 167349/266075 (executing program) 2022/11/30 04:28:17 fetching corpus: 5944, signal 168049/267018 (executing program) 2022/11/30 04:28:17 fetching corpus: 5994, signal 168849/267988 (executing program) 2022/11/30 04:28:17 fetching corpus: 6044, signal 169417/268905 (executing program) 2022/11/30 04:28:17 fetching corpus: 6094, signal 170289/269822 (executing program) 2022/11/30 04:28:17 fetching corpus: 6144, signal 171003/270724 (executing program) 2022/11/30 04:28:17 fetching corpus: 6194, signal 171561/271623 (executing program) 2022/11/30 04:28:17 fetching corpus: 6244, signal 172011/272478 (executing program) 2022/11/30 04:28:17 fetching corpus: 6294, signal 172466/273338 (executing program) 2022/11/30 04:28:17 fetching corpus: 6344, signal 173045/274173 (executing program) 2022/11/30 04:28:17 fetching corpus: 6394, signal 173511/275027 (executing program) 2022/11/30 04:28:18 fetching corpus: 6444, signal 174030/275852 (executing program) 2022/11/30 04:28:18 fetching corpus: 6494, signal 174534/276698 (executing program) 2022/11/30 04:28:18 fetching corpus: 6544, signal 175022/277528 (executing program) 2022/11/30 04:28:18 fetching corpus: 6594, signal 175472/278367 (executing program) 2022/11/30 04:28:18 fetching corpus: 6644, signal 175925/279132 (executing program) 2022/11/30 04:28:18 fetching corpus: 6694, signal 176340/279921 (executing program) 2022/11/30 04:28:18 fetching corpus: 6744, signal 176969/280679 (executing program) 2022/11/30 04:28:18 fetching corpus: 6794, signal 177431/281460 (executing program) 2022/11/30 04:28:18 fetching corpus: 6844, signal 177988/282228 (executing program) 2022/11/30 04:28:18 fetching corpus: 6894, signal 178510/283030 (executing program) 2022/11/30 04:28:18 fetching corpus: 6944, signal 179290/283795 (executing program) 2022/11/30 04:28:18 fetching corpus: 6994, signal 179900/284558 (executing program) 2022/11/30 04:28:18 fetching corpus: 7044, signal 180345/285273 (executing program) 2022/11/30 04:28:18 fetching corpus: 7094, signal 181032/285922 (executing program) 2022/11/30 04:28:18 fetching corpus: 7142, signal 181441/285922 (executing program) 2022/11/30 04:28:18 fetching corpus: 7192, signal 181807/285922 (executing program) 2022/11/30 04:28:18 fetching corpus: 7242, signal 182409/285925 (executing program) 2022/11/30 04:28:18 fetching corpus: 7292, signal 182843/285925 (executing program) 2022/11/30 04:28:18 fetching corpus: 7342, signal 183154/285925 (executing program) 2022/11/30 04:28:18 fetching corpus: 7392, signal 183516/285925 (executing program) 2022/11/30 04:28:18 fetching corpus: 7442, signal 183867/285927 (executing program) 2022/11/30 04:28:18 fetching corpus: 7492, signal 184340/285928 (executing program) 2022/11/30 04:28:18 fetching corpus: 7542, signal 184754/285928 (executing program) 2022/11/30 04:28:18 fetching corpus: 7592, signal 185270/285928 (executing program) 2022/11/30 04:28:19 fetching corpus: 7642, signal 185930/285928 (executing program) 2022/11/30 04:28:19 fetching corpus: 7692, signal 186277/285928 (executing program) 2022/11/30 04:28:19 fetching corpus: 7742, signal 187357/285928 (executing program) 2022/11/30 04:28:19 fetching corpus: 7790, signal 187817/285928 (executing program) 2022/11/30 04:28:19 fetching corpus: 7840, signal 188166/285930 (executing program) 2022/11/30 04:28:19 fetching corpus: 7890, signal 188422/285930 (executing program) 2022/11/30 04:28:19 fetching corpus: 7940, signal 188747/285930 (executing program) 2022/11/30 04:28:19 fetching corpus: 7990, signal 189247/285944 (executing program) 2022/11/30 04:28:19 fetching corpus: 8040, signal 189567/285944 (executing program) 2022/11/30 04:28:19 fetching corpus: 8090, signal 190019/285944 (executing program) 2022/11/30 04:28:19 fetching corpus: 8140, signal 190346/285944 (executing program) 2022/11/30 04:28:19 fetching corpus: 8190, signal 190833/285944 (executing program) 2022/11/30 04:28:19 fetching corpus: 8240, signal 191272/285946 (executing program) 2022/11/30 04:28:19 fetching corpus: 8290, signal 191640/285950 (executing program) 2022/11/30 04:28:19 fetching corpus: 8340, signal 192045/285960 (executing program) 2022/11/30 04:28:19 fetching corpus: 8390, signal 192468/285960 (executing program) 2022/11/30 04:28:19 fetching corpus: 8440, signal 192789/285960 (executing program) 2022/11/30 04:28:19 fetching corpus: 8490, signal 193416/285960 (executing program) 2022/11/30 04:28:19 fetching corpus: 8540, signal 193972/285960 (executing program) 2022/11/30 04:28:19 fetching corpus: 8590, signal 194307/285960 (executing program) 2022/11/30 04:28:19 fetching corpus: 8640, signal 194603/285963 (executing program) 2022/11/30 04:28:19 fetching corpus: 8690, signal 194911/285963 (executing program) 2022/11/30 04:28:19 fetching corpus: 8740, signal 195279/285963 (executing program) 2022/11/30 04:28:19 fetching corpus: 8790, signal 195567/285964 (executing program) 2022/11/30 04:28:19 fetching corpus: 8840, signal 195958/285965 (executing program) 2022/11/30 04:28:19 fetching corpus: 8890, signal 196405/285965 (executing program) 2022/11/30 04:28:20 fetching corpus: 8939, signal 196874/285965 (executing program) 2022/11/30 04:28:20 fetching corpus: 8988, signal 197300/285965 (executing program) 2022/11/30 04:28:20 fetching corpus: 9036, signal 197721/285972 (executing program) 2022/11/30 04:28:20 fetching corpus: 9086, signal 197924/285978 (executing program) 2022/11/30 04:28:20 fetching corpus: 9136, signal 198155/285978 (executing program) 2022/11/30 04:28:20 fetching corpus: 9185, signal 198477/285978 (executing program) 2022/11/30 04:28:20 fetching corpus: 9235, signal 198907/285978 (executing program) 2022/11/30 04:28:20 fetching corpus: 9285, signal 199229/285978 (executing program) 2022/11/30 04:28:20 fetching corpus: 9335, signal 199725/285978 (executing program) 2022/11/30 04:28:20 fetching corpus: 9385, signal 200065/285979 (executing program) 2022/11/30 04:28:20 fetching corpus: 9435, signal 200312/285979 (executing program) 2022/11/30 04:28:20 fetching corpus: 9485, signal 200639/285979 (executing program) 2022/11/30 04:28:20 fetching corpus: 9535, signal 200949/285979 (executing program) 2022/11/30 04:28:20 fetching corpus: 9585, signal 201280/285979 (executing program) 2022/11/30 04:28:20 fetching corpus: 9635, signal 201604/285982 (executing program) 2022/11/30 04:28:20 fetching corpus: 9683, signal 201897/285986 (executing program) 2022/11/30 04:28:20 fetching corpus: 9733, signal 202299/285988 (executing program) 2022/11/30 04:28:20 fetching corpus: 9783, signal 202550/285988 (executing program) 2022/11/30 04:28:20 fetching corpus: 9833, signal 202918/286004 (executing program) 2022/11/30 04:28:20 fetching corpus: 9883, signal 203228/286004 (executing program) 2022/11/30 04:28:20 fetching corpus: 9933, signal 203578/286010 (executing program) 2022/11/30 04:28:20 fetching corpus: 9983, signal 203853/286010 (executing program) 2022/11/30 04:28:20 fetching corpus: 10033, signal 204130/286010 (executing program) 2022/11/30 04:28:20 fetching corpus: 10083, signal 204429/286010 (executing program) 2022/11/30 04:28:20 fetching corpus: 10133, signal 204914/286010 (executing program) 2022/11/30 04:28:21 fetching corpus: 10183, signal 205311/286010 (executing program) 2022/11/30 04:28:21 fetching corpus: 10233, signal 206139/286018 (executing program) 2022/11/30 04:28:21 fetching corpus: 10283, signal 206511/286018 (executing program) 2022/11/30 04:28:21 fetching corpus: 10333, signal 206899/286018 (executing program) 2022/11/30 04:28:21 fetching corpus: 10383, signal 207324/286018 (executing program) 2022/11/30 04:28:21 fetching corpus: 10433, signal 207571/286018 (executing program) 2022/11/30 04:28:21 fetching corpus: 10483, signal 207856/286018 (executing program) 2022/11/30 04:28:21 fetching corpus: 10533, signal 208368/286018 (executing program) 2022/11/30 04:28:21 fetching corpus: 10583, signal 208732/286018 (executing program) 2022/11/30 04:28:21 fetching corpus: 10633, signal 209036/286020 (executing program) 2022/11/30 04:28:21 fetching corpus: 10683, signal 209309/286020 (executing program) 2022/11/30 04:28:21 fetching corpus: 10733, signal 209560/286020 (executing program) 2022/11/30 04:28:21 fetching corpus: 10783, signal 209832/286020 (executing program) 2022/11/30 04:28:21 fetching corpus: 10833, signal 210112/286020 (executing program) 2022/11/30 04:28:21 fetching corpus: 10883, signal 210466/286020 (executing program) 2022/11/30 04:28:21 fetching corpus: 10933, signal 210818/286020 (executing program) 2022/11/30 04:28:21 fetching corpus: 10983, signal 211167/286020 (executing program) 2022/11/30 04:28:21 fetching corpus: 11033, signal 211452/286027 (executing program) 2022/11/30 04:28:21 fetching corpus: 11083, signal 211689/286029 (executing program) 2022/11/30 04:28:21 fetching corpus: 11133, signal 211958/286029 (executing program) 2022/11/30 04:28:21 fetching corpus: 11183, signal 212275/286039 (executing program) 2022/11/30 04:28:21 fetching corpus: 11233, signal 212554/286039 (executing program) 2022/11/30 04:28:21 fetching corpus: 11283, signal 212775/286039 (executing program) 2022/11/30 04:28:21 fetching corpus: 11333, signal 213167/286039 (executing program) 2022/11/30 04:28:21 fetching corpus: 11383, signal 213479/286039 (executing program) 2022/11/30 04:28:22 fetching corpus: 11433, signal 213836/286039 (executing program) 2022/11/30 04:28:22 fetching corpus: 11483, signal 214065/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11533, signal 214433/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11583, signal 214817/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11633, signal 215138/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11683, signal 215569/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11733, signal 216359/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11783, signal 216571/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11833, signal 216871/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11883, signal 217165/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11933, signal 217670/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 11983, signal 217999/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 12033, signal 218233/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 12082, signal 218465/286040 (executing program) 2022/11/30 04:28:22 fetching corpus: 12131, signal 218719/286045 (executing program) 2022/11/30 04:28:22 fetching corpus: 12181, signal 219041/286047 (executing program) 2022/11/30 04:28:22 fetching corpus: 12230, signal 219249/286050 (executing program) 2022/11/30 04:28:22 fetching corpus: 12280, signal 219556/286059 (executing program) 2022/11/30 04:28:22 fetching corpus: 12330, signal 219872/286059 (executing program) 2022/11/30 04:28:22 fetching corpus: 12379, signal 220103/286059 (executing program) 2022/11/30 04:28:22 fetching corpus: 12429, signal 220371/286059 (executing program) 2022/11/30 04:28:22 fetching corpus: 12479, signal 220693/286059 (executing program) 2022/11/30 04:28:22 fetching corpus: 12529, signal 221098/286059 (executing program) 2022/11/30 04:28:22 fetching corpus: 12579, signal 221394/286059 (executing program) 2022/11/30 04:28:22 fetching corpus: 12629, signal 221638/286059 (executing program) 2022/11/30 04:28:23 fetching corpus: 12679, signal 221940/286059 (executing program) 2022/11/30 04:28:23 fetching corpus: 12729, signal 222240/286059 (executing program) 2022/11/30 04:28:23 fetching corpus: 12779, signal 222467/286059 (executing program) 2022/11/30 04:28:23 fetching corpus: 12829, signal 222929/286059 (executing program) 2022/11/30 04:28:23 fetching corpus: 12879, signal 223229/286059 (executing program) 2022/11/30 04:28:23 fetching corpus: 12929, signal 223560/286059 (executing program) 2022/11/30 04:28:23 fetching corpus: 12979, signal 223930/286059 (executing program) 2022/11/30 04:28:23 fetching corpus: 13029, signal 224152/286069 (executing program) 2022/11/30 04:28:23 fetching corpus: 13079, signal 224393/286069 (executing program) 2022/11/30 04:28:23 fetching corpus: 13129, signal 224729/286071 (executing program) 2022/11/30 04:28:23 fetching corpus: 13179, signal 225056/286076 (executing program) 2022/11/30 04:28:23 fetching corpus: 13229, signal 225273/286076 (executing program) 2022/11/30 04:28:23 fetching corpus: 13279, signal 225756/286076 (executing program) 2022/11/30 04:28:23 fetching corpus: 13329, signal 226554/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13379, signal 226733/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13429, signal 226921/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13479, signal 227204/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13529, signal 227709/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13579, signal 228064/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13629, signal 228441/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13679, signal 228773/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13729, signal 228956/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13779, signal 229253/286079 (executing program) 2022/11/30 04:28:23 fetching corpus: 13829, signal 229480/286079 (executing program) 2022/11/30 04:28:24 fetching corpus: 13879, signal 229790/286079 (executing program) 2022/11/30 04:28:24 fetching corpus: 13929, signal 230231/286079 (executing program) 2022/11/30 04:28:24 fetching corpus: 13979, signal 230511/286080 (executing program) 2022/11/30 04:28:24 fetching corpus: 14029, signal 230805/286080 (executing program) 2022/11/30 04:28:24 fetching corpus: 14079, signal 231114/286080 (executing program) 2022/11/30 04:28:24 fetching corpus: 14129, signal 231384/286080 (executing program) 2022/11/30 04:28:24 fetching corpus: 14179, signal 231619/286080 (executing program) 2022/11/30 04:28:24 fetching corpus: 14229, signal 231936/286080 (executing program) 2022/11/30 04:28:24 fetching corpus: 14279, signal 232184/286088 (executing program) 2022/11/30 04:28:24 fetching corpus: 14329, signal 232440/286088 (executing program) 2022/11/30 04:28:24 fetching corpus: 14379, signal 232674/286088 (executing program) 2022/11/30 04:28:24 fetching corpus: 14429, signal 232908/286088 (executing program) 2022/11/30 04:28:24 fetching corpus: 14479, signal 233114/286088 (executing program) 2022/11/30 04:28:24 fetching corpus: 14529, signal 233338/286088 (executing program) 2022/11/30 04:28:24 fetching corpus: 14579, signal 233604/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 14629, signal 233892/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 14679, signal 234155/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 14729, signal 234391/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 14779, signal 234621/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 14829, signal 234838/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 14879, signal 235176/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 14929, signal 235374/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 14979, signal 235674/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 15029, signal 235879/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 15079, signal 236054/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 15129, signal 236277/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 15179, signal 236571/286102 (executing program) 2022/11/30 04:28:24 fetching corpus: 15229, signal 236865/286102 (executing program) 2022/11/30 04:28:25 fetching corpus: 15279, signal 237092/286102 (executing program) 2022/11/30 04:28:25 fetching corpus: 15329, signal 237386/286102 (executing program) 2022/11/30 04:28:25 fetching corpus: 15379, signal 237590/286102 (executing program) 2022/11/30 04:28:25 fetching corpus: 15428, signal 237844/286105 (executing program) 2022/11/30 04:28:25 fetching corpus: 15478, signal 238041/286115 (executing program) 2022/11/30 04:28:25 fetching corpus: 15528, signal 238296/286130 (executing program) 2022/11/30 04:28:25 fetching corpus: 15578, signal 238603/286130 (executing program) 2022/11/30 04:28:25 fetching corpus: 15628, signal 238798/286132 (executing program) 2022/11/30 04:28:25 fetching corpus: 15678, signal 239099/286132 (executing program) 2022/11/30 04:28:25 fetching corpus: 15728, signal 239378/286132 (executing program) 2022/11/30 04:28:25 fetching corpus: 15778, signal 239692/286132 (executing program) 2022/11/30 04:28:25 fetching corpus: 15828, signal 240121/286132 (executing program) 2022/11/30 04:28:25 fetching corpus: 15878, signal 240369/286132 (executing program) 2022/11/30 04:28:25 fetching corpus: 15928, signal 240789/286132 (executing program) 2022/11/30 04:28:25 fetching corpus: 15978, signal 241032/286139 (executing program) 2022/11/30 04:28:25 fetching corpus: 16028, signal 241302/286143 (executing program) 2022/11/30 04:28:25 fetching corpus: 16078, signal 241563/286143 (executing program) 2022/11/30 04:28:25 fetching corpus: 16127, signal 241969/286143 (executing program) 2022/11/30 04:28:25 fetching corpus: 16177, signal 242370/286143 (executing program) 2022/11/30 04:28:25 fetching corpus: 16227, signal 242588/286145 (executing program) 2022/11/30 04:28:25 fetching corpus: 16277, signal 242858/286154 (executing program) 2022/11/30 04:28:25 fetching corpus: 16327, signal 243362/286154 (executing program) 2022/11/30 04:28:25 fetching corpus: 16377, signal 243626/286154 (executing program) 2022/11/30 04:28:25 fetching corpus: 16427, signal 243785/286154 (executing program) 2022/11/30 04:28:25 fetching corpus: 16477, signal 244028/286154 (executing program) 2022/11/30 04:28:25 fetching corpus: 16527, signal 244252/286154 (executing program) 2022/11/30 04:28:26 fetching corpus: 16577, signal 244425/286154 (executing program) 2022/11/30 04:28:26 fetching corpus: 16627, signal 244653/286154 (executing program) 2022/11/30 04:28:26 fetching corpus: 16677, signal 244841/286154 (executing program) 2022/11/30 04:28:26 fetching corpus: 16727, signal 245037/286155 (executing program) 2022/11/30 04:28:26 fetching corpus: 16777, signal 245343/286155 (executing program) 2022/11/30 04:28:26 fetching corpus: 16827, signal 245816/286155 (executing program) 2022/11/30 04:28:26 fetching corpus: 16877, signal 246123/286161 (executing program) 2022/11/30 04:28:26 fetching corpus: 16927, signal 246359/286178 (executing program) 2022/11/30 04:28:26 fetching corpus: 16977, signal 246565/286189 (executing program) 2022/11/30 04:28:26 fetching corpus: 17027, signal 246913/286189 (executing program) 2022/11/30 04:28:26 fetching corpus: 17077, signal 247114/286189 (executing program) 2022/11/30 04:28:26 fetching corpus: 17127, signal 247342/286189 (executing program) 2022/11/30 04:28:26 fetching corpus: 17177, signal 247715/286189 (executing program) 2022/11/30 04:28:26 fetching corpus: 17227, signal 247952/286189 (executing program) 2022/11/30 04:28:26 fetching corpus: 17277, signal 248236/286189 (executing program) 2022/11/30 04:28:26 fetching corpus: 17327, signal 248453/286189 (executing program) 2022/11/30 04:28:26 fetching corpus: 17377, signal 248683/286190 (executing program) 2022/11/30 04:28:26 fetching corpus: 17427, signal 249015/286190 (executing program) 2022/11/30 04:28:26 fetching corpus: 17476, signal 249230/286190 (executing program) 2022/11/30 04:28:26 fetching corpus: 17526, signal 249509/286190 (executing program) 2022/11/30 04:28:26 fetching corpus: 17576, signal 249867/286196 (executing program) 2022/11/30 04:28:26 fetching corpus: 17626, signal 250093/286196 (executing program) 2022/11/30 04:28:26 fetching corpus: 17676, signal 250378/286196 (executing program) 2022/11/30 04:28:26 fetching corpus: 17726, signal 250585/286196 (executing program) 2022/11/30 04:28:26 fetching corpus: 17776, signal 250899/286196 (executing program) 2022/11/30 04:28:26 fetching corpus: 17826, signal 251064/286196 (executing program) 2022/11/30 04:28:27 fetching corpus: 17876, signal 251273/286196 (executing program) 2022/11/30 04:28:27 fetching corpus: 17926, signal 251661/286201 (executing program) 2022/11/30 04:28:27 fetching corpus: 17976, signal 251871/286201 (executing program) 2022/11/30 04:28:27 fetching corpus: 18026, signal 252044/286201 (executing program) 2022/11/30 04:28:27 fetching corpus: 18076, signal 252272/286201 (executing program) 2022/11/30 04:28:27 fetching corpus: 18126, signal 252499/286201 (executing program) 2022/11/30 04:28:27 fetching corpus: 18176, signal 252751/286201 (executing program) 2022/11/30 04:28:27 fetching corpus: 18226, signal 253019/286201 (executing program) 2022/11/30 04:28:27 fetching corpus: 18276, signal 253246/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18326, signal 253500/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18376, signal 253760/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18426, signal 253987/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18476, signal 254204/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18526, signal 254461/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18576, signal 254681/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18626, signal 254948/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18676, signal 255130/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18726, signal 255287/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18776, signal 255484/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18826, signal 255660/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18876, signal 255831/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18926, signal 256096/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 18976, signal 256292/286204 (executing program) 2022/11/30 04:28:27 fetching corpus: 19026, signal 256720/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19076, signal 256897/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19126, signal 257096/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19176, signal 257348/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19226, signal 257579/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19276, signal 257754/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19326, signal 257943/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19376, signal 258129/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19426, signal 258305/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19476, signal 258605/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19526, signal 258808/286210 (executing program) 2022/11/30 04:28:28 fetching corpus: 19576, signal 259142/286212 (executing program) 2022/11/30 04:28:28 fetching corpus: 19626, signal 259406/286214 (executing program) 2022/11/30 04:28:28 fetching corpus: 19676, signal 259623/286214 (executing program) 2022/11/30 04:28:28 fetching corpus: 19726, signal 260039/286214 (executing program) 2022/11/30 04:28:28 fetching corpus: 19776, signal 260271/286214 (executing program) 2022/11/30 04:28:28 fetching corpus: 19826, signal 260470/286214 (executing program) 2022/11/30 04:28:28 fetching corpus: 19876, signal 260658/286220 (executing program) 2022/11/30 04:28:28 fetching corpus: 19926, signal 260921/286220 (executing program) 2022/11/30 04:28:28 fetching corpus: 19976, signal 261116/286220 (executing program) 2022/11/30 04:28:28 fetching corpus: 20026, signal 261367/286220 (executing program) 2022/11/30 04:28:28 fetching corpus: 20076, signal 261600/286220 (executing program) 2022/11/30 04:28:28 fetching corpus: 20126, signal 261832/286235 (executing program) 2022/11/30 04:28:28 fetching corpus: 20176, signal 262009/286235 (executing program) 2022/11/30 04:28:28 fetching corpus: 20226, signal 262193/286241 (executing program) 2022/11/30 04:28:28 fetching corpus: 20276, signal 262410/286241 (executing program) 2022/11/30 04:28:29 fetching corpus: 