Warning: Permanently added '10.128.0.66' (ECDSA) to the list of known hosts. 2021/11/21 09:09:32 fuzzer started 2021/11/21 09:09:32 dialing manager at 10.128.0.163:46441 [ 18.877482][ T24] audit: type=1400 audit(1637485772.691:74): avc: denied { mounton } for pid=1805 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.879315][ T1805] cgroup: Unknown subsys name 'net' [ 18.900285][ T24] audit: type=1400 audit(1637485772.701:75): avc: denied { mount } for pid=1805 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.927858][ T24] audit: type=1400 audit(1637485772.721:76): avc: denied { unmount } for pid=1805 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.947815][ T1805] cgroup: Unknown subsys name 'devices' [ 18.953500][ T1805] cgroup: Unknown subsys name 'blkio' [ 19.079253][ T1805] cgroup: Unknown subsys name 'hugetlb' [ 19.085298][ T1805] cgroup: Unknown subsys name 'rlimit' 2021/11/21 09:09:33 syscalls: 2716 2021/11/21 09:09:33 code coverage: enabled 2021/11/21 09:09:33 comparison tracing: enabled 2021/11/21 09:09:33 extra coverage: enabled 2021/11/21 09:09:33 setuid sandbox: enabled 2021/11/21 09:09:33 namespace sandbox: enabled 2021/11/21 09:09:33 Android sandbox: enabled 2021/11/21 09:09:33 fault injection: enabled 2021/11/21 09:09:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/11/21 09:09:33 net packet injection: enabled 2021/11/21 09:09:33 net device setup: enabled 2021/11/21 09:09:33 concurrency sanitizer: enabled 2021/11/21 09:09:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/11/21 09:09:33 USB emulation: /dev/raw-gadget does not exist 2021/11/21 09:09:33 hci packet injection: /dev/vhci does not exist 2021/11/21 09:09:33 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/11/21 09:09:33 802.15.4 emulation: enabled [ 19.209147][ T24] audit: type=1400 audit(1637485773.031:77): avc: denied { mounton } for pid=1805 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.233931][ T24] audit: type=1400 audit(1637485773.041:78): avc: denied { mount } for pid=1805 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.257160][ T24] audit: type=1400 audit(1637485773.041:79): avc: denied { create } for pid=1805 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 19.277716][ T24] audit: type=1400 audit(1637485773.041:80): avc: denied { write } for pid=1805 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 19.298089][ T24] audit: type=1400 audit(1637485773.041:81): avc: denied { read } for pid=1805 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2021/11/21 09:09:33 suppressing KCSAN reports in functions: 'd_delete' '__xa_clear_mark' 'do_sys_poll' 'shmem_mknod' 'generic_write_end' 2021/11/21 09:09:33 fetching corpus: 0, signal 0/2000 (executing program) 2021/11/21 09:09:33 fetching corpus: 50, signal 17055/20653 (executing program) 2021/11/21 09:09:33 fetching corpus: 100, signal 25852/30904 (executing program) 2021/11/21 09:09:33 fetching corpus: 150, signal 30288/36846 (executing program) 2021/11/21 09:09:33 fetching corpus: 200, signal 36394/44237 (executing program) 2021/11/21 09:09:33 fetching corpus: 249, signal 39603/48787 (executing program) 2021/11/21 09:09:33 fetching corpus: 299, signal 43493/53888 (executing program) 2021/11/21 09:09:33 fetching corpus: 348, signal 47031/58549 (executing program) 2021/11/21 09:09:33 fetching corpus: 398, signal 50200/62815 (executing program) 2021/11/21 09:09:33 fetching corpus: 447, signal 52377/66156 (executing program) 2021/11/21 09:09:33 fetching corpus: 497, signal 54808/69626 (executing program) 2021/11/21 09:09:33 fetching corpus: 547, signal 56485/72400 (executing program) 2021/11/21 09:09:33 fetching corpus: 597, signal 58777/75650 (executing program) 2021/11/21 09:09:34 fetching corpus: 647, signal 60850/78706 (executing program) 2021/11/21 09:09:34 fetching corpus: 697, signal 62294/81120 (executing program) 2021/11/21 09:09:34 fetching corpus: 747, signal 64024/83745 (executing program) 2021/11/21 09:09:34 fetching corpus: 797, signal 66518/86946 (executing program) 2021/11/21 09:09:34 fetching corpus: 847, signal 68689/89858 (executing program) 2021/11/21 09:09:34 fetching corpus: 897, signal 69925/92000 (executing program) 2021/11/21 09:09:34 fetching corpus: 947, signal 71911/94659 (executing program) 2021/11/21 09:09:34 fetching corpus: 997, signal 73635/97066 (executing program) 2021/11/21 09:09:34 fetching corpus: 1047, signal 75454/99533 (executing program) 2021/11/21 09:09:34 fetching corpus: 1097, signal 76589/101449 (executing program) 2021/11/21 09:09:34 fetching corpus: 1146, signal 77798/103396 (executing program) 2021/11/21 09:09:34 fetching corpus: 1195, signal 79745/105808 (executing program) 2021/11/21 09:09:34 fetching corpus: 1245, signal 80999/107704 (executing program) 2021/11/21 09:09:34 fetching corpus: 1293, signal 82776/109894 (executing program) 2021/11/21 09:09:34 fetching corpus: 1342, signal 84147/111761 (executing program) 2021/11/21 09:09:34 fetching corpus: 1392, signal 85822/113855 (executing program) 2021/11/21 09:09:34 fetching corpus: 1441, signal 86628/115291 (executing program) 2021/11/21 09:09:34 fetching corpus: 1491, signal 87892/116995 (executing program) 2021/11/21 09:09:34 fetching corpus: 1540, signal 89212/118763 (executing program) 2021/11/21 09:09:34 fetching corpus: 1590, signal 90553/120532 (executing program) 2021/11/21 09:09:34 fetching corpus: 1640, signal 91822/122162 (executing program) 2021/11/21 09:09:34 fetching corpus: 1690, signal 92570/123491 (executing program) 2021/11/21 09:09:34 fetching corpus: 1740, signal 93495/124936 (executing program) 2021/11/21 09:09:35 fetching corpus: 1790, signal 95196/126782 (executing program) 2021/11/21 09:09:35 fetching corpus: 1840, signal 96127/128166 (executing program) 2021/11/21 09:09:35 fetching corpus: 1890, signal 97955/129922 (executing program) 2021/11/21 09:09:35 fetching corpus: 1940, signal 98765/131194 (executing program) 2021/11/21 09:09:35 fetching corpus: 1990, signal 99686/132472 (executing program) 2021/11/21 09:09:35 fetching corpus: 2040, signal 100429/133646 (executing program) 2021/11/21 09:09:35 fetching corpus: 2090, signal 101310/134835 (executing program) 2021/11/21 09:09:35 fetching corpus: 2140, signal 102031/135978 (executing program) 2021/11/21 09:09:35 fetching corpus: 2190, signal 102779/137114 (executing program) 2021/11/21 09:09:35 fetching corpus: 2240, signal 103332/138155 (executing program) 2021/11/21 09:09:35 fetching corpus: 2290, signal 105063/139668 (executing program) 2021/11/21 09:09:35 fetching corpus: 2340, signal 106003/140763 (executing program) 2021/11/21 09:09:35 fetching corpus: 2390, signal 106828/141816 (executing program) 2021/11/21 09:09:35 fetching corpus: 2440, signal 107527/142808 (executing program) 2021/11/21 09:09:35 fetching corpus: 2490, signal 108146/143763 (executing program) 2021/11/21 09:09:35 fetching corpus: 2540, signal 109007/144807 (executing program) 2021/11/21 09:09:35 fetching corpus: 2590, signal 109488/145647 (executing program) 2021/11/21 09:09:35 fetching corpus: 2639, signal 110165/146570 (executing program) 2021/11/21 09:09:35 fetching corpus: 2689, signal 110662/147395 (executing program) 2021/11/21 09:09:35 fetching corpus: 2739, signal 111320/148284 (executing program) 2021/11/21 09:09:35 fetching corpus: 2789, signal 112553/149308 (executing program) 2021/11/21 09:09:35 fetching corpus: 2839, signal 113788/150312 (executing program) 2021/11/21 09:09:35 fetching corpus: 2889, signal 114931/151293 (executing program) 2021/11/21 09:09:35 fetching corpus: 2939, signal 115380/152036 (executing program) 2021/11/21 09:09:36 fetching corpus: 2989, signal 116072/152800 (executing program) 2021/11/21 09:09:36 fetching corpus: 3039, signal 117134/153675 (executing program) 2021/11/21 09:09:36 fetching corpus: 3089, signal 117634/154363 (executing program) 2021/11/21 09:09:36 fetching corpus: 3139, signal 120192/155574 (executing program) 2021/11/21 09:09:36 fetching corpus: 3189, signal 121246/156398 (executing program) 2021/11/21 09:09:36 fetching corpus: 3239, signal 121809/157047 (executing program) 2021/11/21 09:09:36 fetching corpus: 3289, signal 122459/157683 (executing program) 2021/11/21 09:09:36 fetching corpus: 3339, signal 123333/158361 (executing program) 2021/11/21 09:09:36 fetching corpus: 3389, signal 124425/159052 (executing program) 2021/11/21 09:09:36 fetching corpus: 3438, signal 125198/159669 (executing program) 2021/11/21 09:09:36 fetching corpus: 3488, signal 125873/160248 (executing program) 2021/11/21 09:09:36 fetching corpus: 3538, signal 126460/160822 (executing program) 2021/11/21 09:09:36 fetching corpus: 3587, signal 126981/161360 (executing program) 2021/11/21 09:09:36 fetching corpus: 3637, signal 127826/161893 (executing program) 2021/11/21 09:09:36 fetching corpus: 3685, signal 128326/162430 (executing program) 2021/11/21 09:09:36 fetching corpus: 3735, signal 129362/162958 (executing program) 2021/11/21 09:09:36 fetching corpus: 3785, signal 129974/163478 (executing program) 2021/11/21 09:09:36 fetching corpus: 3835, signal 130646/163961 (executing program) 2021/11/21 09:09:36 fetching corpus: 3885, signal 131364/164439 (executing program) 2021/11/21 09:09:36 fetching corpus: 3935, signal 132190/164887 (executing program) 2021/11/21 09:09:36 fetching corpus: 3984, signal 132599/165287 (executing program) 2021/11/21 09:09:36 fetching corpus: 4034, signal 132985/165666 (executing program) 2021/11/21 09:09:37 fetching corpus: 4084, signal 133679/166095 (executing program) 2021/11/21 09:09:37 fetching corpus: 4134, signal 134213/166120 (executing program) 2021/11/21 09:09:37 fetching corpus: 4183, signal 134575/166120 (executing program) 2021/11/21 09:09:37 fetching corpus: 4233, signal 135107/166121 (executing program) 2021/11/21 09:09:37 fetching corpus: 4283, signal 135825/166121 (executing program) 2021/11/21 09:09:37 fetching corpus: 4332, signal 136281/166121 (executing program) 2021/11/21 09:09:37 fetching corpus: 4382, signal 136874/166121 (executing program) 2021/11/21 09:09:37 fetching corpus: 4432, signal 137164/166121 (executing program) 2021/11/21 09:09:37 fetching corpus: 4481, signal 137785/166121 (executing program) 2021/11/21 09:09:37 fetching corpus: 4531, signal 138669/166121 (executing program) 2021/11/21 09:09:37 fetching corpus: 4581, signal 138938/166121 (executing program) 2021/11/21 09:09:37 fetching corpus: 4630, signal 139682/166121 (executing program) 2021/11/21 09:09:37 fetching corpus: 4679, signal 140288/166125 (executing program) 2021/11/21 09:09:37 fetching corpus: 4729, signal 140816/166127 (executing program) 2021/11/21 09:09:37 fetching corpus: 4779, signal 141266/166127 (executing program) 2021/11/21 09:09:37 fetching corpus: 4829, signal 141825/166127 (executing program) 2021/11/21 09:09:37 fetching corpus: 4879, signal 142230/166129 (executing program) 2021/11/21 09:09:37 fetching corpus: 4929, signal 142767/166129 (executing program) 2021/11/21 09:09:37 fetching corpus: 4978, signal 143170/166130 (executing program) 2021/11/21 09:09:37 fetching corpus: 5028, signal 143574/166130 (executing program) 2021/11/21 09:09:37 fetching corpus: 5078, signal 144139/166130 (executing program) 2021/11/21 09:09:37 fetching corpus: 5128, signal 144872/166130 (executing program) 2021/11/21 09:09:37 fetching corpus: 5178, signal 145527/166156 (executing program) 2021/11/21 09:09:37 fetching corpus: 5227, signal 146116/166156 (executing program) 2021/11/21 09:09:37 fetching corpus: 5277, signal 146469/166156 (executing program) 2021/11/21 09:09:38 fetching corpus: 5326, signal 147197/166156 (executing program) 2021/11/21 09:09:38 fetching corpus: 5376, signal 147832/166156 (executing program) 2021/11/21 09:09:38 fetching corpus: 5425, signal 148093/166164 (executing program) 2021/11/21 09:09:38 fetching corpus: 5475, signal 148774/166167 (executing program) 2021/11/21 09:09:38 fetching corpus: 5525, signal 149194/166167 (executing program) 2021/11/21 09:09:38 fetching corpus: 5575, signal 149861/166167 (executing program) 2021/11/21 09:09:38 fetching corpus: 5625, signal 150309/166167 (executing program) 2021/11/21 09:09:38 fetching corpus: 5675, signal 150682/166172 (executing program) 2021/11/21 09:09:38 fetching corpus: 5725, signal 151130/166182 (executing program) 2021/11/21 09:09:38 fetching corpus: 5775, signal 151771/166182 (executing program) 2021/11/21 09:09:38 fetching corpus: 5824, signal 152232/166190 (executing program) 2021/11/21 09:09:38 fetching corpus: 5874, signal 152643/166209 (executing program) 2021/11/21 09:09:38 fetching corpus: 5924, signal 153094/166209 (executing program) 2021/11/21 09:09:38 fetching corpus: 5974, signal 153463/166209 (executing program) 2021/11/21 09:09:38 fetching corpus: 6024, signal 153902/166209 (executing program) 2021/11/21 09:09:38 fetching corpus: 6074, signal 154315/166218 (executing program) 2021/11/21 09:09:38 fetching corpus: 6124, signal 154831/166218 (executing program) 2021/11/21 09:09:38 fetching corpus: 6173, signal 155300/166224 (executing program) 2021/11/21 09:09:38 fetching corpus: 6223, signal 155782/166307 (executing program) 2021/11/21 09:09:38 fetching corpus: 6272, signal 156368/166310 (executing program) 2021/11/21 09:09:38 fetching corpus: 6322, signal 156828/166316 (executing program) 2021/11/21 09:09:38 fetching corpus: 6372, signal 157304/166316 (executing program) 2021/11/21 09:09:38 fetching corpus: 6422, signal 157738/166316 (executing program) 2021/11/21 09:09:38 fetching corpus: 6472, signal 158002/166327 (executing program) 2021/11/21 09:09:39 fetching corpus: 6522, signal 158764/166327 (executing program) 2021/11/21 09:09:39 fetching corpus: 6572, signal 159116/166334 (executing program) 2021/11/21 09:09:39 fetching corpus: 6622, signal 159662/166346 (executing program) 2021/11/21 09:09:39 fetching corpus: 6672, signal 160251/166348 (executing program) 2021/11/21 09:09:39 fetching corpus: 6722, signal 160766/166351 (executing program) 2021/11/21 09:09:39 fetching corpus: 6772, signal 161238/166351 (executing program) 2021/11/21 09:09:39 fetching corpus: 6822, signal 161570/166429 (executing program) 2021/11/21 09:09:39 fetching corpus: 6871, signal 161875/166429 (executing program) 2021/11/21 09:09:39 fetching corpus: 6921, signal 162378/166429 (executing program) 2021/11/21 09:09:39 fetching corpus: 6971, signal 162749/166429 (executing program) 2021/11/21 09:09:39 fetching corpus: 7021, signal 163204/166429 (executing program) 2021/11/21 09:09:39 fetching corpus: 7071, signal 163556/166429 (executing program) 2021/11/21 09:09:39 fetching corpus: 7100, signal 163902/166430 (executing program) 2021/11/21 09:09:39 fetching corpus: 7100, signal 163902/166430 (executing program) 2021/11/21 09:09:41 starting 6 fuzzer processes 09:09:41 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f00000000c0)=0x1, 0xd, 0x0, 0x0, 0x0, 0x0) 09:09:41 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0xf) 09:09:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/24, &(0x7f0000000040)=0x18) 09:09:41 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = dup2(r0, r1) setsockopt(r1, 0x10d, 0xf, &(0x7f00001c9fff)="03", 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x32d1) r3 = socket$inet_dccp(0x2, 0x6, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x5, 0x6) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) sendmmsg(r3, &(0x7f0000007680)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000240)='T', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f00000038c0)="da", 0x1}], 0x1}}], 0x2, 0x0) 09:09:41 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xb, 0x0, 0x0) 09:09:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/248, 0xf8}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, 0x1, 0x0) [ 27.318805][ T24] audit: type=1400 audit(1637485781.141:82): avc: denied { execmem } for pid=1812 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.413020][ T24] audit: type=1400 audit(1637485781.231:83): avc: denied { read } for pid=1817 comm="syz-executor.1" dev="nsfs" ino=4026531992 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 27.458376][ T24] audit: type=1400 audit(1637485781.251:84): avc: denied { open } for pid=1817 comm="syz-executor.1" path="net:[4026531992]" dev="nsfs" ino=4026531992 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 27.481826][ T24] audit: type=1400 audit(1637485781.251:85): avc: denied { mounton } for pid=1817 comm="syz-executor.1" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 27.503385][ T24] audit: type=1400 audit(1637485781.251:86): avc: denied { module_request } for pid=1817 comm="syz-executor.1" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 27.525209][ T24] audit: type=1400 audit(1637485781.271:87): avc: denied { sys_module } for pid=1817 comm="syz-executor.1" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 27.801689][ T1822] chnl_net:caif_netlink_parms(): no params data found [ 27.889191][ T1822] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.896232][ T1822] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.903861][ T1822] device bridge_slave_0 entered promiscuous mode [ 27.938487][ T1822] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.945525][ T1822] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.952981][ T1822] device bridge_slave_1 entered promiscuous mode [ 27.965987][ T1835] chnl_net:caif_netlink_parms(): no params data found [ 27.987239][ T1822] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.010198][ T1826] chnl_net:caif_netlink_parms(): no params data found [ 28.020423][ T1845] chnl_net:caif_netlink_parms(): no params data found [ 28.031684][ T1822] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.080612][ T1822] team0: Port device team_slave_0 added [ 28.088122][ T1822] team0: Port device team_slave_1 added [ 28.097353][ T1817] chnl_net:caif_netlink_parms(): no params data found [ 28.132966][ T1835] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.140154][ T1835] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.147710][ T1835] device bridge_slave_0 entered promiscuous mode [ 28.175350][ T1835] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.182464][ T1835] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.190107][ T1835] device bridge_slave_1 entered promiscuous mode [ 28.203164][ T1820] chnl_net:caif_netlink_parms(): no params data found [ 28.211924][ T1822] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.218941][ T1822] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.244842][ T1822] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.257599][ T1822] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.264565][ T1822] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.290554][ T1822] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.316304][ T1835] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.328483][ T1835] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.341837][ T1845] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.348957][ T1845] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.356365][ T1845] device bridge_slave_0 entered promiscuous mode [ 28.363384][ T1826] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.370427][ T1826] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.377791][ T1826] device bridge_slave_0 entered promiscuous mode [ 28.401007][ T1845] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.408165][ T1845] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.416135][ T1845] device bridge_slave_1 entered promiscuous mode [ 28.423539][ T1826] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.430654][ T1826] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.438664][ T1826] device bridge_slave_1 entered promiscuous mode [ 28.457629][ T1835] team0: Port device team_slave_0 added [ 28.481964][ T1822] device hsr_slave_0 entered promiscuous mode [ 28.488700][ T1822] device hsr_slave_1 entered promiscuous mode [ 28.495675][ T1835] team0: Port device team_slave_1 added [ 28.507618][ T1845] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.517721][ T1826] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.527092][ T1817] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.534209][ T1817] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.541746][ T1817] device bridge_slave_0 entered promiscuous mode [ 28.566353][ T1845] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.576098][ T1826] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.588714][ T1817] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.595805][ T1817] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.603262][ T1817] device bridge_slave_1 entered promiscuous mode [ 28.613987][ T1820] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.621047][ T1820] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.628538][ T1820] device bridge_slave_0 entered promiscuous mode [ 28.650826][ T1835] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.657755][ T1835] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.683779][ T1835] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.694517][ T1820] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.701562][ T1820] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.709237][ T1820] device bridge_slave_1 entered promiscuous mode [ 28.719992][ T1826] team0: Port device team_slave_0 added [ 28.726472][ T1817] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.739984][ T1835] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.746925][ T1835] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.772901][ T1835] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.788583][ T1826] team0: Port device team_slave_1 added [ 28.794745][ T1845] team0: Port device team_slave_0 added [ 28.801213][ T1817] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.826486][ T1845] team0: Port device team_slave_1 added [ 28.847291][ T1820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.867363][ T1817] team0: Port device team_slave_0 added [ 28.881355][ T1820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.890661][ T1826] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.897579][ T1826] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.923481][ T1826] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.935849][ T1845] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.942794][ T1845] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.968731][ T1845] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.979962][ T1817] team0: Port device team_slave_1 added [ 28.987304][ T1835] device hsr_slave_0 entered promiscuous mode [ 28.993857][ T1835] device hsr_slave_1 entered promiscuous mode [ 29.000267][ T1835] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.007785][ T1835] Cannot create hsr debugfs directory [ 29.022700][ T1826] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.029774][ T1826] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.055688][ T1826] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.066494][ T1845] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.073457][ T1845] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.099660][ T1845] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.126317][ T1820] team0: Port device team_slave_0 added [ 29.133084][ T1820] team0: Port device team_slave_1 added [ 29.139124][ T1817] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.146088][ T1817] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.172068][ T1817] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.203276][ T1817] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.210256][ T1817] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.236257][ T1817] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.263383][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.270483][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.296370][ T1820] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.312305][ T1826] device hsr_slave_0 entered promiscuous mode [ 29.318834][ T1826] device hsr_slave_1 entered promiscuous mode [ 29.325266][ T1826] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.333046][ T1826] Cannot create hsr debugfs directory [ 29.340157][ T1845] device hsr_slave_0 entered promiscuous mode [ 29.346609][ T1845] device hsr_slave_1 entered promiscuous mode [ 29.353868][ T1845] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.361442][ T1845] Cannot create hsr debugfs directory [ 29.372279][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.379220][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.405086][ T1820] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.434618][ T1817] device hsr_slave_0 entered promiscuous mode [ 29.441098][ T1817] device hsr_slave_1 entered promiscuous mode [ 29.447381][ T1817] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.455147][ T1817] Cannot create hsr debugfs directory [ 29.473300][ T1820] device hsr_slave_0 entered promiscuous mode [ 29.479810][ T1820] device hsr_slave_1 entered promiscuous mode [ 29.486163][ T1820] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.494622][ T1820] Cannot create hsr debugfs directory [ 29.504497][ T1822] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.513428][ T1822] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.528138][ T1822] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.537415][ T1822] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.593601][ T1835] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 29.607340][ T1835] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 29.621814][ T1835] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 29.632409][ T1835] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 29.675864][ T1845] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.689657][ T1845] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.702382][ T1845] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.711076][ T1845] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.731189][ T1822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.753734][ T1822] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.765003][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.772827][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.792185][ T1835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.799739][ T1826] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.808697][ T1826] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.816982][ T1826] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.829022][ T1817] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.837912][ T1817] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.854170][ T1835] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.861670][ T1826] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.875374][ T1817] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.888959][ T1817] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.902784][ T1822] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.913286][ T1822] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.924462][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.933060][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.941275][ T1909] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.948429][ T1909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.956103][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.963905][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.971664][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.980288][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.988649][ T1909] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.995673][ T1909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.003402][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.011806][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.020082][ T1909] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.027083][ T1909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.034786][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.043126][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.051416][ T1909] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.058581][ T1909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.066183][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.074794][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.083461][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.092039][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.100668][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.109140][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.117826][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.126278][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.126427][ T24] audit: type=1400 audit(1637485783.941:88): avc: denied { remove_name } for pid=1421 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 30.134797][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.156586][ T24] audit: type=1400 audit(1637485783.941:89): avc: denied { rename } for pid=1421 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 30.186897][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.195243][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.203535][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.213570][ T1845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.222263][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.230039][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.237739][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.245754][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.258572][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.266902][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.275901][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.286377][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.294959][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.303160][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.311462][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.319756][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.333881][ T1845] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.341345][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.349492][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.356934][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.364649][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.372292][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.388590][ T1820] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.397927][ T1820] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.406299][ T1835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.417445][ T1820] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.425851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.434473][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.442778][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.449834][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.457451][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.466054][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.474253][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.481272][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.501036][ T1822] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.513658][ T1820] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.521965][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.530836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.539696][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.548481][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.556662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.565247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.573489][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.597177][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.605090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.613359][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.621514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.628894][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.639671][ T1817] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.654831][ T1835] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.662464][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.670994][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.681542][ T1845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.692331][ T1817] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.702144][ T1826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.715304][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.723123][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.730982][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.739620][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.765024][ T1826] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.774466][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.783521][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.791726][ T1911] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.798848][ T1911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.806655][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.815101][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.823633][ T1911] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.830737][ T1911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.838897][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.847587][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.856205][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.864686][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.873077][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.880688][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.888006][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.896466][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.905061][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.913231][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.921415][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.929676][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.937859][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.945564][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.954303][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.961974][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.970745][ T1845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.001585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.010416][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.019766][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.026808][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.034847][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.043319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.051700][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.058731][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.066485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 31.075153][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 31.083721][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 31.092283][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 31.100735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 31.109317][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 31.117770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.126252][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.134525][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.143157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.151764][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.159681][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 31.170613][ T1817] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.179930][ T1820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.193075][ T1822] device veth0_vlan entered promiscuous mode [ 31.208976][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 31.216391][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 31.224105][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.232256][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.240821][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.248952][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.261348][ T1820] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.274614][ T1826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 31.284374][ T1822] device veth1_vlan entered promiscuous mode [ 31.294229][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.302051][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.309804][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.317856][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.325717][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.333283][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.341940][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.350326][ T1911] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.357332][ T1911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.365112][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.373683][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.382290][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.390855][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.399355][ T1911] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.406415][ T1911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.419962][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.427914][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 31.436820][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 31.445462][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 31.453922][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 31.462447][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 31.475623][ T1835] device veth0_vlan entered promiscuous mode [ 31.494097][ T1820] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.504519][ T1820] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.517454][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.525690][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.534007][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.542571][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.551290][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 31.559713][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 31.568215][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.576535][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.585062][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.593598][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.601812][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.609588][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.617844][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 31.629410][ T1835] device veth1_vlan entered promiscuous mode [ 31.643455][ T1822] device veth0_macvtap entered promiscuous mode [ 31.651808][ T1822] device veth1_macvtap entered promiscuous mode [ 31.663178][ T1820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.676498][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 31.684879][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.692812][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 31.700442][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 31.707777][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.716426][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.724879][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.732998][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 31.740421][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 31.747937][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.767992][ T1817] device veth0_vlan entered promiscuous mode [ 31.776579][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 31.784615][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.792671][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.802355][ T1826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.819500][ T1822] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.827267][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.834966][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.842701][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.851216][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.870916][ T1817] device veth1_vlan entered promiscuous mode [ 31.878578][ T1822] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.886859][ T1822] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.895615][ T1822] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.905098][ T1822] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.913829][ T1822] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.925739][ T1835] device veth0_macvtap entered promiscuous mode [ 31.932550][ T1845] device veth0_vlan entered promiscuous mode [ 31.940016][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.947957][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.956630][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.965249][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.973414][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.981940][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.990622][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.998988][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.007553][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.016271][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.024645][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.039790][ T1817] device veth0_macvtap entered promiscuous mode [ 32.054461][ T1835] device veth1_macvtap entered promiscuous mode [ 32.064984][ T1845] device veth1_vlan entered promiscuous mode [ 32.072841][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 32.080866][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.089551][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.097081][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 32.105048][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.113136][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.121154][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.129607][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.138058][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.148579][ T1817] device veth1_macvtap entered promiscuous mode [ 32.171662][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.182118][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.193009][ T1835] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.208752][ T1845] device veth0_macvtap entered promiscuous mode [ 32.220710][ T1817] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.231246][ T1817] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.241046][ T1817] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.251438][ T1817] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.262042][ T1817] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.269363][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.277427][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.285921][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.294600][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.303269][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.311584][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.320011][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.328585][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.337850][ T1820] device veth0_vlan entered promiscuous mode [ 32.348126][ T1820] device veth1_vlan entered promiscuous mode [ 32.356407][ T24] audit: type=1400 audit(1637485786.171:90): avc: denied { mounton } for pid=1822 comm="syz-executor.2" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 32.356731][ T1845] device veth1_macvtap entered promiscuous mode [ 32.390245][ T1817] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.400724][ T1817] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.411641][ T1817] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.418996][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.427359][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.435014][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 