20326, signal 262892/286241 (executing program) 2022/11/30 04:28:29 fetching corpus: 20376, signal 263068/286241 (executing program) 2022/11/30 04:28:29 fetching corpus: 20426, signal 263278/286241 (executing program) 2022/11/30 04:28:29 fetching corpus: 20476, signal 263505/286241 (executing program) 2022/11/30 04:28:29 fetching corpus: 20526, signal 263719/286241 (executing program) 2022/11/30 04:28:29 fetching corpus: 20576, signal 263893/286241 (executing program) 2022/11/30 04:28:29 fetching corpus: 20626, signal 264082/286253 (executing program) 2022/11/30 04:28:29 fetching corpus: 20676, signal 264237/286253 (executing program) 2022/11/30 04:28:29 fetching corpus: 20726, signal 264559/286253 (executing program) 2022/11/30 04:28:29 fetching corpus: 20776, signal 264781/286256 (executing program) 2022/11/30 04:28:29 fetching corpus: 20826, signal 264984/286256 (executing program) 2022/11/30 04:28:29 fetching corpus: 20876, signal 265162/286256 (executing program) 2022/11/30 04:28:29 fetching corpus: 20926, signal 265475/286256 (executing program) 2022/11/30 04:28:29 fetching corpus: 20976, signal 265721/286256 (executing program) 2022/11/30 04:28:29 fetching corpus: 21026, signal 265944/286258 (executing program) 2022/11/30 04:28:29 fetching corpus: 21076, signal 266153/286258 (executing program) 2022/11/30 04:28:29 fetching corpus: 21126, signal 266363/286258 (executing program) 2022/11/30 04:28:29 fetching corpus: 21176, signal 266588/286258 (executing program) 2022/11/30 04:28:29 fetching corpus: 21226, signal 266993/286258 (executing program) 2022/11/30 04:28:29 fetching corpus: 21276, signal 267187/286258 (executing program) 2022/11/30 04:28:29 fetching corpus: 21326, signal 267367/286258 (executing program) 2022/11/30 04:28:29 fetching corpus: 21376, signal 267535/286258 (executing program) 2022/11/30 04:28:29 fetching corpus: 21424, signal 267775/286271 (executing program) 2022/11/30 04:28:29 fetching corpus: 21474, signal 267957/286271 (executing program) 2022/11/30 04:28:29 fetching corpus: 21523, signal 268203/286273 (executing program) 2022/11/30 04:28:29 fetching corpus: 21573, signal 268442/286275 (executing program) 2022/11/30 04:28:29 fetching corpus: 21623, signal 268625/286281 (executing program) 2022/11/30 04:28:30 fetching corpus: 21673, signal 268779/286281 (executing program) 2022/11/30 04:28:30 fetching corpus: 21723, signal 268955/286281 (executing program) 2022/11/30 04:28:30 fetching corpus: 21773, signal 269116/286286 (executing program) 2022/11/30 04:28:30 fetching corpus: 21823, signal 269358/286286 (executing program) 2022/11/30 04:28:30 fetching corpus: 21872, signal 269518/286286 (executing program) 2022/11/30 04:28:30 fetching corpus: 21922, signal 269742/286286 (executing program) 2022/11/30 04:28:30 fetching corpus: 21972, signal 269968/286286 (executing program) 2022/11/30 04:28:30 fetching corpus: 22022, signal 270150/286286 (executing program) 2022/11/30 04:28:30 fetching corpus: 22072, signal 270410/286286 (executing program) 2022/11/30 04:28:30 fetching corpus: 22122, signal 270616/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22172, signal 270916/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22222, signal 271142/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22272, signal 271350/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22322, signal 271482/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22372, signal 271656/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22422, signal 271875/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22472, signal 272160/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22522, signal 272345/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22572, signal 272502/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22622, signal 272708/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22672, signal 272896/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22722, signal 273080/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22772, signal 273279/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22822, signal 273471/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22872, signal 273629/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22922, signal 273804/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 22972, signal 274274/286296 (executing program) 2022/11/30 04:28:30 fetching corpus: 23021, signal 274474/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23071, signal 274677/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23121, signal 274845/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23170, signal 275159/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23220, signal 275321/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23270, signal 275597/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23320, signal 275745/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23370, signal 275955/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23420, signal 276130/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23470, signal 276272/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23519, signal 276514/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23569, signal 276635/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23619, signal 276826/286296 (executing program) 2022/11/30 04:28:31 fetching corpus: 23669, signal 276969/286297 (executing program) 2022/11/30 04:28:31 fetching corpus: 23719, signal 277140/286297 (executing program) 2022/11/30 04:28:31 fetching corpus: 23769, signal 277332/286297 (executing program) 2022/11/30 04:28:31 fetching corpus: 23819, signal 277552/286297 (executing program) 2022/11/30 04:28:31 fetching corpus: 23869, signal 277773/286297 (executing program) 2022/11/30 04:28:31 fetching corpus: 23919, signal 277980/286297 (executing program) 2022/11/30 04:28:31 fetching corpus: 23969, signal 278185/286297 (executing program) 2022/11/30 04:28:31 fetching corpus: 24019, signal 278399/286300 (executing program) 2022/11/30 04:28:31 fetching corpus: 24069, signal 278529/286300 (executing program) 2022/11/30 04:28:31 fetching corpus: 24119, signal 278750/286300 (executing program) 2022/11/30 04:28:31 fetching corpus: 24169, signal 279021/286300 (executing program) 2022/11/30 04:28:31 fetching corpus: 24219, signal 279162/286300 (executing program) 2022/11/30 04:28:31 fetching corpus: 24269, signal 279352/286300 (executing program) 2022/11/30 04:28:32 fetching corpus: 24319, signal 279515/286300 (executing program) 2022/11/30 04:28:32 fetching corpus: 24369, signal 279662/286300 (executing program) 2022/11/30 04:28:32 fetching corpus: 24419, signal 279849/286300 (executing program) 2022/11/30 04:28:32 fetching corpus: 24469, signal 280091/286301 (executing program) 2022/11/30 04:28:32 fetching corpus: 24519, signal 280445/286301 (executing program) 2022/11/30 04:28:32 fetching corpus: 24569, signal 280592/286301 (executing program) 2022/11/30 04:28:32 fetching corpus: 24619, signal 280832/286311 (executing program) 2022/11/30 04:28:32 fetching corpus: 24668, signal 281038/286312 (executing program) 2022/11/30 04:28:32 fetching corpus: 24718, signal 281191/286312 (executing program) 2022/11/30 04:28:32 fetching corpus: 24768, signal 281377/286312 (executing program) 2022/11/30 04:28:32 fetching corpus: 24818, signal 281745/286365 (executing program) 2022/11/30 04:28:32 fetching corpus: 24868, signal 282009/286365 (executing program) 2022/11/30 04:28:32 fetching corpus: 24918, signal 282238/286365 (executing program) 2022/11/30 04:28:32 fetching corpus: 24928, signal 282272/286365 (executing program) 2022/11/30 04:28:32 fetching corpus: 24928, signal 282272/286365 (executing program) 2022/11/30 04:28:34 starting 6 fuzzer processes 04:28:34 executing program 0: prlimit64(0x0, 0x8, &(0x7f0000000140), 0x0) r0 = memfd_secret(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 04:28:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xb8}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0xe8, &(0x7f0000000100)=""/232, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:28:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000009100)=[{{&(0x7f0000001180)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x0) 04:28:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}, @TCA_POLICE_RESULT={0x8, 0x5, 0x3}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 04:28:34 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) r6 = openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000400), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='task_newtask\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0x12) 04:28:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000004fc0)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x403}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3}, 0x14) sendmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="419be1b77804c5225e241b42559e48f1ef581f41", 0x14}], 0x1}}], 0x1, 0x0) [ 51.941658][ T23] audit: type=1400 audit(1669782514.338:82): avc: denied { execmem } for pid=1808 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 52.055401][ T23] audit: type=1400 audit(1669782514.448:83): avc: denied { read } for pid=1816 comm="syz-executor.1" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.088469][ T23] audit: type=1400 audit(1669782514.458:84): avc: denied { open } for pid=1815 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.111903][ T23] audit: type=1400 audit(1669782514.458:85): avc: denied { mounton } for pid=1815 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 52.133482][ T23] audit: type=1400 audit(1669782514.458:86): avc: denied { module_request } for pid=1815 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 52.155324][ T23] audit: type=1400 audit(1669782514.478:87): avc: denied { sys_module } for pid=1818 comm="syz-executor.4" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 52.440353][ T1818] chnl_net:caif_netlink_parms(): no params data found [ 52.495429][ T1815] chnl_net:caif_netlink_parms(): no params data found [ 52.516053][ T1816] chnl_net:caif_netlink_parms(): no params data found [ 52.585187][ T1818] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.592416][ T1818] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.599938][ T1818] device bridge_slave_0 entered promiscuous mode [ 52.620473][ T1843] chnl_net:caif_netlink_parms(): no params data found [ 52.639056][ T1818] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.646152][ T1818] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.653861][ T1818] device bridge_slave_1 entered promiscuous mode [ 52.694694][ T1831] chnl_net:caif_netlink_parms(): no params data found [ 52.732034][ T1818] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.741224][ T1816] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.748264][ T1816] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.755667][ T1816] device bridge_slave_0 entered promiscuous mode [ 52.762479][ T1815] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.769509][ T1815] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.777035][ T1815] device bridge_slave_0 entered promiscuous mode [ 52.783857][ T1841] chnl_net:caif_netlink_parms(): no params data found [ 52.799373][ T1818] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.812787][ T1816] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.819845][ T1816] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.827476][ T1816] device bridge_slave_1 entered promiscuous mode [ 52.834194][ T1815] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.841239][ T1815] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.848842][ T1815] device bridge_slave_1 entered promiscuous mode [ 52.867765][ T1843] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.874887][ T1843] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.882570][ T1843] device bridge_slave_0 entered promiscuous mode [ 52.911805][ T1815] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.920928][ T1843] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.927939][ T1843] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.935539][ T1843] device bridge_slave_1 entered promiscuous mode [ 52.942551][ T1818] team0: Port device team_slave_0 added [ 52.955704][ T1816] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.969853][ T1815] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.983775][ T1818] team0: Port device team_slave_1 added [ 52.994221][ T1816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.031189][ T1831] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.038248][ T1831] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.045638][ T1831] device bridge_slave_0 entered promiscuous mode [ 53.056905][ T1843] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.070059][ T1841] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.077083][ T1841] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.084774][ T1841] device bridge_slave_0 entered promiscuous mode [ 53.096424][ T1831] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.103585][ T1831] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.111111][ T1831] device bridge_slave_1 entered promiscuous mode [ 53.118258][ T1815] team0: Port device team_slave_0 added [ 53.124824][ T1843] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.134019][ T1818] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.140958][ T1818] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.166874][ T1818] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.177576][ T1841] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.184697][ T1841] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.192251][ T1841] device bridge_slave_1 entered promiscuous mode [ 53.199302][ T1816] team0: Port device team_slave_0 added [ 53.210141][ T1815] team0: Port device team_slave_1 added [ 53.220418][ T1818] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.227360][ T1818] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.253309][ T1818] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.268912][ T1816] team0: Port device team_slave_1 added [ 53.293310][ T1841] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.307082][ T1831] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.320747][ T1815] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.327675][ T1815] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.353588][ T1815] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.364557][ T1843] team0: Port device team_slave_0 added [ 53.371944][ T1843] team0: Port device team_slave_1 added [ 53.378435][ T1841] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.392319][ T1831] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.401548][ T1815] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.408497][ T1815] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.434817][ T1815] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.461215][ T1816] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.468202][ T1816] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.494138][ T1816] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.523798][ T1841] team0: Port device team_slave_0 added [ 53.529763][ T1816] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.536695][ T1816] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.562818][ T1816] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.584684][ T1818] device hsr_slave_0 entered promiscuous mode [ 53.591199][ T1818] device hsr_slave_1 entered promiscuous mode [ 53.597730][ T1843] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.604797][ T1843] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.630787][ T1843] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.642051][ T1841] team0: Port device team_slave_1 added [ 53.660011][ T1831] team0: Port device team_slave_0 added [ 53.666439][ T1831] team0: Port device team_slave_1 added [ 53.676595][ T1843] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.683570][ T1843] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.709474][ T1843] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.733848][ T1815] device hsr_slave_0 entered promiscuous mode [ 53.740283][ T1815] device hsr_slave_1 entered promiscuous mode [ 53.746670][ T1815] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 53.754221][ T1815] Cannot create hsr debugfs directory [ 53.770451][ T1831] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.778193][ T1831] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.804138][ T1831] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.814945][ T1841] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.821900][ T1841] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.847811][ T1841] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.860424][ T1816] device hsr_slave_0 entered promiscuous mode [ 53.866899][ T1816] device hsr_slave_1 entered promiscuous mode [ 53.873674][ T1816] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 53.881237][ T1816] Cannot create hsr debugfs directory [ 53.894726][ T1831] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.901748][ T1831] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.927688][ T1831] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.941333][ T1841] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.948340][ T1841] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.974272][ T1841] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 54.000706][ T1843] device hsr_slave_0 entered promiscuous mode [ 54.007159][ T1843] device hsr_slave_1 entered promiscuous mode [ 54.013519][ T1843] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 54.021082][ T1843] Cannot create hsr debugfs directory [ 54.060894][ T1831] device hsr_slave_0 entered promiscuous mode [ 54.067304][ T1831] device hsr_slave_1 entered promiscuous mode [ 54.073835][ T1831] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 54.081398][ T1831] Cannot create hsr debugfs directory [ 54.099753][ T1841] device hsr_slave_0 entered promiscuous mode [ 54.106324][ T1841] device hsr_slave_1 entered promiscuous mode [ 54.112644][ T1841] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 54.120301][ T1841] Cannot create hsr debugfs directory [ 54.213396][ T1815] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 54.225578][ T1815] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 54.236104][ T1815] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 54.247448][ T1818] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 54.255647][ T1815] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 54.270279][ T1818] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 54.279556][ T1818] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 54.290056][ T1818] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 54.320376][ T1816] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 54.330687][ T1816] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 54.354683][ T1816] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 54.363760][ T1816] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 54.373386][ T1843] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 54.382311][ T1843] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 54.399749][ T1843] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 54.409103][ T23] audit: type=1400 audit(1669782516.808:88): avc: denied { remove_name } for pid=1413 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 54.411955][ T1815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.431722][ T23] audit: type=1400 audit(1669782516.808:89): avc: denied { rename } for pid=1413 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 54.466253][ T1843] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 54.480130][ T1815] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.492095][ T1818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.532191][ T1818] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.542162][ T1831] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 54.553015][ T1831] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 54.567117][ T1816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.575046][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.583621][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.591505][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.600480][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.609210][ T1913] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.616376][ T1913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.624442][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.633288][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.642819][ T1913] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.649939][ T1913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.657689][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.668247][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.677146][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.685920][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.700479][ T1831] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 54.713683][ T1831] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 54.727766][ T1816] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.741467][ T1815] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.751904][ T1815] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.764527][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.772571][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.781970][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.790641][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.800399][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.808997][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.817252][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.826818][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.835366][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.844455][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.852960][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.862358][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.869406][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.877103][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.886880][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.895380][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.902428][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.912536][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.920235][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.927849][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.962918][ T1841] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 54.971158][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.979626][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.987211][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.995172][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.003722][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.012216][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.020600][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.029045][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.037475][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.046055][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.054357][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.061427][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.069549][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.078000][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.086331][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.093388][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.104015][ T1818] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.114390][ T1818] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.129543][ T1841] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 55.138459][ T1841] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 55.150217][ T1843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.158682][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.166886][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.174874][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.183114][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.191729][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.200045][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.208074][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.217604][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.225587][ T1841] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 55.237360][ T1843] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.262841][ T1815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.270205][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.277800][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.285853][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.294561][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.303121][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.311782][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.320347][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.328931][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.337087][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.345579][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.353645][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.361807][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.369243][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.377091][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.398732][ T1816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.412019][ T1831] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.426823][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.436807][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.445275][ T1911] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.452324][ T1911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.460644][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.469143][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.477361][ T1911] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.484416][ T1911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.492141][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.500710][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.510244][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.517999][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.525418][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.536745][ T1831] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.549643][ T1818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.556886][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.564945][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.572602][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.581536][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.589984][ T1913] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.597016][ T1913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.604914][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.613336][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.621970][ T1913] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.629011][ T1913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.636717][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.645472][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.664493][ T1843] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.674946][ T1843] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.693275][ T1831] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.703739][ T1831] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.725705][ T1841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.736492][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.744792][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.753121][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.761852][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.770436][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.778998][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.787193][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.795570][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.803632][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.812479][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.821304][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.829737][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.837971][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.846403][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.855028][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.863269][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.871642][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.879815][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.890428][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.898286][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.906534][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.914442][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 55.923227][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.938555][ T1816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.947309][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.955402][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.969111][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.979920][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.989536][ T1841] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.003881][ T1831] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.019778][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 56.031912][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.040503][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 56.047902][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 56.073504][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.096936][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.109416][ T1911] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.116479][ T1911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.124922][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.133705][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.141998][ T1911] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.149027][ T1911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.156880][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.165712][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.174160][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.182707][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.191224][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.199853][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.208359][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.216554][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.224830][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 56.233633][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.242201][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 56.249627][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 56.258239][ T1843] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.270715][ T1841] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.281952][ T1841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.294990][ T1815] device veth0_vlan entered promiscuous mode [ 56.304887][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.314645][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.324664][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.333207][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.341764][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 56.350167][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.359602][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.367223][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.381012][ T1815] device veth1_vlan entered promiscuous mode [ 56.392954][ T1816] device veth0_vlan entered promiscuous mode [ 56.410491][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 56.418851][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 56.427001][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.454309][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 56.463180][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.472039][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 56.480562][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.490943][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 56.498997][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.506657][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.518149][ T1816] device veth1_vlan entered promiscuous mode [ 56.535191][ T1818] device veth0_vlan entered promiscuous mode [ 56.558471][ T1841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.566955][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 56.575929][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 56.585571][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 56.593345][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 56.600911][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 56.609268][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.617712][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 56.626221][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.636763][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.644825][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.655661][ T1816] device veth0_macvtap entered promiscuous mode [ 56.663747][ T1815] device veth0_macvtap entered promiscuous mode [ 56.679096][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 56.687138][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 56.702449][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.711008][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 56.719532][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.728807][ T1816] device veth1_macvtap entered promiscuous mode [ 56.737740][ T1831] device veth0_vlan entered promiscuous mode [ 56.748055][ T1815] device veth1_macvtap entered promiscuous mode [ 56.760197][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 56.768561][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 56.776555][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 56.785162][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.798697][ T1816] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.808904][ T1831] device veth1_vlan entered promiscuous mode [ 56.815953][ T1818] device veth1_vlan entered promiscuous mode [ 56.826913][ T1815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.837419][ T1815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.848597][ T1815] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.855882][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.864387][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.872068][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 56.880734][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 56.889377][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.897786][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 56.906380][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.914965][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 56.923610][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.933908][ T1816] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.941876][ T1843] device veth0_vlan entered promiscuous mode [ 56.956836][ T1841] device veth0_vlan entered promiscuous mode [ 56.965899][ T1815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.976425][ T1815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.987722][ T1815] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.997510][ T1815] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.006339][ T1815] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.015036][ T1815] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.023837][ T1815] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.033930][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 57.042025][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.050473][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.058397][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.066902][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.075885][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 57.084026][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.092764][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.101221][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.111299][ T1816] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.120272][ T1816] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.129008][ T1816] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.137670][ T1816] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.147990][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.155772][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.166657][ T1841] device veth1_vlan entered promiscuous mode [ 57.182326][ T1843] device veth1_vlan entered promiscuous mode [ 57.201694][ T1831] device veth0_macvtap entered promiscuous mode [ 57.213890][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 57.222807][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 57.230743][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 57.238785][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 57.246625][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.255195][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.263465][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.271796][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.280302][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.288809][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.298794][ T1831] device veth1_macvtap entered promiscuous mode [ 57.306588][ T1818] device veth0_macvtap entered promiscuous mode [ 57.316540][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 57.324678][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.332447][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 57.345795][ T1831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 57.356261][ T1831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.366157][ T1831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 57.369255][ T23] audit: type=1400 audit(1669782519.738:90): avc: denied { mounton } for pid=1815 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 57.376558][ T1831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.410902][ T1831] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 57.418942][ T1841] device veth0_macvtap entered promiscuous mode [ 57.426731][ T1841] device veth1_macvtap entered promiscuous mode [ 57.439873][ T1843] device veth0_macvtap entered promiscuous mode [ 57.447238][ T1843] device veth1_macvtap entered promiscuous mode [ 57.454874][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 57.462758][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.470778][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.479515][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.487928][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.496541][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.504878][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.513387][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 57.521924][ T1831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 57.525175][ T23] audit: type=1400 audit(1669782519.918:91): avc: denied { read write } for pid=1815 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 57.532382][ T1831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 04:28:39 executing program 0: prlimit64(0x0, 0x8, &(0x7f0000000140), 0x0) r0 = memfd_secret(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 04:28:39 executing program 0: prlimit64(0x0, 0x8, &(0x7f0000000140), 0x0) r0 = memfd_secret(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 04:28:40 executing program 0: prlimit64(0x0, 0x8, &(0x7f0000000140), 0x0) r0 = memfd_secret(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) [ 57.532390][ T1831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 57.532401][ T1831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.534826][ T1831] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 57.566142][ T23] audit: type=1400 audit(1669782519.958:92): avc: denied { open } for pid=1815 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 04:28:40 executing program 0: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 57.618152][ T23] audit: type=1400 audit(1669782519.958:93): avc: denied { ioctl } for pid=1815 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 57.644216][ T23] audit: type=1400 audit(1669782519.958:94): avc: denied { create } for pid=1992 comm="syz-executor.0" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 57.653498][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 57.665849][ T23] audit: type=1400 audit(1669782519.958:95): avc: denied { create } for pid=1992 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 57.676220][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.695882][ T23] audit: type=1400 audit(1669782519.958:96): avc: denied { getopt } for pid=1992 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 57.705702][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 57.735987][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.739971][ T23] audit: type=1400 audit(1669782520.118:97): avc: denied { create } for pid=2000 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 57.745794][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 57.765535][ T23] audit: type=1400 audit(1669782520.118:98): avc: denied { open } for pid=2000 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 57.775892][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.797152][ T1841] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 57.805366][ T23] audit: type=1400 audit(1669782520.118:99): avc: denied { perfmon } for pid=2000 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 57.841339][ T1843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 57.851807][ T1843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.861646][ T1843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 57.872118][ T1843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.881973][ T1843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 57.892380][ T1843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.902216][ T1843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 57.912876][ T1843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 57.923842][ T1843] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 57.932187][ T1818] device veth1_macvtap entered promiscuous mode [ 57.939392][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.947378][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.957108][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.965558][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.974259][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.982636][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.991467][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 58.001431][ T1831] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.010222][ T1831] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.018926][ T1831] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.027643][ T1831] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.039847][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.050449][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.060333][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.070807][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.080774][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.091185][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.102025][ T1841] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 58.116716][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 58.127182][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.137069][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 58.147481][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.157281][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 58.167771][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.177669][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 58.188118][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.197907][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 58.208652][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.219930][ T1818] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 58.231880][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 58.240491][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 58.249388][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 58.257893][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 58.266773][ T1843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.277319][ T1843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.287120][ T1843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.297537][ T1843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.307341][ T1843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.317793][ T1843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.327614][ T1843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.338130][ T1843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.349334][ T1843] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 58.358390][ T1841] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 04:28:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xb8}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0xe8, &(0x7f0000000100)=""/232, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:28:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xb8}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0xe8, &(0x7f0000000100)=""/232, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 58.367102][ T1841] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.375839][ T1841] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.384666][ T1841] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.401284][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.411753][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 04:28:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xb8}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0xe8, &(0x7f0000000100)=""/232, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:28:40 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)='\x00', 0x1}], 0x1, 0x0) close(r1) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3, 0x2}, 0x18) splice(r0, 0x0, r1, 0x0, 0x800000010002, 0x0) [ 58.421597][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.432110][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.441945][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.452458][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.462375][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.472894][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.482723][ T1818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 58.493327][ T1818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 58.505707][ T1818] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 58.513889][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 58.524171][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 58.533074][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 58.542658][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 58.559914][ T1843] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.568714][ T1843] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.577403][ T1843] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.586143][ T1843] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.601802][ T1818] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.610596][ T1818] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.619371][ T1818] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.628074][ T1818] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 04:28:41 executing program 5: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 58.740189][ C0] hrtimer: interrupt took 27420 ns 04:28:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}, @TCA_POLICE_RESULT={0x8, 0x5, 0x3}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 04:28:44 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) r6 = openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000400), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='task_newtask\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0x12) 04:28:44 executing program 0: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 04:28:44 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)='\x00', 0x1}], 0x1, 0x0) close(r1) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3, 0x2}, 0x18) splice(r0, 0x0, r1, 0x0, 0x800000010002, 0x0) 04:28:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000004fc0)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x403}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3}, 0x14) sendmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="419be1b77804c5225e241b42559e48f1ef581f41", 0x14}], 0x1}}], 0x1, 0x0) 04:28:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}, @TCA_POLICE_RESULT={0x8, 0x5, 0x3}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 04:28:44 executing program 5: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 04:28:44 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)='\x00', 0x1}], 0x1, 0x0) close(r1) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3, 0x2}, 0x18) splice(r0, 0x0, r1, 0x0, 0x800000010002, 0x0) 04:28:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000004fc0)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x403}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3}, 0x14) sendmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="419be1b77804c5225e241b42559e48f1ef581f41", 0x14}], 0x1}}], 0x1, 0x0) 04:28:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}, @TCA_POLICE_RESULT={0x8, 0x5, 0x3}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 04:28:44 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) r6 = openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000400), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='task_newtask\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0x12) 04:28:44 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)='\x00', 0x1}], 0x1, 0x0) close(r1) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3, 0x2}, 0x18) splice(r0, 0x0, r1, 0x0, 0x800000010002, 0x0) 04:28:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000004fc0)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x403}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3}, 0x14) sendmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="419be1b77804c5225e241b42559e48f1ef581f41", 0x14}], 0x1}}], 0x1, 0x0) [ 61.631296][ T2023] syz-executor.3 (2023) used greatest stack depth: 10856 bytes left 04:28:53 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xb0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 04:28:53 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) r6 = openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000400), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='task_newtask\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0x12) 04:28:53 executing program 1: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 04:28:53 executing program 0: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 04:28:53 executing program 5: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 04:28:53 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) r6 = openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000400), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='task_newtask\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0x12) [ 70.977064][ T23] kauditd_printk_skb: 11 callbacks suppressed [ 70.977076][ T23] audit: type=1400 audit(1669782533.368:111): avc: denied { create } for pid=2072 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 71.002924][ T23] audit: type=1400 audit(1669782533.398:112): avc: denied { bind } for pid=2072 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 04:28:53 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xb0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 71.022527][ T23] audit: type=1400 audit(1669782533.398:113): avc: denied { name_bind } for pid=2072 comm="syz-executor.4" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 71.043623][ T23] audit: type=1400 audit(1669782533.398:114): avc: denied { node_bind } for pid=2072 comm="syz-executor.4" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 04:28:53 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xb0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 71.064724][ T23] audit: type=1400 audit(1669782533.398:115): avc: denied { listen } for pid=2072 comm="syz-executor.4" lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 71.085513][ T23] audit: type=1400 audit(1669782533.398:116): avc: denied { connect } for pid=2072 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 71.105411][ T23] audit: type=1400 audit(1669782533.398:117): avc: denied { name_connect } for pid=2072 comm="syz-executor.4" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 04:28:53 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xb0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 04:28:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) 04:28:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) 04:28:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) [ 71.126795][ T23] audit: type=1400 audit(1669782533.398:118): avc: denied { getopt } for pid=2072 comm="syz-executor.4" laddr=127.0.0.1 lport=52640 faddr=127.0.0.2 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 04:29:03 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) r6 = openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000400), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='task_newtask\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0x12) 04:29:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) 04:29:03 executing program 1: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 04:29:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00Qw\x00'}) r1 = syz_open_pts(r0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) 04:29:03 executing program 0: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 04:29:03 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) r6 = openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000400), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='task_newtask\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0x12) 04:29:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00Qw\x00'}) r1 = syz_open_pts(r0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) 04:29:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0xffffff8f}) [ 81.466565][ T2100] syz-executor.3 (2100) used greatest stack depth: 10728 bytes left 04:29:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0xffffff8f}) [ 81.513949][ T2115] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 81.514789][ T23] audit: type=1400 audit(1669782543.908:119): avc: denied { read } for pid=2114 comm="syz-executor.4" name="sg0" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 81.544295][ T2119] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 04:29:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0xffffff8f}) 04:29:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00Qw\x00'}) r1 = syz_open_pts(r0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) 04:29:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00Qw\x00'}) r1 = syz_open_pts(r0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) [ 81.547361][ T23] audit: type=1400 audit(1669782543.908:120): avc: denied { open } for pid=2114 comm="syz-executor.4" path="/dev/sg0" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 81.607405][ T2126] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 04:29:10 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0xffffff8f}) 04:29:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'macgaelic'}}, {@shortname_lower}, {@utf8}, {@shortname_lower}, {@fat=@fmask={'fmask', 0x3d, 0x101}}, {@shortname_lower}, {@fat=@check_strict}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@uni_xlate}, {@shortname_lower}, {@shortname_mixed}, {@fat=@flush}, {@utf8no}, {@rodir}, {@shortname_mixed}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}, 0xff, 0x20e, &(0x7f0000000400)="$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") r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="9c8980a3a2a2"], 0x108) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x8000200000c, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) 04:29:10 executing program 1: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340)=0xfffffffffffff7e4, 0x9, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e00907f, 0x0, 0x0, 0x500, 0x0, 0xeed4, 0x2, 0x0, 0x1f, 0x6163}, 0xffffffffffffffff, 0x0, r1, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000, 0x20000000000000, 0x5}, &(0x7f0000000180)={0x0, r3+10000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 04:29:10 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xba, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 04:29:10 executing program 2: creat(&(0x7f0000000280)='./file1\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffffffffffffb]}, 0x0, 0x8) splice(r0, 0x0, r1, 0x0, 0x201, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180)={0x8}, &(0x7f0000000200)={0x7f}, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) 04:29:10 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0xe0000004}) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0) 04:29:10 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xba, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 87.974791][ T2139] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 87.983041][ T2143] loop5: detected capacity change from 0 to 256 [ 88.007624][ T2143] ======================================================= [ 88.007624][ T2143] WARNING: The mand mount option has been deprecated and [ 88.007624][ T2143] and is ignored by this kernel. Remove the mand [ 88.007624][ T2143] option from the mount to silence this warning. [ 88.007624][ T2143] ======================================================= [ 88.015102][ T23] audit: type=1400 audit(1669782550.398:121): avc: denied { mounton } for pid=2136 comm="syz-executor.5" path="/root/syzkaller-testdir904395125/syzkaller.Qnf6Nk/8/bus" dev="sda1" ino=1174 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 04:29:10 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xba, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 04:29:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x2, &(0x7f000000a740)={0x0, 0x0, 0x0}, &(0x7f000000a780)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r1}, &(0x7f0000000040)=0x8) 04:29:10 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xba, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 04:29:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x2, &(0x7f000000a740)={0x0, 0x0, 0x0}, &(0x7f000000a780)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r1}, &(0x7f0000000040)=0x8) 04:29:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'macgaelic'}}, {@shortname_lower}, {@utf8}, {@shortname_lower}, {@fat=@fmask={'fmask', 0x3d, 0x101}}, {@shortname_lower}, {@fat=@check_strict}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@uni_xlate}, {@shortname_lower}, {@shortname_mixed}, {@fat=@flush}, {@utf8no}, {@rodir}, {@shortname_mixed}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}, 0xff, 0x20e, &(0x7f0000000400)="$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") r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="9c8980a3a2a2"], 0x108) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x8000200000c, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) [ 88.043069][ T2143] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! 04:29:10 executing program 0: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) capset(&(0x7f0000001580)={0x20080522}, &(0x7f00000002c0)) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x16, 0x4, 0x0, 0x8007}, 0x48) 04:29:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x2, &(0x7f000000a740)={0x0, 0x0, 0x0}, &(0x7f000000a780)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r1}, &(0x7f0000000040)=0x8) [ 88.109736][ T23] audit: type=1400 audit(1669782550.488:122): avc: denied { mount } for pid=2136 comm="syz-executor.5" name="/" dev="loop5" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 88.132053][ T23] audit: type=1400 audit(1669782550.488:123): avc: denied { create } for pid=2150 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 88.151881][ T23] audit: type=1400 audit(1669782550.488:124): avc: denied { getopt } for pid=2150 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 88.171605][ T23] audit: type=1400 audit(1669782550.498:125): avc: denied { execute } for pid=2136 comm="syz-executor.5" path=2F6D656D66643AED72215159883D5678A1D13CDE6217D3E2691D3517A4202864656C6574656429 dev="tmpfs" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 88.202268][ T23] audit: type=1400 audit(1669782550.508:126): avc: denied { unmount } for pid=1831 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 88.222734][ T23] audit: type=1400 audit(1669782550.598:127): avc: denied { map_create } for pid=2157 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 88.225623][ T2162] loop5: detected capacity change from 0 to 256 [ 88.249899][ T2162] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! 04:29:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'macgaelic'}}, {@shortname_lower}, {@utf8}, {@shortname_lower}, {@fat=@fmask={'fmask', 0x3d, 0x101}}, {@shortname_lower}, {@fat=@check_strict}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@uni_xlate}, {@shortname_lower}, {@shortname_mixed}, {@fat=@flush}, {@utf8no}, {@rodir}, {@shortname_mixed}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}, 0xff, 0x20e, &(0x7f0000000400)="$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") r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="9c8980a3a2a2"], 0x108) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x8000200000c, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) 04:29:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x2, &(0x7f000000a740)={0x0, 0x0, 0x0}, &(0x7f000000a780)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r1}, &(0x7f0000000040)=0x8) [ 88.829114][ T2165] loop5: detected capacity change from 0 to 256 [ 88.836532][ T2165] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! 04:29:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffff2e}}, 0x81) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) socket$key(0xf, 0x3, 0x2) [ 92.122363][ T23] audit: type=1400 audit(1669782554.518:128): avc: denied { create } for pid=2169 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 92.142083][ T23] audit: type=1400 audit(1669782554.518:129): avc: denied { write } for pid=2169 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 04:29:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'macgaelic'}}, {@shortname_lower}, {@utf8}, {@shortname_lower}, {@fat=@fmask={'fmask', 0x3d, 0x101}}, {@shortname_lower}, {@fat=@check_strict}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@uni_xlate}, {@shortname_lower}, {@shortname_mixed}, {@fat=@flush}, {@utf8no}, {@rodir}, {@shortname_mixed}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}, 0xff, 0x20e, &(0x7f0000000400)="$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") r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="9c8980a3a2a2"], 0x108) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x8000200000c, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) 04:29:18 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0xe0000004}) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0) 04:29:18 executing program 2: creat(&(0x7f0000000280)='./file1\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffffffffffffb]}, 0x0, 0x8) splice(r0, 0x0, r1, 0x0, 0x201, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180)={0x8}, &(0x7f0000000200)={0x7f}, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) 04:29:18 executing program 0: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) capset(&(0x7f0000001580)={0x20080522}, &(0x7f00000002c0)) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x16, 0x4, 0x0, 0x8007}, 0x48) 04:29:18 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="18426636668610600000004a00000000000000000000000a"], 0x18}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a53b043ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e314422b85442e4ed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe3e26e7a23129d6606fd28a69989d553ad2d9a9df2c3af36e0360050011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a13ed38ab50c06b0e82f87925bfacba83109753f541cd027ed117e17da99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a70000000000000000000000d7900a822a92895614cd50cbe43a1ed252c5206b00000000000009d27d753a30a147b24a48435bd8a568669596e9e086afbbca727f5a000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='jbd2_run_stats\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 04:29:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffff2e}}, 0x81) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) socket$key(0xf, 0x3, 0x2) [ 96.271116][ T23] audit: type=1400 audit(1669782558.668:130): avc: denied { block_suspend } for pid=2176 comm="syz-executor.3" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 96.307660][ T2184] loop5: detected capacity change from 0 to 256 04:29:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffff2e}}, 0x81) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) socket$key(0xf, 0x3, 0x2) 04:29:18 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="18426636668610600000004a00000000000000000000000a"], 0x18}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='jbd2_run_stats\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 04:29:18 executing program 5: creat(&(0x7f0000000280)='./file1\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffffffffffffb]}, 0x0, 0x8) splice(r0, 0x0, r1, 0x0, 0x201, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180)={0x8}, &(0x7f0000000200)={0x7f}, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) 04:29:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffff2e}}, 0x81) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) socket$key(0xf, 0x3, 0x2) 04:29:18 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="18426636668610600000004a00000000000000000000000a"], 0x18}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='jbd2_run_stats\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 96.317426][ T23] audit: type=1400 audit(1669782558.708:131): avc: denied { prog_run } for pid=2186 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 96.342052][ T2184] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! 04:29:18 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="18426636668610600000004a00000000000000000000000a"], 0x18}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='jbd2_run_stats\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 04:29:18 executing program 5: creat(&(0x7f0000000280)='./file1\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffffffffffffb]}, 0x0, 0x8) splice(r0, 0x0, r1, 0x0, 0x201, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180)={0x8}, &(0x7f0000000200)={0x7f}, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) 04:29:25 executing program 2: creat(&(0x7f0000000280)='./file1\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffffffffffffb]}, 0x0, 0x8) splice(r0, 0x0, r1, 0x0, 0x201, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180)={0x8}, &(0x7f0000000200)={0x7f}, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) 04:29:31 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0xe0000004}) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0) 04:29:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:29:31 executing program 0: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) capset(&(0x7f0000001580)={0x20080522}, &(0x7f00000002c0)) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x16, 0x4, 0x0, 0x8007}, 0x48) 04:29:31 executing program 5: creat(&(0x7f0000000280)='./file1\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffffffffffffb]}, 0x0, 0x8) splice(r0, 0x0, r1, 0x0, 0x201, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180)={0x8}, &(0x7f0000000200)={0x7f}, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) 04:29:31 executing program 4: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) chroot(&(0x7f0000000180)='./file0\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/nfs', 0x0, 0x0) getdents(r0, &(0x7f0000000100)=""/83, 0x53) getdents64(r0, &(0x7f00000001c0)=""/72, 0x48) 04:29:31 executing program 2: creat(&(0x7f0000000280)='./file1\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffffffffffffb]}, 0x0, 0x8) splice(r0, 0x0, r1, 0x0, 0x201, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180)={0x8}, &(0x7f0000000200)={0x7f}, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) 04:29:31 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20040000}, 0xc, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0xc800}, 0x40) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wpan1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x13c, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x5, 0x0, 0x60, {0x0, 0x0, 0x3, 0x0, 0xf201}, [@IFLA_GROUP={0x8}]}, 0xc0}, 0x1, 0x8100}, 0x0) 04:29:31 executing program 4: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) chroot(&(0x7f0000000180)='./file0\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/nfs', 0x0, 0x0) getdents(r0, &(0x7f0000000100)=""/83, 0x53) getdents64(r0, &(0x7f00000001c0)=""/72, 0x48) [ 108.782744][ T23] audit: type=1400 audit(1669782571.178:132): avc: denied { mount } for pid=2216 comm="syz-executor.4" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 04:29:31 executing program 4: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) chroot(&(0x7f0000000180)='./file0\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/nfs', 0x0, 0x0) getdents(r0, &(0x7f0000000100)=""/83, 0x53) getdents64(r0, &(0x7f00000001c0)=""/72, 0x48) 04:29:31 executing program 0: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) capset(&(0x7f0000001580)={0x20080522}, &(0x7f00000002c0)) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x16, 0x4, 0x0, 0x8007}, 0x48) 04:29:31 executing program 4: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) chroot(&(0x7f0000000180)='./file0\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/nfs', 0x0, 0x0) getdents(r0, &(0x7f0000000100)=""/83, 0x53) getdents64(r0, &(0x7f00000001c0)=""/72, 0x48) [ 108.842709][ T23] audit: type=1400 audit(1669782571.208:133): avc: denied { unmount } for pid=1818 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 