32.442910][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.450920][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.458756][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.466809][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.475439][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.483770][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.492829][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.503317][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.513188][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.523640][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.534701][ T1835] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.543078][ T1826] device veth0_vlan entered promiscuous mode [ 32.553526][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.563995][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.573843][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.584272][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.594069][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.604541][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.615267][ T1845] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.624203][ T1817] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.632938][ T1817] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.641665][ T1817] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.650554][ T1817] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.663996][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.665847][ T24] audit: type=1400 audit(1637485786.481:91): avc: denied { read write } for pid=1822 comm="syz-executor.2" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.671715][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.703680][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.706749][ T24] audit: type=1400 audit(1637485786.511:92): avc: denied { open } for pid=1822 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.729069][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.738095][ T24] audit: type=1400 audit(1637485786.511:93): avc: denied { ioctl } for pid=1822 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.753446][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 09:09:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = dup2(r0, r1) setsockopt(r1, 0x10d, 0xf, &(0x7f00001c9fff)="03", 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x32d1) r3 = socket$inet_dccp(0x2, 0x6, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x5, 0x6) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) sendmmsg(r3, &(0x7f0000007680)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000240)='T', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f00000038c0)="da", 0x1}], 0x1}}], 0x2, 0x0) [ 32.771664][ T24] audit: type=1400 audit(1637485786.531:94): avc: denied { create } for pid=1967 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 32.799466][ T24] audit: type=1400 audit(1637485786.531:95): avc: denied { setopt } for pid=1967 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 32.800128][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.819181][ T24] audit: type=1400 audit(1637485786.531:96): avc: denied { bind } for pid=1967 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 32.837148][ T1820] device veth0_macvtap entered promiscuous mode [ 32.846724][ T24] audit: type=1400 audit(1637485786.531:97): avc: denied { name_bind } for pid=1967 comm="syz-executor.2" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 32.874085][ T24] audit: type=1400 audit(1637485786.531:98): avc: denied { node_bind } for pid=1967 comm="syz-executor.2" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 [ 32.876902][ T1835] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.895037][ T24] audit: type=1400 audit(1637485786.531:99): avc: denied { listen } for pid=1967 comm="syz-executor.2" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 32.924423][ T1835] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.933199][ T1835] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 09:09:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = dup2(r0, r1) setsockopt(r1, 0x10d, 0xf, &(0x7f00001c9fff)="03", 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x32d1) r3 = socket$inet_dccp(0x2, 0x6, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x5, 0x6) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) sendmmsg(r3, &(0x7f0000007680)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000240)='T', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f00000038c0)="da", 0x1}], 0x1}}], 0x2, 0x0) 09:09:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = dup2(r0, r1) setsockopt(r1, 0x10d, 0xf, &(0x7f00001c9fff)="03", 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x32d1) r3 = socket$inet_dccp(0x2, 0x6, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x5, 0x6) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) sendmmsg(r3, &(0x7f0000007680)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000240)='T', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f00000038c0)="da", 0x1}], 0x1}}], 0x2, 0x0) [ 32.941906][ T1835] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.956236][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.966723][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.976545][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 09:09:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = dup2(r0, r1) setsockopt(r1, 0x10d, 0xf, &(0x7f00001c9fff)="03", 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x32d1) r3 = socket$inet_dccp(0x2, 0x6, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x5, 0x6) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) sendmmsg(r3, &(0x7f0000007680)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000240)='T', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f00000038c0)="da", 0x1}], 0x1}}], 0x2, 0x0) 09:09:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = dup2(r0, r1) setsockopt(r1, 0x10d, 0xf, &(0x7f00001c9fff)="03", 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x32d1) r3 = socket$inet_dccp(0x2, 0x6, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x5, 0x6) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) sendmmsg(r3, &(0x7f0000007680)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000240)='T', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f00000038c0)="da", 0x1}], 0x1}}], 0x2, 0x0) [ 32.987197][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.997009][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.007469][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.020463][ T1845] batman_adv: batadv0: Interface activated: batadv_slave_1 09:09:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = dup2(r0, r1) setsockopt(r1, 0x10d, 0xf, &(0x7f00001c9fff)="03", 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x32d1) r3 = socket$inet_dccp(0x2, 0x6, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x5, 0x6) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) sendmmsg(r3, &(0x7f0000007680)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000240)='T', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f00000038c0)="da", 0x1}], 0x1}}], 0x2, 0x0) [ 33.040554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 33.053076][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.062894][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.071589][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.083112][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.092639][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 33.103449][ T1820] device veth1_macvtap entered promiscuous mode [ 33.117480][ T1845] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.126345][ T1845] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.135049][ T1845] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.143901][ T1845] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.157673][ T1826] device veth1_vlan entered promiscuous mode [ 33.182044][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.192772][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.202630][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.213042][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.222840][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.233458][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.243259][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.253738][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.266439][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.277825][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.288425][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.298263][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.308825][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.318767][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.329271][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.339243][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.349654][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.360586][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.372048][ T1820] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.380956][ T1820] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.389720][ T1820] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.398419][ T1820] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.408429][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.417096][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.431029][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.440750][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.457578][ T1826] device veth0_macvtap entered promiscuous mode [ 33.484153][ T1826] device veth1_macvtap entered promiscuous mode [ 33.491353][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.505326][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.514138][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.522765][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 33.554556][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.565241][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.575070][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.585473][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.595374][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.605788][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.615630][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.626050][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.635846][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.646259][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.659386][ T1826] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.675201][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.685668][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.695488][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.705905][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.715713][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.726211][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.736019][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.746480][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.756292][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.766710][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.777639][ T1826] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.786165][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.795002][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.804556][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.813495][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.840732][ T1826] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.849507][ T1826] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.858190][ T1826] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.866931][ T1826] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 09:09:48 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f00000000c0)=0x1, 0xd, 0x0, 0x0, 0x0, 0x0) 09:09:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0xf) 09:09:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/24, &(0x7f0000000040)=0x18) 09:09:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/248, 0xf8}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, 0x1, 0x0) 09:09:48 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xb, 0x0, 0x0) 09:09:48 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xb, 0x0, 0x0) 09:09:49 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0xf) 09:09:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/24, &(0x7f0000000040)=0x18) 09:09:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/248, 0xf8}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, 0x1, 0x0) 09:09:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xb, 0x0, 0x0) 09:09:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:50 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f00000000c0)=0x1, 0xd, 0x0, 0x0, 0x0, 0x0) 09:09:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0xf) 09:09:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/24, &(0x7f0000000040)=0x18) 09:09:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/248, 0xf8}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, 0x1, 0x0) 09:09:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/248, 0xf8}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, 0x1, 0x0) 09:09:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:51 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f00000000c0)=0x1, 0xd, 0x0, 0x0, 0x0, 0x0) 09:09:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/248, 0xf8}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, 0x1, 0x0) 09:09:51 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) 09:09:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000050002000a000000140009000000000000000000000200000000000106000a00000f"], 0x38}}, 0x0) 09:09:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x81}, {0x6}]}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000000)=0xc2) sendmmsg(r0, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000006c0)="6861f362", 0x6168}], 0x1}}], 0x1, 0x0) 09:09:51 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80003200) r3 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r3, 0x0) sendfile(r0, r3, 0x0, 0x200fff) 09:09:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000050002000a000000140009000000000000000000000200000000000106000a00000f"], 0x38}}, 0x0) 09:09:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000050002000a000000140009000000000000000000000200000000000106000a00000f"], 0x38}}, 0x0) 09:09:51 executing program 4: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 09:09:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/248, 0xf8}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, 0x1, 0x0) [ 37.360249][ T24] kauditd_printk_skb: 7 callbacks suppressed [ 37.360262][ T24] audit: type=1326 audit(1637485791.181:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2065 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7facd92baae9 code=0x0 [ 37.437501][ T24] audit: type=1400 audit(1637485791.251:108): avc: denied { create } for pid=2075 comm="syz-executor.4" dev="anon_inodefs" ino=16742 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 09:09:51 executing program 4: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 09:09:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000050002000a000000140009000000000000000000000200000000000106000a00000f"], 0x38}}, 0x0) [ 37.472854][ T24] audit: type=1400 audit(1637485791.281:109): avc: denied { map } for pid=2075 comm="syz-executor.4" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=16742 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 37.497686][ T24] audit: type=1400 audit(1637485791.281:110): avc: denied { read write } for pid=2075 comm="syz-executor.4" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=16742 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 09:09:52 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) 09:09:52 executing program 5: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 09:09:52 executing program 2: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 09:09:52 executing program 4: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 09:09:52 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80003200) r3 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r3, 0x0) sendfile(r0, r3, 0x0, 0x200fff) [ 38.193581][ T24] audit: type=1326 audit(1637485792.011:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2065 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7facd92baae9 code=0x0 09:09:52 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80003200) r3 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r3, 0x0) sendfile(r0, r3, 0x0, 0x200fff) 09:09:52 executing program 2: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 09:09:52 executing program 4: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) [ 38.250280][ T24] audit: type=1326 audit(1637485792.071:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2090 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7facd92baae9 code=0x0 09:09:52 executing program 5: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 09:09:52 executing program 2: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 09:09:52 executing program 5: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x2726, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x2d7a, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000004c0), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000800)) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 09:09:52 executing program 4: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x300002c0) 09:09:52 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) 09:09:52 executing program 4: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x300002c0) 09:09:52 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x20001) write(r0, &(0x7f0000000040)="d03c50403b0ad7af362708ac14fb62c81eb30097b24f9958a6aa06a828e59a28f1bbb218b219ecc62156be218f49bcb903bef5f0e02d9177b3891360acfd3132b18bd2f7a0470fcd167639bc9731c07b6d", 0x51) 09:09:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 09:09:52 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80003200) r3 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r3, 0x0) sendfile(r0, r3, 0x0, 0x200fff) 09:09:52 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80003200) r3 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r3, 0x0) sendfile(r0, r3, 0x0, 0x200fff) [ 39.130267][ T2123] ================================================================== [ 39.138449][ T2123] BUG: KCSAN: data-race in ext4_mb_find_by_goal / mb_mark_used [ 39.146013][ T2123] [ 39.148327][ T2123] write to 0xffff8881013e39d4 of 4 bytes by task 2124 on cpu 0: [ 39.155935][ T2123] mb_mark_used+0x13b/0xc50 [ 39.160424][ T2123] ext4_mb_use_best_found+0x102/0x300 [ 39.165789][ T2123] ext4_mb_simple_scan_group+0x253/0x3a0 [ 39.171518][ T2123] ext4_mb_regular_allocator+0x1918/0x24a0 [ 39.177342][ T2123] ext4_mb_new_blocks+0x78c/0x1ee0 [ 39.182457][ T2123] ext4_ext_map_blocks+0x1658/0x2120 [ 39.187750][ T2123] ext4_map_blocks+0x71e/0xf00 [ 39.192508][ T2123] ext4_iomap_begin+0x4b0/0x630 [ 39.197344][ T2123] iomap_iter+0x395/0x4a0 [ 39.201659][ T2123] __iomap_dio_rw+0x695/0x1070 [ 39.206408][ T2123] iomap_dio_rw+0x38/0x80 [ 39.210723][ T2123] ext4_file_write_iter+0xac3/0x1200 [ 39.215992][ T2123] do_iter_readv_writev+0x2de/0x380 [ 39.221180][ T2123] do_iter_write+0x192/0x5c0 [ 39.225760][ T2123] vfs_iter_write+0x4c/0x70 [ 39.230249][ T2123] iter_file_splice_write+0x43a/0x790 [ 39.235611][ T2123] direct_splice_actor+0x80/0xa0 [ 39.240532][ T2123] splice_direct_to_actor+0x345/0x650 [ 39.245889][ T2123] do_splice_direct+0x106/0x190 [ 39.250724][ T2123] do_sendfile+0x675/0xc40 [ 39.255121][ T2123] __x64_sys_sendfile64+0x102/0x140 [ 39.260310][ T2123] do_syscall_64+0x44/0xd0 [ 39.264799][ T2123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 39.270689][ T2123] [ 39.272996][ T2123] read to 0xffff8881013e39d4 of 4 bytes by task 2123 on cpu 1: [ 39.280527][ T2123] ext4_mb_find_by_goal+0x13f/0x880 [ 39.285710][ T2123] ext4_mb_regular_allocator+0x12b/0x24a0 [ 39.291433][ T2123] ext4_mb_new_blocks+0x78c/0x1ee0 [ 39.296545][ T2123] ext4_ext_map_blocks+0x1658/0x2120 [ 39.301831][ T2123] ext4_map_blocks+0x71e/0xf00 [ 39.306592][ T2123] ext4_iomap_begin+0x4b0/0x630 [ 39.311429][ T2123] iomap_iter+0x395/0x4a0 [ 39.315757][ T2123] __iomap_dio_rw+0x695/0x1070 [ 39.320514][ T2123] iomap_dio_rw+0x38/0x80 [ 39.324826][ T2123] ext4_file_write_iter+0xac3/0x1200 [ 39.330096][ T2123] do_iter_readv_writev+0x2de/0x380 [ 39.335278][ T2123] do_iter_write+0x192/0x5c0 [ 39.339856][ T2123] vfs_iter_write+0x4c/0x70 [ 39.344348][ T2123] iter_file_splice_write+0x43a/0x790 [ 39.349702][ T2123] direct_splice_actor+0x80/0xa0 [ 39.354622][ T2123] splice_direct_to_actor+0x345/0x650 [ 39.359975][ T2123] do_splice_direct+0x106/0x190 [ 39.364816][ T2123] do_sendfile+0x675/0xc40 [ 39.369227][ T2123] __x64_sys_sendfile64+0x102/0x140 [ 39.374406][ T2123] do_syscall_64+0x44/0xd0 [ 39.378895][ T2123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 39.384795][ T2123] [ 39.387098][ T2123] value changed: 0x0000658f -> 0x0000654f [ 39.392792][ T2123] [ 39.395096][ T2123] Reported by Kernel Concurrency Sanitizer on: [ 39.401223][ T2123] CPU: 1 PID: 2123 Comm: syz-executor.3 Not tainted 5.16.0-rc1-syzkaller #0 [ 39.409876][ T2123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.419913][ T2123] ================================================================== 09:09:53 executing program 4: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x300002c0) 09:09:53 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x20001) write(r0, &(0x7f0000000040)="d03c50403b0ad7af362708ac14fb62c81eb30097b24f9958a6aa06a828e59a28f1bbb218b219ecc62156be218f49bcb903bef5f0e02d9177b3891360acfd3132b18bd2f7a0470fcd167639bc9731c07b6d", 0x51) 09:09:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 09:09:53 executing program 4: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x300002c0) [ 39.440964][ T24] audit: type=1326 audit(1637485793.261:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7facd92baae9 code=0x0 09:09:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 09:09:53 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x20001) write(r0, &(0x7f0000000040)="d03c50403b0ad7af362708ac14fb62c81eb30097b24f9958a6aa06a828e59a28f1bbb218b219ecc62156be218f49bcb903bef5f0e02d9177b3891360acfd3132b18bd2f7a0470fcd167639bc9731c07b6d", 