04:29:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10000000004) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a0010000100f5fe001259f338c57410e8a99f47ff00000007", 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 108.906462][ T2219] loop1: detected capacity change from 0 to 8192 [ 108.940670][ T23] audit: type=1400 audit(1669782571.338:134): avc: denied { create } for pid=2233 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 108.976716][ T23] audit: type=1400 audit(1669782571.358:135): avc: denied { write } for pid=2233 comm="syz-executor.4" path="socket:[18808]" dev="sockfs" ino=18808 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 108.997001][ T2224] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 109.001308][ T23] audit: type=1400 audit(1669782571.358:136): avc: denied { nlmsg_read } for pid=2233 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 109.037855][ T23] audit: type=1400 audit(1669782571.358:137): avc: denied { read } for pid=2233 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 109.099156][ T2224] syz-executor.5 (2224) used greatest stack depth: 10152 bytes left 04:29:38 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0xe0000004}) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0) 04:29:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10000000004) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a0010000100f5fe001259f338c57410e8a99f47ff00000007", 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:29:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10000000004) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a0010000100f5fe001259f338c57410e8a99f47ff00000007", 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:29:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:29:38 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20040000}, 0xc, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0xc800}, 0x40) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wpan1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x13c, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x5, 0x0, 0x60, {0x0, 0x0, 0x3, 0x0, 0xf201}, [@IFLA_GROUP={0x8}]}, 0xc0}, 0x1, 0x8100}, 0x0) 04:29:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10000000004) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a0010000100f5fe001259f338c57410e8a99f47ff00000007", 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:29:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:29:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10000000004) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a0010000100f5fe001259f338c57410e8a99f47ff00000007", 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:29:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10000000004) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a0010000100f5fe001259f338c57410e8a99f47ff00000007", 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:29:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10000000004) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a0010000100f5fe001259f338c57410e8a99f47ff00000007", 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:29:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$eJzs3E9rHHUYB/CnTWrT1PxRa7UF8UEvehmbHDx5CdKCGFCqKaggTM1Gl0x2w84SWBGrJ6++DFGP3gTxDeTixbPgRXLx2IM40p1oTV0FLbhp+Xwu87Az3+UZBhZ+y++Zgxc+3dneqoutchgnT5yI2d1TkTczMk7GTLQ+imevff/DE6+98ebLa+vrl69mXll7feX5zFx88pu3PvjyqW+HZ699tfj16dhffvvg59Uf98/vXzj49Yvo1tmts9cfZpnX+/1heb3q5Ga33i4yX606Zd3Jbq/uDI6c36r6u7ujLHubC/O7g05dZ9kb5XZnlMN+DgejLN8tu70siiIX5oO7sfH5zaZpIprmVDwQTdM0Z2I+zsaDsRCLsRTL8VA8HI/EuXg0zsdj8XhcGF817b4BAAAAAAAAAAAAAAAAAADg/mL+HwAAAAAAAAAAAAAAAAAAAKbP/D8AAAAAAAAAAAAAAAAAAABMn/l/AAAAAAAAAAAAAAAAAAAAOAbm2sPVzLmInU/2NvY22mP7+dpWdKOKTlyKpfglxtP/rba+8tL65Us5thzP7dw4zN/Y25g5ml8Zv05gYn6lzefR/OmY/3N+NZbi3OT86sT8XDzz9K38x22+iKX47p3oRxWbcSt7O//hSuaLr6zfkb84vg4AAADuB0X+YeL6vSj+7nybP1yf5+/f9w//D9yxvp6Ni7NTu20O1aP3t8uq6gwUd1HMHI822sIzrX767Fi0cU8X0/5l4v9w+6FPuxMAAAAAAAAAAAD+jYm7/85ExF/2A773n7cTTvseAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPiNHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwFUBAAD///PO7J0=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:29:38 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000180)={@multicast, @local, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0x64010102, @local, {[@ra={0x94, 0x4}]}}, {0x0, 0x4e21, 0xc, 0x0, @opaque="3bcf7139"}}}}}, 0x0) [ 116.022444][ T2246] loop1: detected capacity change from 0 to 8192 [ 116.081587][ T2245] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 116.113390][ T2259] loop0: detected capacity change from 0 to 8192 04:29:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:29:56 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000180)={@multicast, @local, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0x64010102, @local, {[@ra={0x94, 0x4}]}}, {0x0, 0x4e21, 0xc, 0x0, @opaque="3bcf7139"}}}}}, 0x0) 04:29:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:29:56 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20040000}, 0xc, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0xc800}, 0x40) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wpan1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x13c, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x5, 0x0, 0x60, {0x0, 0x0, 0x3, 0x0, 0xf201}, [@IFLA_GROUP={0x8}]}, 0xc0}, 0x1, 0x8100}, 0x0) 04:29:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x24}}, 0x0) 04:29:57 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000180)={@multicast, @local, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0x64010102, @local, {[@ra={0x94, 0x4}]}}, {0x0, 0x4e21, 0xc, 0x0, @opaque="3bcf7139"}}}}}, 0x0) [ 134.671704][ T2281] loop0: detected capacity change from 0 to 8192 [ 134.683358][ T2280] loop1: detected capacity change from 0 to 8192 [ 134.795668][ T2279] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:30:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:30:08 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000180)={@multicast, @local, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0x64010102, @local, {[@ra={0x94, 0x4}]}}, {0x0, 0x4e21, 0xc, 0x0, @opaque="3bcf7139"}}}}}, 0x0) 04:30:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$eJzs3E9rHHUYB/CnTWrT1PxRa7UF8UEvehmbHDx5CdKCGFCqKaggTM1Gl0x2w84SWBGrJ6++DFGP3gTxDeTixbPgRXLx2IM40p1oTV0FLbhp+Xwu87Az3+UZBhZ+y++Zgxc+3dneqoutchgnT5yI2d1TkTczMk7GTLQ+imevff/DE6+98ebLa+vrl69mXll7feX5zFx88pu3PvjyqW+HZ699tfj16dhffvvg59Uf98/vXzj49Yvo1tmts9cfZpnX+/1heb3q5Ga33i4yX606Zd3Jbq/uDI6c36r6u7ujLHubC/O7g05dZ9kb5XZnlMN+DgejLN8tu70siiIX5oO7sfH5zaZpIprmVDwQTdM0Z2I+zsaDsRCLsRTL8VA8HI/EuXg0zsdj8XhcGF817b4BAAAAAAAAAAAAAAAAAADg/mL+HwAAAAAAAAAAAAAAAAAAAKbP/D8AAAAAAAAAAAAAAAAAAABMn/l/AAAAAAAAAAAAAAAAAAAAOAbm2sPVzLmInU/2NvY22mP7+dpWdKOKTlyKpfglxtP/rba+8tL65Us5thzP7dw4zN/Y25g5ml8Zv05gYn6lzefR/OmY/3N+NZbi3OT86sT8XDzz9K38x22+iKX47p3oRxWbcSt7O//hSuaLr6zfkb84vg4AAADuB0X+YeL6vSj+7nybP1yf5+/f9w//D9yxvp6Ni7NTu20O1aP3t8uq6gwUd1HMHI822sIzrX767Fi0cU8X0/5l4v9w+6FPuxMAAAAAAAAAAAD+jYm7/85ExF/2A773n7cTTvseAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPiNHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwFUBAAD///PO7J0=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:30:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:30:08 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20040000}, 0xc, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0xc800}, 0x40) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wpan1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x13c, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x5, 0x0, 0x60, {0x0, 0x0, 0x3, 0x0, 0xf201}, [@IFLA_GROUP={0x8}]}, 0xc0}, 0x1, 0x8100}, 0x0) 04:30:08 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) 04:30:08 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@multicast, @multicast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @multicast1, @remote, @local}}}}, 0x0) 04:30:08 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@multicast, @multicast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @multicast1, @remote, @local}}}}, 0x0) 04:30:08 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@multicast, @multicast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @multicast1, @remote, @local}}}}, 0x0) [ 145.996801][ T2302] loop1: detected capacity change from 0 to 8192 04:30:08 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@multicast, @multicast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @multicast1, @remote, @local}}}}, 0x0) 04:30:08 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) 04:30:08 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 146.053450][ T2299] loop0: detected capacity change from 0 to 8192 [ 146.141345][ T2301] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:30:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)={[{@shortname_mixed}, {@utf8}, {@fat=@discard}]}, 0xfd, 0x11fc, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x408) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 04:30:19 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) 04:30:19 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x14, 0x2, [@TCA_FQ_LOW_RATE_THRESHOLD={0x8}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0xfffffffc}]}}]}, 0x40}}, 0x0) 04:30:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 04:30:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b402000000000000791130000000000085000000010000009500000000000000358bb9f43d86b13600e15d4e613ffe2e54f3879c57aab919fe0bc53bd90731"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc5, &(0x7f0000000300)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x54) 04:30:19 executing program 3: r0 = syz_io_uring_setup(0x6b08, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) r2 = syz_io_uring_setup(0x501d, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000180)) r4 = dup3(r2, r0, 0x0) syz_io_uring_submit(r3, r1, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x4, &(0x7f0000000040)={0x0, 0x3938700}}, 0x1b81573c) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000002040), 0x0, 0x0, 0x0) io_uring_enter(r0, 0x54, 0xea98, 0x3, 0x0, 0x60) io_uring_enter(r4, 0x605e, 0x0, 0x0, 0x0, 0x0) 04:30:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b402000000000000791130000000000085000000010000009500000000000000358bb9f43d86b13600e15d4e613ffe2e54f3879c57aab919fe0bc53bd90731"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc5, &(0x7f0000000300)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x54) 04:30:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b402000000000000791130000000000085000000010000009500000000000000358bb9f43d86b13600e15d4e613ffe2e54f3879c57aab919fe0bc53bd90731"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc5, &(0x7f0000000300)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x54) 04:30:19 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x14, 0x2, [@TCA_FQ_LOW_RATE_THRESHOLD={0x8}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0xfffffffc}]}}]}, 0x40}}, 0x0) 04:30:19 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) 04:30:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b402000000000000791130000000000085000000010000009500000000000000358bb9f43d86b13600e15d4e613ffe2e54f3879c57aab919fe0bc53bd90731"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc5, &(0x7f0000000300)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x54) 04:30:19 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x14, 0x2, [@TCA_FQ_LOW_RATE_THRESHOLD={0x8}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0xfffffffc}]}}]}, 0x40}}, 0x0) 04:30:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipmr_newroute={0x1c, 0x18, 0x1}, 0x3c}}, 0x0) 04:30:28 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, 0x0, 0xfffffffffffffeeb, 0x0, &(0x7f0000000080), 0x10) 04:30:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x7, 0x4, 0x7}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000000300), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r0, &(0x7f0000000400)="f9", &(0x7f0000001400)=""/126}, 0x20) 04:30:28 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x14, 0x2, [@TCA_FQ_LOW_RATE_THRESHOLD={0x8}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0xfffffffc}]}}]}, 0x40}}, 0x0) 04:30:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 04:30:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000ec0800000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000726f736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 04:30:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x2, &(0x7f0000001480)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0xc) 04:30:28 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, 0x0, 0xfffffffffffffeeb, 0x0, &(0x7f0000000080), 0x10) 04:30:28 executing program 4: unshare(0x400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0xe, 0x0, 0x0) 04:30:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x2, &(0x7f0000001480)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0xc) [ 166.490454][ T23] audit: type=1400 audit(1669782628.888:138): avc: denied { create } for pid=2357 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 04:30:28 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, 0x0, 0xfffffffffffffeeb, 0x0, &(0x7f0000000080), 0x10) 04:30:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x2, &(0x7f0000001480)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0xc) [ 166.546530][ T23] audit: type=1400 audit(1669782628.908:139): avc: denied { write } for pid=2357 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 166.566433][ T23] audit: type=1400 audit(1669782628.908:140): avc: denied { map_read map_write } for pid=2359 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 166.586555][ T23] audit: type=1400 audit(1669782628.918:141): avc: denied { read } for pid=1413 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 166.611302][ T23] audit: type=1400 audit(1669782628.958:142): avc: denied { setopt } for pid=2374 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 04:30:36 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, 0x0, 0xfffffffffffffeeb, 0x0, &(0x7f0000000080), 0x10) 04:30:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)=@secondary) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f000000b5c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000440)=@keyring={'key_or_keyring:', r0}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r2}) 04:30:36 executing program 4: unshare(0x400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0xe, 0x0, 0x0) 04:30:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 04:30:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 04:30:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x2, &(0x7f0000001480)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0xc) 04:30:36 executing program 4: unshare(0x400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0xe, 0x0, 0x0) 04:30:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d00)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:30:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)={0x30, r1, 0xc4fc9e906872338b, 0x0, 0x0, {{0x5}, {@void, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}]}]}]}, 0x30}}, 0x0) 04:30:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)={0x30, r1, 0xc4fc9e906872338b, 0x0, 0x0, {{0x5}, {@void, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}]}]}]}, 0x30}}, 0x0) 04:30:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d00)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:30:36 executing program 4: unshare(0x400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0xe, 0x0, 0x0) 04:30:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)={0x30, r1, 0xc4fc9e906872338b, 0x0, 0x0, {{0x5}, {@void, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}]}]}]}, 0x30}}, 0x0) 04:30:44 executing program 2: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)=@secondary) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f000000b5c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000440)=@keyring={'key_or_keyring:', r0}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r2}) 04:30:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d00)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:30:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)={0x30, r1, 0xc4fc9e906872338b, 0x0, 0x0, {{0x5}, {@void, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}]}]}]}, 0x30}}, 0x0) 04:30:44 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) pselect6(0x40, &(0x7f0000000140)={0x8}, 0x0, 0x0, 0x0, 0x0) 04:30:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 04:30:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000ec0800000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000726f736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 04:30:44 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) pselect6(0x40, &(0x7f0000000140)={0x8}, 0x0, 0x0, 0x0, 0x0) 04:30:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d00)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:30:44 executing program 5: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)=@secondary) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f000000b5c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000440)=@keyring={'key_or_keyring:', r0}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r2}) [ 181.956212][ T23] audit: type=1400 audit(1669782644.348:143): avc: denied { write } for pid=2413 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 04:30:44 executing program 5: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)=@secondary) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f000000b5c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000440)=@keyring={'key_or_keyring:', r0}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r2}) 04:30:44 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) pselect6(0x40, &(0x7f0000000140)={0x8}, 0x0, 0x0, 0x0, 0x0) 04:30:44 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) [ 182.051705][ T23] audit: type=1400 audit(1669782644.448:144): avc: denied { connect } for pid=2433 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 04:30:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)=@secondary) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f000000b5c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000440)=@keyring={'key_or_keyring:', r0}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r2}) 04:30:48 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) 04:30:48 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) pselect6(0x40, &(0x7f0000000140)={0x8}, 0x0, 0x0, 0x0, 0x0) 04:30:48 executing program 5: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)=@secondary) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f000000b5c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000440)=@keyring={'key_or_keyring:', r0}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r2}) 04:30:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:30:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:30:51 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r0, 0x0) shutdown(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1}, 0x6e) 04:30:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:30:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x14}}}, 0x30}}, 0x0) 04:30:51 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) 04:30:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x14}}}, 0x30}}, 0x0) 04:30:51 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) 04:31:03 executing program 2: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)=@secondary) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f000000b5c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000440)=@keyring={'key_or_keyring:', r0}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r2}) 04:31:03 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r0, 0x0) shutdown(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1}, 0x6e) 04:31:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x14}}}, 0x30}}, 0x0) 04:31:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x14}}}, 0x30}}, 0x0) 04:31:04 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r0, 0x0) shutdown(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1}, 0x6e) 04:31:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r0, 0x0) shutdown(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1}, 0x6e) 04:31:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0xd6816160f5cea601, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x101}, @NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x7c}}, 0x0) 04:31:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5418, 0x0) 04:31:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5418, 0x0) 04:31:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5418, 0x0) 04:31:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5418, 0x0) 04:31:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000900)) 04:31:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000900)) [ 225.391110][ T23] audit: type=1400 audit(1669782687.788:145): avc: denied { create } for pid=2572 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 225.412197][ T23] audit: type=1400 audit(1669782687.788:146): avc: denied { write } for pid=2572 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 04:31:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0xd6816160f5cea601, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x101}, @NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x7c}}, 0x0) 04:31:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000900)) 04:31:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_DF={0x5, 0xd, 0x20}]}}}]}, 0x3c}, 0x1, 0xba01}, 0x0) 04:31:35 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) syz_emit_ethernet(0x36, &(0x7f0000001800)={@multicast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0x2, @multicast2}, @timestamp_reply={0x11}}}}}, 0x0) 04:31:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) setreuid(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(r2, r4, 0x0, 0x100005003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "3c988e4db6dbc500", "a7ddbbef058c199517d2f11b2a130a47", "7ef0202d", "5419ba90f34bc04a"}, 0x28) sendfile(r2, r3, &(0x7f00000000c0), 0x4) setsockopt$sock_timeval(r2, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:31:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000900)) 04:31:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_DF={0x5, 0xd, 0x20}]}}}]}, 0x3c}, 0x1, 0xba01}, 0x0) 04:31:35 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0xa0, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x70, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0xc, 0x2, 0x0, 0x1, [{0x4}, {0x4}]}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}]}}]}, 0xa0}}, 0x0) 04:31:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_DF={0x5, 0xd, 0x20}]}}}]}, 0x3c}, 0x1, 0xba01}, 0x0) 04:31:35 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e40)=ANY=[], 0x1378) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001fc0)=""/184, 0xb8) 04:31:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_DF={0x5, 0xd, 0x20}]}}}]}, 0x3c}, 0x1, 0xba01}, 0x0) 04:31:35 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0xa0, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x70, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0xc, 0x2, 0x0, 0x1, [{0x4}, {0x4}]}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}]}}]}, 0xa0}}, 0x0) [ 233.442794][ T23] audit: type=1400 audit(1669782695.838:147): avc: denied { ioctl } for pid=2586 comm="syz-executor.5" path="socket:[19430]" dev="sockfs" ino=19430 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 04:31:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0xd6816160f5cea601, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x101}, @NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x7c}}, 0x0) 04:31:47 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e40)=ANY=[], 0x1378) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001fc0)=""/184, 0xb8) 04:31:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}]}, 0x108) [ 245.040782][ T23] audit: type=1400 audit(1669782707.438:148): avc: denied { setopt } for pid=2605 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 04:32:02 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) syz_emit_ethernet(0x36, &(0x7f0000001800)={@multicast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0x2, @multicast2}, @timestamp_reply={0x11}}}}}, 0x0) 04:32:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0xa0, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x70, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0xc, 0x2, 0x0, 0x1, [{0x4}, {0x4}]}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}]}}]}, 0xa0}}, 0x0) 04:32:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@setneightbl={0x24, 0x43, 0x103, 0x0, 0x0, {}, [@NDTA_NAME={0x5, 0x1, 'syzkaller\x00'}]}, 0x24}}, 0x0) 04:32:02 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e40)=ANY=[], 0x1378) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001fc0)=""/184, 0xb8) 04:32:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}]}, 0x108) 04:32:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0xd6816160f5cea601, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x101}, @NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x7c}}, 0x0) 04:32:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}]}, 0x108) 04:32:02 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e40)=ANY=[], 0x1378) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001fc0)=""/184, 0xb8) 04:32:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0xa0, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x70, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0xc, 0x2, 0x0, 0x1, [{0x4}, {0x4}]}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}]}}]}, 0xa0}}, 0x0) 04:32:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 04:32:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}]}, 0x108) [ 260.431864][ T23] audit: type=1400 audit(1669782722.828:149): avc: denied { setopt } for pid=2611 comm="syz-executor.3" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 260.469826][ T2620] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:32:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@setneightbl={0x24, 0x43, 0x103, 0x0, 0x0, {}, [@NDTA_NAME={0x5, 0x1, 'syzkaller\x00'}]}, 0x24}}, 0x0) [ 260.536127][ T2634] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:32:13 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) syz_emit_ethernet(0x36, &(0x7f0000001800)={@multicast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0x2, @multicast2}, @timestamp_reply={0x11}}}}}, 0x0) 04:32:13 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="5300000007000046009cb06d3fdbd01a895f"], 0x53) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) 04:32:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 04:32:13 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xa000, @ipv4={'\x00', '\xff\xff', @private}}], 0x1c) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/47, &(0x7f0000000180)=0x2f) 04:32:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@setneightbl={0x24, 0x43, 0x103, 0x0, 0x0, {}, [@NDTA_NAME={0x5, 0x1, 'syzkaller\x00'}]}, 0x24}}, 0x0) 04:32:13 executing program 2: r0 = socket$caif_seqpacket(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000000), &(0x7f0000000040)=0x44) 04:32:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 04:32:13 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xa000, @ipv4={'\x00', '\xff\xff', @private}}], 0x1c) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/47, &(0x7f0000000180)=0x2f) 04:32:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 270.844846][ T23] audit: type=1400 audit(1669782733.238:150): avc: denied { mounton } for pid=2640 comm="syz-executor.1" path="/root/syzkaller-testdir2423498680/syzkaller.4oKWPS/50/file0" dev="sda1" ino=1171 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 270.847974][ T2648] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 270.876830][ T2646] 9pnet: p9_errstr2errno: server reported unknown error œ°m?ÛЉ_ 04:32:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x241, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000280)="de2e06df3cd624c7467034d2fa49ee", 0x1}, {0x0, 0x61}, {&(0x7f0000000200)="20b80f403bbf3401c7e7af9757acf29364525d04", 0x14}], 0x3, 0x8000, 0x0) 04:32:13 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="5300000007000046009cb06d3fdbd01a895f"], 0x53) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) 04:32:13 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xa000, @ipv4={'\x00', '\xff\xff', @private}}], 0x1c) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/47, &(0x7f0000000180)=0x2f) [ 270.946971][ T2658] 9pnet: p9_errstr2errno: server reported unknown error œ°m?ÛЉ_ 04:32:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@setneightbl={0x24, 0x43, 0x103, 0x0, 0x0, {}, [@NDTA_NAME={0x5, 0x1, 'syzkaller\x00'}]}, 0x24}}, 0x0) 04:32:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) syz_emit_ethernet(0x36, &(0x7f0000001800)={@multicast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0x2, @multicast2}, @timestamp_reply={0x11}}}}}, 0x0) 04:32:21 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xa000, @ipv4={'\x00', '\xff\xff', @private}}], 0x1c) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/47, &(0x7f0000000180)=0x2f) 04:32:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x241, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000280)="de2e06df3cd624c7467034d2fa49ee", 0x1}, {0x0, 0x61}, {&(0x7f0000000200)="20b80f403bbf3401c7e7af9757acf29364525d04", 0x14}], 0x3, 0x8000, 0x0) 04:32:21 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="5300000007000046009cb06d3fdbd01a895f"], 0x53) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) 04:32:21 executing program 2: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000740)={0x0, 0x8001, 0x7}) syz_read_part_table(0x0, 0xfffffffffffffffc) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x4a, &(0x7f00000002c0)={&(0x7f0000000040)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_CPMARK_MASK={0x8}, @TCA_CTINFO_ACT={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:32:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x241, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000280)="de2e06df3cd624c7467034d2fa49ee", 0x1}, {0x0, 0x61}, {&(0x7f0000000200)="20b80f403bbf3401c7e7af9757acf29364525d04", 0x14}], 0x3, 0x8000, 0x0) 04:32:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x241, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000280)="de2e06df3cd624c7467034d2fa49ee", 0x1}, {0x0, 0x61}, {&(0x7f0000000200)="20b80f403bbf3401c7e7af9757acf29364525d04", 0x14}], 0x3, 0x8000, 0x0) 04:32:21 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000100), 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:32:21 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="5300000007000046009cb06d3fdbd01a895f"], 0x53) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) 04:32:21 executing program 0: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000080)=0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x23, &(0x7f0000000080), &(0x7f0000000200)=0x28) [ 279.260954][ T2675] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 279.270766][ T2673] 9pnet: p9_errstr2errno: server reported unknown error œ°m?ÛЉ_ 04:32:21 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000100), 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:32:21 executing program 0: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000080)=0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x23, &(0x7f0000000080), &(0x7f0000000200)=0x28) [ 279.293239][ T23] audit: type=1400 audit(1669782741.688:151): avc: denied { write } for pid=2679 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 279.322521][ T2685] 9pnet: p9_errstr2errno: server reported unknown error œ°m?ÛЉ_ 04:32:28 executing program 2: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000740)={0x0, 0x8001, 0x7}) syz_read_part_table(0x0, 0xfffffffffffffffc) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x4a, &(0x7f00000002c0)={&(0x7f0000000040)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_CPMARK_MASK={0x8}, @TCA_CTINFO_ACT={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:32:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv4_delrule={0x28, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_TUN_ID={0xc, 0x4}]}, 0x28}}, 0x0) 04:32:28 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000100), 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:32:28 executing program 0: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000080)=0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x23, &(0x7f0000000080), &(0x7f0000000200)=0x28) 04:32:28 executing program 1: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) 04:32:28 executing program 3: mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1004, 0x3, &(0x7f0000fff000/0x1000)=nil) 04:32:28 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000100), 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) [ 286.485950][ T23] audit: type=1400 audit(1669782748.878:152): avc: denied { map } for pid=2702 comm="syz-executor.1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20491 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 286.499703][ T2701] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 04:32:28 executing program 1: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) 04:32:28 executing program 0: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000080)=0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x23, &(0x7f0000000080), &(0x7f0000000200)=0x28) 04:32:28 executing program 4: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) [ 286.510490][ T23] audit: type=1400 audit(1669782748.878:153): avc: denied { read write } for pid=2702 comm="syz-executor.1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20491 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 286.535136][ T23] audit: type=1400 audit(1669782748.908:154): avc: denied { create } for pid=2702 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 04:32:29 executing program 0: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) 04:32:29 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x7, &(0x7f0000000100)=@framed={{}, [@map_fd, @map_idx]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x1000, &(0x7f00000016c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 286.563350][ T23] audit: type=1400 audit(1669782748.918:155): avc: denied { read } for pid=2702 comm="syz-executor.1" path="socket:[20494]" dev="sockfs" ino=20494 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 286.586909][ T23] audit: type=1400 audit(1669782748.918:156): avc: denied { write } for pid=2702 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 04:32:32 executing program 2: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000740)={0x0, 0x8001, 0x7}) syz_read_part_table(0x0, 0xfffffffffffffffc) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x4a, &(0x7f00000002c0)={&(0x7f0000000040)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_CPMARK_MASK={0x8}, @TCA_CTINFO_ACT={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:32:32 executing program 4: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) 04:32:32 executing program 1: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) 04:32:32 executing program 5: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) shmat(0x0, &(0x7f000026b000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) 04:32:32 executing program 0: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) 04:32:41 executing program 3: mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1004, 0x3, &(0x7f0000fff000/0x1000)=nil) 04:32:41 executing program 5: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) shmat(0x0, &(0x7f000026b000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) 04:32:41 executing program 4: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) 04:32:41 executing program 0: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) 04:32:41 executing program 1: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) r3 = socket(0x29, 0x2, 0x0) io_uring_enter(r0, 0xb4, 0x0, 0x0, 0x0, 0x2e00) sendmsg$rds(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1}, 0x0) 04:32:41 executing program 5: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) shmat(0x0, &(0x7f000026b000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) 04:32:41 executing program 1: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) shmat(0x0, &(0x7f000026b000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) 04:32:53 executing program 2: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000740)={0x0, 0x8001, 0x7}) syz_read_part_table(0x0, 0xfffffffffffffffc) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x4a, &(0x7f00000002c0)={&(0x7f0000000040)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_CPMARK_MASK={0x8}, @TCA_CTINFO_ACT={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:32:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x80000000}}}}]}, 0x78}}, 0x0) 04:32:53 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) 04:32:53 executing program 5: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) shmat(0x0, &(0x7f000026b000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) 04:32:53 executing program 1: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) shmat(0x0, &(0x7f000026b000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) 04:32:53 executing program 3: mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1004, 0x3, &(0x7f0000fff000/0x1000)=nil) 04:32:53 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) 04:32:53 executing program 1: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) shmat(0x0, &(0x7f000026b000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) 04:32:53 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000040), 0xc) close_range(r0, 0xffffffffffffffff, 0x0) [ 311.408195][ T2756] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:32:53 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) [ 311.438923][ T23] audit: type=1400 audit(1669782773.838:157): avc: denied { read } for pid=2760 comm="syz-executor.5" name="qrtr-tun" dev="devtmpfs" ino=232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 311.459047][ T2767] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 311.471220][ T23] audit: type=1400 audit(1669782773.868:158): avc: denied { open } for pid=2760 comm="syz-executor.5" path="/dev/qrtr-tun" dev="devtmpfs" ino=232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 04:32:53 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) 04:32:53 executing program 1: r0 = syz_io_uring_setup(0x18c, &(0x7f00000002c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = epoll_create(0x8) r4 = eventfd2(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000040)=r4, 0x1) io_uring_enter(r0, 0x6eaa, 0x0, 0x0, 0x0, 0x0) [ 311.494863][ T23] audit: type=1400 audit(1669782773.868:159): avc: denied { create } for pid=2760 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 311.514896][ T23] audit: type=1400 audit(1669782773.868:160): avc: denied { connect } for pid=2760 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 04:33:04 executing program 3: mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1004, 0x3, &(0x7f0000fff000/0x1000)=nil) 04:33:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x80000000}}}}]}, 0x78}}, 0x0) 04:33:04 executing program 0: r0 = syz_io_uring_setup(0x14f7, &(0x7f0000000180), &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000140)=r3, 0x1) read$eventfd(r3, &(0x7f0000000000), 0x8) syz_io_uring_setup(0x6860, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x0, 0x6988, 0x1, 0x0, 0x0) io_uring_enter(r0, 0x1bf1, 0x0, 0x0, 0x0, 0x0) 04:33:04 executing program 1: r0 = syz_io_uring_setup(0x18c, &(0x7f00000002c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = epoll_create(0x8) r4 = eventfd2(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000040)=r4, 0x1) io_uring_enter(r0, 0x6eaa, 0x0, 0x0, 0x0, 0x0) 04:33:04 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000040), 0xc) close_range(r0, 0xffffffffffffffff, 0x0) 04:33:04 executing program 2: open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000f00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='sys_exit\x00', r0}, 0x10) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) 04:33:04 executing program 1: r0 = syz_io_uring_setup(0x18c, &(0x7f00000002c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = epoll_create(0x8) r4 = eventfd2(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000040)=r4, 0x1) io_uring_enter(r0, 0x6eaa, 0x0, 0x0, 0x0, 0x0) 04:33:04 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000040), 0xc) close_range(r0, 0xffffffffffffffff, 0x0) 04:33:04 executing program 1: r0 = syz_io_uring_setup(0x18c, &(0x7f00000002c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = epoll_create(0x8) r4 = eventfd2(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000040)=r4, 0x1) io_uring_enter(r0, 0x6eaa, 0x0, 0x0, 0x0, 0x0) 04:33:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x80000000}}}}]}, 0x78}}, 0x0) 04:33:04 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000040), 0xc) close_range(r0, 0xffffffffffffffff, 0x0) [ 321.811996][ T2784] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 321.827921][ T2784] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 04:33:04 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200003) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1) [ 321.884620][ T2799] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 321.895454][ T2799] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 04:33:08 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200003) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1) 04:33:08 executing program 5: mount$9p_rdma(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000340)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) 04:33:08 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x80000000}}}}]}, 0x78}}, 0x0) 04:33:08 executing program 0: r0 = syz_io_uring_setup(0x14f7, &(0x7f0000000180), &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000140)=r3, 0x1) read$eventfd(r3, &(0x7f0000000000), 0x8) syz_io_uring_setup(0x6860, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x0, 0x6988, 0x1, 0x0, 0x0) io_uring_enter(r0, 0x1bf1, 0x0, 0x0, 0x0, 0x0) 04:33:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000200)={0x0, {{0x2, 0x0, @broadcast}}, 0x0, 0x1, [{{0xa, 0x0, @multicast2}}]}, 0x110) [ 325.968677][ T2815] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 325.984352][ T2815] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 04:33:11 executing program 2: connect$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x0, &(0x7f00000040c0)="0665f029874a7e9c599673cb919f2620d459fa2cde12646c823285055eaede55c5beae1991c281eefc95538800035bc37052b5671d066a9ce121b99bdd7311052ee55fa930a9225917f8462291212ef882b3fa44eb74c29fd872eb1820f524eb39fd68de2018dc1b4450555400d3c276c7d8", 0x72, &(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)="085cd1ffd791232859e6cb7c08fb4e48e6c3e9b5e4dbdb7b3230c2c636e18c5451d9bd16e758b837fddaf8471abbdf4133fc87c439b9b6267c26b92ab91b99e0537b0aaf27c222ca9d0a9149f7ea38339ef6445d1d8f95ebda401967") openat$rtc(0xffffff9c, &(0x7f0000004800), 0x2, 0x0) openat$cgroup_root(0xffffff9c, &(0x7f0000004840)='./cgroup/syz1\x00', 0x200002, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getpgid(0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'wg2\x00'}) r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000004a00), 0xc, &(0x7f0000004cc0)={&(0x7f0000004ac0)={0x28, r0, 0x10, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7fffffff, 0x35}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x20040040) 04:33:11 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200003) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1) 04:33:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@newlink={0x38, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}, @IFLA_AF_SPEC={0x4}]}, 0x38}}, 0x0) 04:33:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, &(0x7f0000000040)) 04:33:11 executing program 0: r0 = syz_io_uring_setup(0x14f7, &(0x7f0000000180), &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000140)=r3, 0x1) read$eventfd(r3, &(0x7f0000000000), 0x8) syz_io_uring_setup(0x6860, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x0, 0x6988, 0x1, 0x0, 0x0) io_uring_enter(r0, 0x1bf1, 0x0, 0x0, 0x0, 0x0) 04:33:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@newlink={0x38, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}, @IFLA_AF_SPEC={0x4}]}, 0x38}}, 0x0) 04:33:11 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200003) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1) 04:33:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, &(0x7f0000000040)) 04:33:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, &(0x7f0000000040)) 04:33:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@newlink={0x38, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}, @IFLA_AF_SPEC={0x4}]}, 0x38}}, 0x0) 04:33:11 executing program 1: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) [ 329.022600][ T23] audit: type=1400 audit(1669782791.418:161): avc: denied { shutdown } for pid=2841 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 333.172229][ T23] audit: type=1400 audit(1669782795.568:162): avc: denied { read write } for pid=2822 comm="syz-executor.2" name="rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 333.196315][ T23] audit: type=1400 audit(1669782795.568:163): avc: denied { open } for pid=2822 comm="syz-executor.2" path="/dev/rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 04:33:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000200)={0x0, {{0x2, 0x0, @broadcast}}, 0x0, 0x1, [{{0xa, 0x0, @multicast2}}]}, 0x110) 04:33:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, &(0x7f0000000040)) 04:33:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@newlink={0x38, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}, @IFLA_AF_SPEC={0x4}]}, 0x38}}, 0x0) 04:33:20 executing program 1: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 04:33:20 executing program 0: r0 = syz_io_uring_setup(0x14f7, &(0x7f0000000180), &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000140)=r3, 0x1) read$eventfd(r3, &(0x7f0000000000), 0x8) syz_io_uring_setup(0x6860, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x0, 0x6988, 0x1, 0x0, 0x0) io_uring_enter(r0, 0x1bf1, 0x0, 0x0, 0x0, 0x0) 04:33:20 executing program 2: connect$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x0, &(0x7f00000040c0)="0665f029874a7e9c599673cb919f2620d459fa2cde12646c823285055eaede55c5beae1991c281eefc95538800035bc37052b5671d066a9ce121b99bdd7311052ee55fa930a9225917f8462291212ef882b3fa44eb74c29fd872eb1820f524eb39fd68de2018dc1b4450555400d3c276c7d8", 0x72, &(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)="085cd1ffd791232859e6cb7c08fb4e48e6c3e9b5e4dbdb7b3230c2c636e18c5451d9bd16e758b837fddaf8471abbdf4133fc87c439b9b6267c26b92ab91b99e0537b0aaf27c222ca9d0a9149f7ea38339ef6445d1d8f95ebda401967") openat$rtc(0xffffff9c, &(0x7f0000004800), 0x2, 0x0) openat$cgroup_root(0xffffff9c, &(0x7f0000004840)='./cgroup/syz1\x00', 0x200002, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getpgid(0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'wg2\x00'}) r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000004a00), 0xc, &(0x7f0000004cc0)={&(0x7f0000004ac0)={0x28, r0, 0x10, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7fffffff, 0x35}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x20040040) 04:33:20 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x10}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000280)='rxrpc_conn\x00', r2}, 0x10) ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) 04:33:20 executing program 1: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 04:33:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000780)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x303, 0x37}, "11000000dded5355", "6a1d45a8ef8ed32a13ee430b3e94fdf6", "fd705e0f", "920b006500"}, 0x28) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, 0x0, 0x4) [ 338.478053][ T23] audit: type=1400 audit(1669782800.868:164): avc: denied { create } for pid=2861 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 338.497927][ T23] audit: type=1400 audit(1669782800.868:165): avc: denied { connect } for pid=2861 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 04:33:20 executing program 1: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) [ 338.517928][ T23] audit: type=1400 audit(1669782800.868:166): avc: denied { write } for pid=2861 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 338.542331][ T23] audit: type=1400 audit(1669782800.898:167): avc: denied { prog_load } for pid=2861 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 04:33:20 executing program 1: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f00000001c0)=0x7fff0000) [ 338.561772][ T23] audit: type=1400 audit(1669782800.938:168): avc: denied { prog_run } for pid=2861 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 04:33:21 executing program 1: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f00000001c0)=0x7fff0000) [ 338.599504][ T23] audit: type=1400 audit(1669782800.938:169): avc: denied { module_request } for pid=2865 comm="syz-executor.5" kmod="crypto-gcm(sm4)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 04:33:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000200)={0x0, {{0x2, 0x0, @broadcast}}, 0x0, 0x1, [{{0xa, 0x0, @multicast2}}]}, 0x110) 04:33:24 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x10}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000280)='rxrpc_conn\x00', r2}, 0x10) ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) 04:33:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000780)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x303, 0x37}, "11000000dded5355", "6a1d45a8ef8ed32a13ee430b3e94fdf6", "fd705e0f", "920b006500"}, 0x28) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, 0x0, 0x4) 04:33:24 executing program 1: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f00000001c0)=0x7fff0000) 04:33:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000780)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x303, 0x37}, "11000000dded5355", "6a1d45a8ef8ed32a13ee430b3e94fdf6", "fd705e0f", "920b006500"}, 0x28) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, 0x0, 0x4) 04:33:27 executing program 2: connect$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x0, &(0x7f00000040c0)="0665f029874a7e9c599673cb919f2620d459fa2cde12646c823285055eaede55c5beae1991c281eefc95538800035bc37052b5671d066a9ce121b99bdd7311052ee55fa930a9225917f8462291212ef882b3fa44eb74c29fd872eb1820f524eb39fd68de2018dc1b4450555400d3c276c7d8", 0x72, &(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)="085cd1ffd791232859e6cb7c08fb4e48e6c3e9b5e4dbdb7b3230c2c636e18c5451d9bd16e758b837fddaf8471abbdf4133fc87c439b9b6267c26b92ab91b99e0537b0aaf27c222ca9d0a9149f7ea38339ef6445d1d8f95ebda401967") openat$rtc(0xffffff9c, &(0x7f0000004800), 0x2, 0x0) openat$cgroup_root(0xffffff9c, &(0x7f0000004840)='./cgroup/syz1\x00', 0x200002, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getpgid(0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'wg2\x00'}) r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000004a00), 0xc, &(0x7f0000004cc0)={&(0x7f0000004ac0)={0x28, r0, 0x10, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7fffffff, 0x35}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x20040040) 04:33:27 executing program 1: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f00000001c0)=0x7fff0000) 04:33:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x10}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000280)='rxrpc_conn\x00', r2}, 0x10) ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) 04:33:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000780)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x303, 0x37}, "11000000dded5355", "6a1d45a8ef8ed32a13ee430b3e94fdf6", "fd705e0f", "920b006500"}, 0x28) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, 0x0, 0x4) 04:33:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000780)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x303, 0x37}, "11000000dded5355", "6a1d45a8ef8ed32a13ee430b3e94fdf6", "fd705e0f", "920b006500"}, 0x28) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, 0x0, 0x4) 04:33:28 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, r0, 0x0) close(r0) 04:33:28 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x10}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000280)='rxrpc_conn\x00', r2}, 0x10) ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) 04:33:28 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, r0, 0x0) close(r0) [ 345.631182][ T23] audit: type=1400 audit(1669782808.028:170): avc: denied { write } for pid=2922 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 04:33:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000200)={0x0, {{0x2, 0x0, @broadcast}}, 0x0, 0x1, [{{0xa, 0x0, @multicast2}}]}, 0x110) 04:33:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:33:34 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, r0, 0x0) close(r0) 04:33:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000780)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x303, 0x37}, "11000000dded5355", "6a1d45a8ef8ed32a13ee430b3e94fdf6", "fd705e0f", "920b006500"}, 0x28) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, 0x0, 0x4) [ 351.853910][ T23] audit: type=1400 audit(1669782814.248:171): avc: denied { connect } for pid=2937 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 351.941794][ T23] audit: type=1400 audit(1669782814.338:172): avc: denied { mount } for pid=2937 comm="syz-executor.4" name="/" dev="hugetlbfs" ino=20870 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 351.966185][ T23] audit: type=1400 audit(1669782814.338:173): avc: denied { remount } for pid=2937 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 352.164760][ T23] audit: type=1400 audit(1669782814.558:174): avc: denied { unmount } for pid=1818 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 04:33:39 executing program 2: connect$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x0, &(0x7f00000040c0)="0665f029874a7e9c599673cb919f2620d459fa2cde12646c823285055eaede55c5beae1991c281eefc95538800035bc37052b5671d066a9ce121b99bdd7311052ee55fa930a9225917f8462291212ef882b3fa44eb74c29fd872eb1820f524eb39fd68de2018dc1b4450555400d3c276c7d8", 0x72, &(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)="085cd1ffd791232859e6cb7c08fb4e48e6c3e9b5e4dbdb7b3230c2c636e18c5451d9bd16e758b837fddaf8471abbdf4133fc87c439b9b6267c26b92ab91b99e0537b0aaf27c222ca9d0a9149f7ea38339ef6445d1d8f95ebda401967") openat$rtc(0xffffff9c, &(0x7f0000004800), 0x2, 0x0) openat$cgroup_root(0xffffff9c, &(0x7f0000004840)='./cgroup/syz1\x00', 0x200002, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getpgid(0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'wg2\x00'}) r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000004a00), 0xc, &(0x7f0000004cc0)={&(0x7f0000004ac0)={0x28, r0, 0x10, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7fffffff, 0x35}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x20040040) 04:33:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000780)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x303, 0x37}, "11000000dded5355", "6a1d45a8ef8ed32a13ee430b3e94fdf6", "fd705e0f", "920b006500"}, 0x28) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, 0x0, 0x4) 04:33:39 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, r0, 0x0) close(r0) 04:33:39 executing program 0: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) io_setup(0xb03, &(0x7f0000000c40)) 04:33:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:33:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:33:39 executing program 0: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) io_setup(0xb03, &(0x7f0000000c40)) 04:33:39 executing program 0: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) io_setup(0xb03, &(0x7f0000000c40)) 04:33:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:33:39 executing program 0: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) io_setup(0xb03, &(0x7f0000000c40)) 04:33:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:33:39 executing program 5: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@gettclass={0x24, 0x1e, 0x862e3ae0959b476b, 0x0, 0x0, {0x2}}, 0x24}}, 0x0) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 357.080836][ T2996] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.143498][ T2996] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 04:33:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:33:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:33:53 executing program 5: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@gettclass={0x24, 0x1e, 0x862e3ae0959b476b, 0x0, 0x0, {0x2}}, 0x24}}, 0x0) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 04:33:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:33:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x10, 0x1a001000000}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 04:33:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) [ 371.512498][ T3018] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 371.541493][ T3018] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 04:33:54 executing program 5: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@gettclass={0x24, 0x1e, 0x862e3ae0959b476b, 0x0, 0x0, {0x2}}, 0x24}}, 0x0) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 371.641173][ T3026] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 04:33:54 executing program 5: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@gettclass={0x24, 0x1e, 0x862e3ae0959b476b, 0x0, 0x0, {0x2}}, 0x24}}, 0x0) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 371.701522][ T3027] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 371.793571][ T3029] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 04:33:54 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000000c0)={'veth1_vlan\x00', 0x401}) [ 371.837916][ T3030] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 371.903116][ T23] audit: type=1400 audit(1669782834.298:175): avc: denied { create } for pid=3031 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 371.942744][ T23] audit: type=1400 audit(1669782834.318:176): avc: denied { ioctl } for pid=3031 comm="syz-executor.5" path="socket:[21026]" dev="sockfs" ino=21026 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 04:33:54 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000000c0)={'veth1_vlan\x00', 0x401}) 04:33:54 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000000c0)={'veth1_vlan\x00', 0x401}) 04:33:54 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000000c0)={'veth1_vlan\x00', 0x401}) 04:34:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:34:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:34:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x3}}]}]}, 0x2c}}, 0x0) 04:34:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) [ 378.643857][ T23] audit: type=1400 audit(1669782841.038:177): avc: denied { ioctl } for pid=3047 comm="syz-executor.5" path="socket:[21082]" dev="sockfs" ino=21082 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 378.669701][ T3050] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 378.708142][ T3045] syz-executor.3 (3045) used greatest stack depth: 10064 bytes left 04:34:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000600)=0x1, 0x4) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f0000000180)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_ORIG={0x1c, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}]}]}, 0x80}}, 0x0) 04:34:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x3}}]}]}, 0x2c}}, 0x0) 04:34:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) syz_io_uring_setup(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x474282, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0), 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x2, 0x62, 0x4, {}, {}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x4, 0x2, 0x0, 0x0, "fe465dadb96bf457a4a20c2281a5edfd19ce0ed93f66c6ab73c853fe43999da6c3e4a3669fe4fc4a3aad529b8419ea88eb46d78217bd9f8fffbbaeb82768dd5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_fscache, 0x0}]}}) write$binfmt_elf64(r4, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x7f, 0x8, 0x3, 0x3b, 0x1, 0x2b8, 0x40, 0x181, 0x8001, 0x0, 0x38, 0x2, 0x0, 0x3f, 0x6}, [{0x6, 0x5, 0xfffffffffffffffd, 0x8, 0x3, 0x1, 0x9f7, 0x1}], "646191", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00'}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1a40020, 0x0) 04:34:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x18}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r2, @multicast1}, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}}, 0x0) 04:34:44 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x13) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x202c0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x0, 0x989680}) tkill(r0, 0x12) wait4(0x0, 0x0, 0x8000000a, 0x0) 04:34:44 executing program 4: syz_emit_ethernet(0x25e, &(0x7f0000000680)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4f8100", 0x228, 0x3a, 0xff, @local, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x2, 0xa, "a78ce5400659808000000000004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af1802"}, {0x0, 0x1, "080000000000000000000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0822a18b79f7c5eba31fb68b2d734a6671e27182aee4df24a4a5c6186c0d3baa75af390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5acaa556b9f30dcab2b90aa235a670670ffc5dc49dfb58d89310000000000"}, {0x2, 0x1, "fcf98a102ec1"}]}}}}}}, 0x0) [ 421.705523][ T3068] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 421.735312][ T8] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 04:34:44 executing program 4: syz_emit_ethernet(0x25e, &(0x7f0000000680)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4f8100", 0x228, 0x3a, 0xff, @local, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x2, 0xa, "a78ce5400659808000000000004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af1802"}, {0x0, 0x1, "080000000000000000000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0822a18b79f7c5eba31fb68b2d734a6671e27182aee4df24a4a5c6186c0d3baa75af390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5acaa556b9f30dcab2b90aa235a670670ffc5dc49dfb58d89310000000000"}, {0x2, 0x1, "fcf98a102ec1"}]}}}}}}, 0x0) 04:34:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x3}}]}]}, 0x2c}}, 0x0) 04:34:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x18}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r2, @multicast1}, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}}, 0x0) 04:34:44 executing program 4: syz_emit_ethernet(0x25e, &(0x7f0000000680)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4f8100", 0x228, 0x3a, 0xff, @local, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x2, 0xa, "a78ce5400659808000000000004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af1802"}, {0x0, 0x1, "080000000000000000000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0822a18b79f7c5eba31fb68b2d734a6671e27182aee4df24a4a5c6186c0d3baa75af390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5acaa556b9f30dcab2b90aa235a670670ffc5dc49dfb58d89310000000000"}, {0x2, 0x1, "fcf98a102ec1"}]}}}}}}, 0x0) 04:34:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x3}}]}]}, 0x2c}}, 0x0) 04:34:44 executing program 4: syz_emit_ethernet(0x25e, &(0x7f0000000680)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4f8100", 0x228, 0x3a, 0xff, @local, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x2, 0xa, "a78ce5400659808000000000004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af1802"}, {0x0, 0x1, "080000000000000000000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0822a18b79f7c5eba31fb68b2d734a6671e27182aee4df24a4a5c6186c0d3baa75af390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5acaa556b9f30dcab2b90aa235a670670ffc5dc49dfb58d89310000000000"}, {0x2, 0x1, "fcf98a102ec1"}]}}}}}}, 0x0) [ 421.819509][ T3079] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 421.852930][ T8] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.920283][ T3089] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 421.959042][ T8] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 422.045858][ T8] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 422.647558][ T23] audit: type=1400 audit(1669782885.038:178): avc: denied { append } for pid=1413 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 422.669787][ T23] audit: type=1400 audit(1669782885.038:179): avc: denied { open } for pid=1413 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 422.692237][ T23] audit: type=1400 audit(1669782885.038:180): avc: denied { getattr } for pid=1413 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 422.759547][ T8] device hsr_slave_0 left promiscuous mode [ 422.768121][ T8] device hsr_slave_1 left promiscuous mode [ 422.788027][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 422.795534][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 422.818564][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 422.826021][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 422.848681][ T8] device bridge_slave_1 left promiscuous mode [ 422.854864][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.878406][ T8] device bridge_slave_0 left promiscuous mode [ 422.884650][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.910596][ T8] device veth1_macvtap left promiscuous mode [ 422.916657][ T8] device veth0_macvtap left promiscuous mode [ 422.922751][ T8] device veth1_vlan left promiscuous mode [ 422.928585][ T8] device veth0_vlan left promiscuous mode [ 423.102961][ T8] team0 (unregistering): Port device team_slave_1 removed [ 423.113855][ T8] team0 (unregistering): Port device team_slave_0 removed [ 423.124067][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 423.136315][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 423.170452][ T8] bond0 (unregistering): Released all slaves [ 423.597673][ T3150] chnl_net:caif_netlink_parms(): no params data found [ 423.673966][ T3150] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.681150][ T3150] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.691786][ T3150] device bridge_slave_0 entered promiscuous mode [ 423.699350][ T3150] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.706468][ T3150] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.714792][ T3150] device bridge_slave_1 entered promiscuous mode [ 423.735007][ T3150] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 423.748408][ T3150] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 423.768386][ T3150] team0: Port device team_slave_0 added [ 423.778882][ T3150] team0: Port device team_slave_1 added [ 423.811332][ T3150] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 423.818319][ T3150] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 423.844231][ T3150] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 423.856975][ T3150] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 423.863966][ T3150] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 423.889941][ T3150] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 423.932709][ T3150] device hsr_slave_0 entered promiscuous mode [ 423.942805][ T3150] device hsr_slave_1 entered promiscuous mode [ 423.949357][ T3150] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 423.958111][ T3150] Cannot create hsr debugfs directory [ 424.720013][ T3150] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 424.729069][ T3150] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 424.751219][ T3150] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 424.769943][ T3150] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 424.866586][ T3150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 424.882774][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 424.891042][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 424.909355][ T3150] 8021q: adding VLAN 0 to HW filter on device team0 [ 424.922826][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 424.934242][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 424.945965][ T1908] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.953028][ T1908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.969787][ T3066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 424.977781][ T3066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 424.989351][ T3066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 424.997989][ T3066] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.005082][ T3066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.016675][ T3066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 425.025951][ T3066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 425.036074][ T3066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 425.044718][ T3066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 425.056172][ T3066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 425.064984][ T3066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 425.079592][ T3150] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 425.089969][ T3150] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 425.105310][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 425.113451][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 425.123020][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 425.131708][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 425.142229][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 425.150753][ T3285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 425.225733][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 425.233462][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 425.243993][ T3150] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 425.257454][ T3285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 425.267595][ T3285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 425.366940][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 425.379660][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 425.390146][ T3150] device veth0_vlan entered promiscuous mode [ 425.399351][ T3150] device veth1_vlan entered promiscuous mode [ 425.407087][ T3285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 425.416578][ T3285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 425.425061][ T3285] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 425.443107][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 425.452344][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 425.461231][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 425.472260][ T3150] device veth0_macvtap entered promiscuous mode [ 425.482587][ T3150] device veth1_macvtap entered promiscuous mode [ 425.499719][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 