0x51) [ 39.632633][ T2123] syz-executor.3 (2123) used greatest stack depth: 9584 bytes left 09:09:53 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) 09:09:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 09:09:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 09:09:53 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x20001) write(r0, &(0x7f0000000040)="d03c50403b0ad7af362708ac14fb62c81eb30097b24f9958a6aa06a828e59a28f1bbb218b219ecc62156be218f49bcb903bef5f0e02d9177b3891360acfd3132b18bd2f7a0470fcd167639bc9731c07b6d", 0x51) 09:09:53 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80003200) r3 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r3, 0x0) sendfile(r0, r3, 0x0, 0x200fff) 09:09:53 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80003200) r3 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r3, 0x0) sendfile(r0, r3, 0x0, 0x200fff) 09:09:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 09:09:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 09:09:53 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r2, 0xe9032609c392135f}, 0x14}}, 0x0) [ 40.017396][ T24] audit: type=1326 audit(1637485793.831:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2157 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7facd92baae9 code=0x0 09:09:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 40.064662][ T24] audit: type=1400 audit(1637485793.881:115): avc: denied { open } for pid=2162 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 40.084242][ T24] audit: type=1400 audit(1637485793.881:116): avc: denied { prog_load } for pid=2162 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 09:09:53 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:53 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r2, 0xe9032609c392135f}, 0x14}}, 0x0) [ 40.167429][ T2175] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.4'. [ 40.180943][ T2175] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:09:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 09:09:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 09:09:54 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r2, 0xe9032609c392135f}, 0x14}}, 0x0) 09:09:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 09:09:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1a, &(0x7f0000000000), 0x20a154cc) 09:09:54 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r2, 0xe9032609c392135f}, 0x14}}, 0x0) 09:09:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 09:09:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1a, &(0x7f0000000000), 0x20a154cc) 09:09:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 09:09:54 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 09:09:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1a, &(0x7f0000000000), 0x20a154cc) 09:09:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 09:09:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 09:09:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1a, &(0x7f0000000000), 0x20a154cc) 09:09:54 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}, {0x0}], 0x2}, 0x0) recvmsg$kcm(r0, &(0x7f000000af40)={&(0x7f0000009740)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000097c0)=""/253, 0xfd}, {0x0}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000009b40)=""/141, 0x7fffee77}, {0x0}, {0x0}, {0x0}], 0x7}, 0x40000062) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xd1, 0x9, 0x60, 0x2, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x200, 0x1, 0x0, 0x6, 0x5, 0x8, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='cgroup\x00') socket$kcm(0x11, 0x2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) [ 41.054386][ T2210] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.4'. [ 41.086751][ T2213] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.0'. 09:09:54 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) [ 41.101100][ T2213] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 41.133040][ T2219] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.5'. 09:09:54 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="fc0000004a000700ab092500090007000aab80ff000000000000369321000100fc0000000000000000ff000000000000008656aaa79bb94b46fe00000007ec020800008c0100036c6c256f1a272f2e117c22ebc205214000000080008934d07326ade01720e6cd5ed6e4e9bfcd772c74fb32c56ce1f0f156272f5b00000005defd5a32e3082038f4f8b29d3e2a73325c6d167c7594978f7bc711fdf3d92c8334b2ccd243f295ed94e0ad91bd073457d43d3f0000000000000000000000000073bfe35951f2d728a1e09c8dcd13323236b0fbe7c61b1bf53cdec0961355f00ca63ff6c90da1dc9f8f594d033472cb97e3b5f3395aa0a4a82775cf8def", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) [ 41.147668][ T2219] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 41.176275][ T2222] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.1'. [ 41.186552][ T2222] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:09:55 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:55 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:55 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) [ 41.892160][ T2229] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.3'. [ 41.902528][ T2229] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 41.915649][ T2233] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.4'. 09:09:55 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:55 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) [ 41.955394][ T2236] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.0'. [ 41.988202][ T2239] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.5'. [ 42.031220][ T2244] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.1'. 09:09:56 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:56 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:56 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:56 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:56 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:57 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000300)="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", 0xfc) mmap(&(0x7f0000d67000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r1, 0x8f72000) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000001600)='\b', 0xfffffffffffffd68, 0x4004095, 0x0, 0xd56888b5705b13c6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x20}, &(0x7f0000000180)=0x22) 09:09:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:57 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x1d, 0x0, 0x0, {}, 0xff}, 0x18, &(0x7f00000000c0)={0x0}}, 0x0) 09:09:57 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x1d, 0x0, 0x0, {}, 0xff}, 0x18, &(0x7f00000000c0)={0x0}}, 0x0) [ 43.703768][ T24] kauditd_printk_skb: 13 callbacks suppressed [ 43.703779][ T24] audit: type=1400 audit(1637485797.521:130): avc: denied { create } for pid=2277 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 09:09:57 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x1d, 0x0, 0x0, {}, 0xff}, 0x18, &(0x7f00000000c0)={0x0}}, 0x0) 09:09:57 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x1d, 0x0, 0x0, {}, 0xff}, 0x18, &(0x7f00000000c0)={0x0}}, 0x0) 09:09:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x6}, [@alu={0x4, 0x0, 0xb, 0x0, 0x0, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:09:57 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)) [ 43.729743][ T24] audit: type=1400 audit(1637485797.521:131): avc: denied { ioctl } for pid=2277 comm="syz-executor.5" path="socket:[18061]" dev="sockfs" ino=18061 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 43.754654][ T24] audit: type=1400 audit(1637485797.521:132): avc: denied { bind } for pid=2277 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 43.774298][ T24] audit: type=1400 audit(1637485797.521:133): avc: denied { write } for pid=2277 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 09:09:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x6}, [@alu={0x4, 0x0, 0xb, 0x0, 0x0, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:09:57 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)) [ 43.834746][ T24] audit: type=1400 audit(1637485797.651:134): avc: denied { bpf } for pid=2291 comm="syz-executor.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 09:09:58 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)) 09:09:58 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)) 09:09:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x6}, [@alu={0x4, 0x0, 0xb, 0x0, 0x0, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:09:58 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x3a, 0x1, 0x0, 0x0) 09:09:58 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x1, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000400)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfeffff}]) 09:09:58 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000040)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0xbece}}]}}) [ 44.534930][ T24] audit: type=1400 audit(1637485798.351:135): avc: denied { create } for pid=2307 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.554799][ T24] audit: type=1400 audit(1637485798.351:136): avc: denied { write } for pid=2307 comm="syz-executor.2" path="socket:[17087]" dev="sockfs" ino=17087 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.557277][ T2315] 9pnet: Insufficient options for proto=fd [ 44.578381][ T24] audit: type=1400 audit(1637485798.371:137): avc: denied { mounton } for pid=2313 comm="syz-executor.5" path="/root/syzkaller-testdir276736671/syzkaller.uYbekx/29/file0" dev="sda1" ino=1193 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 44.594452][ T24] audit: type=1400 audit(1637485798.401:138): avc: denied { create } for pid=2314 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 09:09:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x6}, [@alu={0x4, 0x0, 0xb, 0x0, 0x0, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:09:58 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x3a, 0x1, 0x0, 0x0) 09:09:58 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000040)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0xbece}}]}}) 09:09:58 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x3a, 0x1, 0x0, 0x0) [ 44.631061][ T24] audit: type=1400 audit(1637485798.401:139): avc: denied { getopt } for pid=2314 comm="syz-executor.3" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 44.636168][ T2320] 9pnet: Insufficient options for proto=fd 09:09:58 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000040)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0xbece}}]}}) 09:09:58 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000040)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0xbece}}]}}) [ 44.709823][ T2330] 9pnet: Insufficient options for proto=fd [ 44.717968][ T2334] 9pnet: Insufficient options for proto=fd [ 44.746726][ T2337] 9pnet: Insufficient options for proto=fd 09:09:59 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x1, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000400)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfeffff}]) 