425.510194][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.520059][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 425.530472][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.540447][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 425.550867][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.560696][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 425.571178][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.581085][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 425.591512][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.619356][ T3150] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 425.628284][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 425.636485][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 425.654366][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 425.668783][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 425.678314][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.688812][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.698626][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.709066][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.718911][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.729403][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.739543][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.750080][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.759950][ T3150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.770375][ T3150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.782566][ T3150] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 425.793633][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 425.803951][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 425.815588][ T3150] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.824354][ T3150] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.833055][ T3150] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.841907][ T3150] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 04:34:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000600)=0x1, 0x4) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f0000000180)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_ORIG={0x1c, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}]}]}, 0x80}}, 0x0) 04:34:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x18}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r2, @multicast1}, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}}, 0x0) 04:34:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x18}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r2, @multicast1}, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}}, 0x0) 04:34:48 executing program 5: r0 = syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x2, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @remote}}, 0x0) io_uring_enter(r0, 0x6fc2, 0x0, 0x0, 0x0, 0x0) [ 425.891249][ T23] audit: type=1400 audit(1669782888.288:181): avc: denied { setopt } for pid=3332 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 04:34:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCB={0x5, 0xb, 0xff}, @IFLA_MACSEC_PROTECT={0x5, 0xa}]}}}]}, 0x44}}, 0x0) 04:34:51 executing program 1: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r4, r2, 0x11, 0x0, r4}, 0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r1, r2, 0x11, 0x0, r1}, 0x11) 04:34:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x18}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r2, @multicast1}, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}}, 0x0) 04:34:51 executing program 5: r0 = syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x2, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @remote}}, 0x0) io_uring_enter(r0, 0x6fc2, 0x0, 0x0, 0x0, 0x0) 04:34:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x18}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r2, @multicast1}, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}}, 0x0) 04:34:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000600)=0x1, 0x4) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f0000000180)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_ORIG={0x1c, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}]}]}, 0x80}}, 0x0) 04:34:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x18}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r2, @multicast1}, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}}, 0x0) 04:34:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=@mangle={'mangle\x00', 0x1f, 0x7fffffe, 0x398, 0x1b0, 0x1b0, 0xc8, 0x0, 0x350, 0x438, 0x438, 0x438, 0x438, 0x438, 0x6, 0x0, {[{{@ip={@empty, @multicast2, 0x0, 0x0, '\x00', 'macvtap0\x00', {}, {}, 0x0, 0x0, 0x88}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @inet=@TOS={0x28}}, {{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_to_team\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f8) 04:34:51 executing program 5: r0 = syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x2, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @remote}}, 0x0) io_uring_enter(r0, 0x6fc2, 0x0, 0x0, 0x0, 0x0) 04:34:51 executing program 1: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r4, r2, 0x11, 0x0, r4}, 0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r1, r2, 0x11, 0x0, r1}, 0x11) 04:34:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000600)=0x1, 0x4) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f0000000180)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_ORIG={0x1c, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}]}]}, 0x80}}, 0x0) 04:34:51 executing program 5: r0 = syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x2, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @remote}}, 0x0) io_uring_enter(r0, 0x6fc2, 0x0, 0x0, 0x0, 0x0) 04:34:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCB={0x5, 0xb, 0xff}, @IFLA_MACSEC_PROTECT={0x5, 0xa}]}}}]}, 0x44}}, 0x0) 04:34:55 executing program 1: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r4, r2, 0x11, 0x0, r4}, 0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r1, r2, 0x11, 0x0, r1}, 0x11) 04:34:55 executing program 4: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r4, r2, 0x11, 0x0, r4}, 0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r1, r2, 0x11, 0x0, r1}, 0x11) 04:34:55 executing program 2: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)) 04:34:55 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x40, 0x5, 0x80, 0x9, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x7fff}, 0x491, 0x8001, 0x40, 0x2, 0x0, 0x383, 0x2, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r0}, 0x8) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x400, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000240), 0xf}, 0x0, 0x5, 0x9, 0x0, 0x40, 0x0, 0x9029, 0x0, 0x0, 0x0, 0x7cc}, r5, 0x0, r4, 0x1) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x4, 0x1, 0x81, 0x8, 0x0, 0x4, 0x100, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x1}, 0x8f0c0, 0x0, 0x8, 0x8, 0x68, 0x1ff, 0x7f, 0x0, 0x6, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, r2, 0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) 04:34:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=@mangle={'mangle\x00', 0x1f, 0x7fffffe, 0x398, 0x1b0, 0x1b0, 0xc8, 0x0, 0x350, 0x438, 0x438, 0x438, 0x438, 0x438, 0x6, 0x0, {[{{@ip={@empty, @multicast2, 0x0, 0x0, '\x00', 'macvtap0\x00', {}, {}, 0x0, 0x0, 0x88}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @inet=@TOS={0x28}}, {{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_to_team\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f8) 04:34:55 executing program 4: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r4, r2, 0x11, 0x0, r4}, 0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r1, r2, 0x11, 0x0, r1}, 0x11) 04:34:55 executing program 2: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)) [ 433.099550][ T23] audit: type=1400 audit(1669782895.498:182): avc: denied { read } for pid=3470 comm="syz-executor.2" name="event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 04:34:55 executing program 2: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)) 04:34:55 executing program 1: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r4, r2, 0x11, 0x0, r4}, 0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r1, r2, 0x11, 0x0, r1}, 0x11) [ 433.185336][ T23] audit: type=1400 audit(1669782895.528:183): avc: denied { open } for pid=3470 comm="syz-executor.2" path="/dev/input/event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 433.209800][ T23] audit: type=1400 audit(1669782895.528:184): avc: denied { ioctl } for pid=3470 comm="syz-executor.2" path="/dev/input/event0" dev="devtmpfs" ino=217 ioctlcmd=0x4580 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 04:34:55 executing program 2: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)) 04:34:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002500)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x2, 0x0) 04:34:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCB={0x5, 0xb, 0xff}, @IFLA_MACSEC_PROTECT={0x5, 0xa}]}}}]}, 0x44}}, 0x0) 04:34:57 executing program 4: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r4, r2, 0x11, 0x0, r4}, 0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r1, r2, 0x11, 0x0, r1}, 0x11) 04:34:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@initr0, @call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x8b, &(0x7f0000000bc0)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:34:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002500)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x2, 0x0) 04:34:57 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x40, 0x5, 0x80, 0x9, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x7fff}, 0x491, 0x8001, 0x40, 0x2, 0x0, 0x383, 0x2, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r0}, 0x8) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x400, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000240), 0xf}, 0x0, 0x5, 0x9, 0x0, 0x40, 0x0, 0x9029, 0x0, 0x0, 0x0, 0x7cc}, r5, 0x0, r4, 0x1) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x4, 0x1, 0x81, 0x8, 0x0, 0x4, 0x100, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x1}, 0x8f0c0, 0x0, 0x8, 0x8, 0x68, 0x1ff, 0x7f, 0x0, 0x6, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, r2, 0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) 04:34:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=@mangle={'mangle\x00', 0x1f, 0x7fffffe, 0x398, 0x1b0, 0x1b0, 0xc8, 0x0, 0x350, 0x438, 0x438, 0x438, 0x438, 0x438, 0x6, 0x0, {[{{@ip={@empty, @multicast2, 0x0, 0x0, '\x00', 'macvtap0\x00', {}, {}, 0x0, 0x0, 0x88}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @inet=@TOS={0x28}}, {{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_to_team\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f8) 04:34:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002500)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x2, 0x0) 04:34:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@initr0, @call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x8b, &(0x7f0000000bc0)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:34:57 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)={0x24, 0x2e, 0x31f, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="686c66bb13"]}]}, 0x24}], 0x1}, 0x0) 04:34:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002500)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x2, 0x0) 04:34:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@initr0, @call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x8b, &(0x7f0000000bc0)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:34:57 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)={0x24, 0x2e, 0x31f, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="686c66bb13"]}]}, 0x24}], 0x1}, 0x0) 04:35:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCB={0x5, 0xb, 0xff}, @IFLA_MACSEC_PROTECT={0x5, 0xa}]}}}]}, 0x44}}, 0x0) 04:35:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@initr0, @call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x8b, &(0x7f0000000bc0)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:07 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000040)={0x1, 0x4, 0x0, 0x0, @vifc_lcl_addr=@rand_addr=0x64010102, @multicast1}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000580)=0xe, 0x4) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=@ipv6_newnexthop={0x6c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x7}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_GROUP={0x2c, 0x2, [{0x2, 0x3}, {0x1, 0x7}, {0x2, 0x2}, {0x0, 0x1f}, {0x0, 0x3}]}]}, 0x6c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@getstats={0x1c, 0x5e, 0x1, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x4}}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x60842, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r7, 0x0) setsockopt$MRT_ADD_VIF(r7, 0x0, 0xca, &(0x7f0000000100)={0x1, 0x4, 0x80, 0xcc, @vifc_lcl_addr=@local, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@ipv6_newnexthop={0x54, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_GATEWAY={0x14, 0x6, @ip4=@loopback}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_OIF={0x8, 0x5, r6}]}, 0x54}}, 0x0) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x0, @vifc_lcl_ifindex=r6, @dev={0xac, 0x14, 0x14, 0x70}}, 0x10) 04:35:07 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)={0x24, 0x2e, 0x31f, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="686c66bb13"]}]}, 0x24}], 0x1}, 0x0) 04:35:07 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x40, 0x5, 0x80, 0x9, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x7fff}, 0x491, 0x8001, 0x40, 0x2, 0x0, 0x383, 0x2, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r0}, 0x8) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x400, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000240), 0xf}, 0x0, 0x5, 0x9, 0x0, 0x40, 0x0, 0x9029, 0x0, 0x0, 0x0, 0x7cc}, r5, 0x0, r4, 0x1) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x4, 0x1, 0x81, 0x8, 0x0, 0x4, 0x100, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x1}, 0x8f0c0, 0x0, 0x8, 0x8, 0x68, 0x1ff, 0x7f, 0x0, 0x6, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, r2, 0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) 04:35:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=@mangle={'mangle\x00', 0x1f, 0x7fffffe, 0x398, 0x1b0, 0x1b0, 0xc8, 0x0, 0x350, 0x438, 0x438, 0x438, 0x438, 0x438, 0x6, 0x0, {[{{@ip={@empty, @multicast2, 0x0, 0x0, '\x00', 'macvtap0\x00', {}, {}, 0x0, 0x0, 0x88}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @inet=@TOS={0x28}}, {{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_to_team\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f8) 04:35:08 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000480)=0x531ff64d24f964ef, 0x4) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6617}, 0x1c) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000dc0)=@newlink={0x44, 0x10, 0xffffff1f, 0x28c, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000380)=@bridge_delvlan={0x7c, 0x71, 0x100, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x50}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x1}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x9}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x9}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_MCAST_ROUTER={0x5, 0x6, 0x70}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x4c, 0x3}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x2, 0x1}}}]}, 0x7c}}, 0x80c1) sendmmsg$inet6(r0, &(0x7f0000001700)=[{{0x0, 0x10000480, 0x0, 0x0, 0x0, 0x0, 0xfc}, 0x1030000}], 0x40000000000035c, 0x0) r5 = fcntl$dupfd(r0, 0x406, r0) sendto$inet6(r5, &(0x7f0000000080)="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", 0x276, 0x40, 0x0, 0x0) 04:35:08 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)={0x24, 0x2e, 0x31f, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="686c66bb13"]}]}, 0x24}], 0x1}, 0x0) [ 445.605078][ T23] audit: type=1400 audit(1669782907.998:185): avc: denied { name_bind } for pid=3527 comm="syz-executor.2" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 04:35:08 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000040)={0x1, 0x4, 0x0, 0x0, @vifc_lcl_addr=@rand_addr=0x64010102, @multicast1}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000580)=0xe, 0x4) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=@ipv6_newnexthop={0x6c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x7}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_GROUP={0x2c, 0x2, [{0x2, 0x3}, {0x1, 0x7}, {0x2, 0x2}, {0x0, 0x1f}, {0x0, 0x3}]}]}, 0x6c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@getstats={0x1c, 0x5e, 0x1, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x4}}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x60842, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r7, 0x0) setsockopt$MRT_ADD_VIF(r7, 0x0, 0xca, &(0x7f0000000100)={0x1, 0x4, 0x80, 0xcc, @vifc_lcl_addr=@local, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@ipv6_newnexthop={0x54, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_GATEWAY={0x14, 0x6, @ip4=@loopback}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_OIF={0x8, 0x5, r6}]}, 0x54}}, 0x0) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x0, @vifc_lcl_ifindex=r6, @dev={0xac, 0x14, 0x14, 0x70}}, 0x10) [ 445.647835][ T3528] device gretap1 entered promiscuous mode 04:35:08 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000040)={0x1, 0x4, 0x0, 0x0, @vifc_lcl_addr=@rand_addr=0x64010102, @multicast1}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000580)=0xe, 0x4) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=@ipv6_newnexthop={0x6c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x7}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_GROUP={0x2c, 0x2, [{0x2, 0x3}, {0x1, 0x7}, {0x2, 0x2}, {0x0, 0x1f}, {0x0, 0x3}]}]}, 0x6c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@getstats={0x1c, 0x5e, 0x1, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x4}}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x60842, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r7, 0x0) setsockopt$MRT_ADD_VIF(r7, 0x0, 0xca, &(0x7f0000000100)={0x1, 0x4, 0x80, 0xcc, @vifc_lcl_addr=@local, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@ipv6_newnexthop={0x54, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_GATEWAY={0x14, 0x6, @ip4=@loopback}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_OIF={0x8, 0x5, r6}]}, 0x54}}, 0x0) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x0, @vifc_lcl_ifindex=r6, @dev={0xac, 0x14, 0x14, 0x70}}, 0x10) [ 445.764409][ T3528] ================================================================== [ 445.772514][ T3528] BUG: KCSAN: data-race in sit_tunnel_xmit / sit_tunnel_xmit [ 445.779880][ T3528] [ 445.782188][ T3528] read-write to 0xffff88812cf95158 of 8 bytes by task 3532 on cpu 1: [ 445.790237][ T3528] sit_tunnel_xmit+0x1be/0x1410 [ 445.795083][ T3528] xmit_one+0xc0/0x2a0 [ 445.799141][ T3528] dev_hard_start_xmit+0x72/0x120 [ 445.804156][ T3528] __dev_queue_xmit+0x91c/0x11c0 [ 445.809087][ T3528] neigh_connected_output+0x25c/0x2d0 [ 445.814452][ T3528] ip6_finish_output2+0xa12/0xc30 [ 445.819478][ T3528] ip6_finish_output+0x395/0x4f0 [ 445.824423][ T3528] ip6_output+0x10e/0x210 [ 445.828762][ T3528] ip6_local_out+0x60/0x80 [ 445.833181][ T3528] ip6_send_skb+0x43/0xf0 [ 445.837527][ T3528] udp_v6_send_skb+0x7ab/0xc00 [ 445.842290][ T3528] udpv6_sendmsg+0x1297/0x14a0 [ 445.847050][ T3528] inet6_sendmsg+0x5f/0x80 [ 445.851469][ T3528] ____sys_sendmsg+0x38f/0x500 [ 445.856234][ T3528] __sys_sendmmsg+0x27c/0x4a0 [ 445.860908][ T3528] __x64_sys_sendmmsg+0x53/0x60 [ 445.865748][ T3528] do_syscall_64+0x2b/0x70 [ 445.870153][ T3528] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 445.876037][ T3528] [ 445.878348][ T3528] read-write to 0xffff88812cf95158 of 8 bytes by task 3528 on cpu 0: [ 445.886397][ T3528] sit_tunnel_xmit+0x1be/0x1410 [ 445.891240][ T3528] xmit_one+0xc0/0x2a0 [ 445.895298][ T3528] dev_hard_start_xmit+0x72/0x120 [ 445.900313][ T3528] __dev_queue_xmit+0x91c/0x11c0 [ 445.905242][ T3528] neigh_connected_output+0x25c/0x2d0 [ 445.910607][ T3528] ip6_finish_output2+0xa12/0xc30 [ 445.915622][ T3528] ip6_finish_output+0x395/0x4f0 [ 445.920548][ T3528] ip6_output+0x10e/0x210 [ 445.924869][ T3528] ip6_local_out+0x60/0x80 [ 445.929280][ T3528] ip6_send_skb+0x43/0xf0 [ 445.933598][ T3528] udp_v6_send_skb+0x7ab/0xc00 [ 445.938357][ T3528] udpv6_sendmsg+0x1297/0x14a0 [ 445.943111][ T3528] inet6_sendmsg+0x5f/0x80 [ 445.947514][ T3528] __sys_sendto+0x22d/0x2d0 [ 445.952003][ T3528] __x64_sys_sendto+0x74/0x90 [ 445.956668][ T3528] do_syscall_64+0x2b/0x70 [ 445.961077][ T3528] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 445.966957][ T3528] [ 445.969264][ T3528] value changed: 0x00000000000000f7 -> 0x00000000000000f8 [ 445.976353][ T3528] [ 445.978659][ T3528] Reported by Kernel Concurrency Sanitizer on: [ 445.984791][ T3528] CPU: 0 PID: 3528 Comm: syz-executor.2 Not tainted 6.1.0-rc7-syzkaller-00101-g01f856ae6d0c-dirty #0 [ 445.995622][ T3528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 446.005680][ T3528] ================================================================== 04:35:08 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000040)={0x1, 0x4, 0x0, 0x0, @vifc_lcl_addr=@rand_addr=0x64010102, @multicast1}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000580)=0xe, 0x4) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=@ipv6_newnexthop={0x6c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x7}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_GROUP={0x2c, 0x2, [{0x2, 0x3}, {0x1, 0x7}, {0x2, 0x2}, {0x0, 0x1f}, {0x0, 0x3}]}]}, 0x6c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@getstats={0x1c, 0x5e, 0x1, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x4}}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x60842, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r7, 0x0) setsockopt$MRT_ADD_VIF(r7, 0x0, 0xca, &(0x7f0000000100)={0x1, 0x4, 0x80, 0xcc, @vifc_lcl_addr=@local, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@ipv6_newnexthop={0x54, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_GATEWAY={0x14, 0x6, @ip4=@loopback}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_OIF={0x8, 0x5, r6}]}, 0x54}}, 0x0) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x0, @vifc_lcl_ifindex=r6, @dev={0xac, 0x14, 0x14, 0x70}}, 0x10) 04:35:08 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000040)={0x1, 0x4, 0x0, 0x0, @vifc_lcl_addr=@rand_addr=0x64010102, @multicast1}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000580)=0xe, 0x4) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=@ipv6_newnexthop={0x6c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x7}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_GROUP={0x2c, 0x2, [{0x2, 0x3}, {0x1, 0x7}, {0x2, 0x2}, {0x0, 0x1f}, {0x0, 0x3}]}]}, 0x6c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@getstats={0x1c, 0x5e, 0x1, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x4}}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x60842, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r7, 0x0) setsockopt$MRT_ADD_VIF(r7, 0x0, 0xca, &(0x7f0000000100)={0x1, 0x4, 0x80, 0xcc, @vifc_lcl_addr=@local, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@ipv6_newnexthop={0x54, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_GATEWAY={0x14, 0x6, @ip4=@loopback}, @NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}, @NHA_OIF={0x8, 0x5, r6}]}, 0x54}}, 0x0) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x0, @vifc_lcl_ifindex=r6, @dev={0xac, 0x14, 0x14, 0x70}}, 0x10)