09:09:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:59 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='S', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000003940)="aa", 0x1, 0x0, &(0x7f0000003a00)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) 09:09:59 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000040)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0xbece}}]}}) 09:09:59 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000040)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0xbece}}]}}) 09:09:59 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x3a, 0x1, 0x0, 0x0) 09:09:59 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002940)={&(0x7f00000001c0)=@newtaction={0x80, 0x30, 0x53b, 0x0, 0x0, {}, [{0x6c, 0x1, [@m_skbmod={0x68, 0x1, 0x0, 0x0, {{0xb}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0x4, 0x14}, {0xc}, {0xc}}}]}]}, 0x80}}, 0x0) 09:09:59 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000040)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0xbece}}]}}) 09:09:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f00000003c0), &(0x7f0000000380)=0x8) [ 45.406737][ T2348] 9pnet: Insufficient options for proto=fd [ 45.413526][ T2346] 9pnet: Insufficient options for proto=fd 09:09:59 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x1, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000400)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfeffff}]) 09:09:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f00000003c0), &(0x7f0000000380)=0x8) 09:09:59 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002940)={&(0x7f00000001c0)=@newtaction={0x80, 0x30, 0x53b, 0x0, 0x0, {}, [{0x6c, 0x1, [@m_skbmod={0x68, 0x1, 0x0, 0x0, {{0xb}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0x4, 0x14}, {0xc}, {0xc}}}]}]}, 0x80}}, 0x0) 09:09:59 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) [ 45.464637][ T2360] 9pnet: Insufficient options for proto=fd 09:10:00 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002940)={&(0x7f00000001c0)=@newtaction={0x80, 0x30, 0x53b, 0x0, 0x0, {}, [{0x6c, 0x1, [@m_skbmod={0x68, 0x1, 0x0, 0x0, {{0xb}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0x4, 0x14}, {0xc}, {0xc}}}]}]}, 0x80}}, 0x0) 09:10:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f00000003c0), &(0x7f0000000380)=0x8) 09:10:00 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x1, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000400)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfeffff}]) 09:10:00 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f00000003c0), &(0x7f0000000380)=0x8) 09:10:00 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002940)={&(0x7f00000001c0)=@newtaction={0x80, 0x30, 0x53b, 0x0, 0x0, {}, [{0x6c, 0x1, [@m_skbmod={0x68, 0x1, 0x0, 0x0, {{0xb}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0x4, 0x14}, {0xc}, {0xc}}}]}]}, 0x80}}, 0x0) 09:10:00 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@multicast, @random="836ec7a019c9", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "f782f4", 0x18, 0x0, 0x0, @private0, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@private2]}]}}}}}, 0x0) 09:10:00 executing program 0: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000100), 0x4) 09:10:00 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@multicast, @random="836ec7a019c9", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "f782f4", 0x18, 0x0, 0x0, @private0, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@private2]}]}}}}}, 0x0) 09:10:00 executing program 0: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000100), 0x4) 09:10:00 executing program 3: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 2: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@multicast, @random="836ec7a019c9", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "f782f4", 0x18, 0x0, 0x0, @private0, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@private2]}]}}}}}, 0x0) 09:10:00 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="c9", 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f0000000200)="1e", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x8) shutdown(r1, 0x1) 09:10:00 executing program 0: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 3: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000100), 0x4) 09:10:00 executing program 2: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@multicast, @random="836ec7a019c9", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "f782f4", 0x18, 0x0, 0x0, @private0, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@private2]}]}}}}}, 0x0) 09:10:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x20}, {0x35}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000740)="9635ed3b", 0x4}], 0x1}}], 0x1, 0x0) 09:10:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000100), 0x4) 09:10:00 executing program 3: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 0: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x20}, {0x35}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000740)="9635ed3b", 0x4}], 0x1}}], 0x1, 0x0) 09:10:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) eventfd2(0x0, 0x0) 09:10:00 executing program 2: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<'], 0x3c}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001800)={r0, &(0x7f0000001740), &(0x7f0000001780)=""/97}, 0x20) 09:10:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) 09:10:00 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x88, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 09:10:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x20}, {0x35}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000740)="9635ed3b", 0x4}], 0x1}}], 0x1, 0x0) 09:10:00 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mlock(&(0x7f00007eb000/0x4000)=nil, 0x4000) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) 09:10:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) 09:10:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) eventfd2(0x0, 0x0) 09:10:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x20}, {0x35}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000740)="9635ed3b", 0x4}], 0x1}}], 0x1, 0x0) 09:10:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x40, r1, 0x525, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x2c, 0x131, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x28, 0xe, "f47dbabca5d3989a58e98dfa3bc6798e95bc7ba888cc03e5c79b00c4c96280567eb41af5"}]}]}, 0x40}}, 0x0) 09:10:00 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x88, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 09:10:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) eventfd2(0x0, 0x0) 09:10:00 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mlock(&(0x7f00007eb000/0x4000)=nil, 0x4000) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) 09:10:00 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x88, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 09:10:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) 09:10:00 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x88, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 09:10:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x40, r1, 0x525, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x2c, 0x131, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x28, 0xe, "f47dbabca5d3989a58e98dfa3bc6798e95bc7ba888cc03e5c79b00c4c96280567eb41af5"}]}]}, 0x40}}, 0x0) 09:10:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) eventfd2(0x0, 0x0) 09:10:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) 09:10:00 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x88, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 09:10:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x1e2263, 0x0) r0 = syz_io_uring_setup(0x2df7, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x7}, 0x0) io_uring_enter(r0, 0x91c, 0x0, 0x0, 0x0, 0x0) 09:10:00 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mlock(&(0x7f00007eb000/0x4000)=nil, 0x4000) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) 09:10:00 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x88, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 09:10:01 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x88, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 09:10:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x40, r1, 0x525, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x2c, 0x131, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x28, 0xe, "f47dbabca5d3989a58e98dfa3bc6798e95bc7ba888cc03e5c79b00c4c96280567eb41af5"}]}]}, 0x40}}, 0x0) 09:10:01 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) 09:10:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x1e2263, 0x0) r0 = syz_io_uring_setup(0x2df7, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x7}, 0x0) io_uring_enter(r0, 0x91c, 0x0, 0x0, 0x0, 0x0) 09:10:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x40, r1, 0x525, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x2c, 0x131, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x28, 0xe, "f47dbabca5d3989a58e98dfa3bc6798e95bc7ba888cc03e5c79b00c4c96280567eb41af5"}]}]}, 0x40}}, 0x0) 09:10:01 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002e40)=[{{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/180, 0xb4}, {&(0x7f0000001880)=""/148, 0x94}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/212, 0xd4}], 0x4}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:10:01 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}}}, 0x108) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/91, 0x5b}], 0x1, 0xb6, 0x0) 09:10:01 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x1c, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14}]}]}, @IFLA_TXQLEN={0x8}]}, 0x44}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000002780)={0x0, 0x0, 0x0}, 0x0) 09:10:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x1e2263, 0x0) r0 = syz_io_uring_setup(0x2df7, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x7}, 0x0) io_uring_enter(r0, 0x91c, 0x0, 0x0, 0x0, 0x0) 09:10:01 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000080)={0x3}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="b340d222c53021c99e169ce44b4c44aaead2f59c2751fba8d1f930f5d16d79c34c538ffa7e1e365837a5f9339e3d8888ca7ee6e2d7d9bcfc28b4a95d70eb2aad4728570c145c5ffd1877b4db0c6ffaac3ae694c90eecb16abbc382ff3824a4c4c21f655b4bc709ce06ace9cc6a010a8a553115db7b161b73c7fad7d3e73c09087b70cfd8c8b84118229a797c7cf2ad9f"], 0xf9, 0xd361acae324b0c0a, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x4258}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000c00)=ANY=[@ANYRESHEX], 0x64, 0x0) msgrcv(0x0, &(0x7f00000007c0)={0x0, ""/104}, 0x70, 0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)) msgctl$IPC_RMID(0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240)={0x0, ""/116}, 0x7c, 0x2, 0x1000) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) msgctl$IPC_RMID(0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) r2 = memfd_create(&(0x7f0000000900)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd93