[ 6.054452][ T1478] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 13.923081][ T24] kauditd_printk_skb: 38 callbacks suppressed [ 13.923089][ T24] audit: type=1400 audit(1652021779.183:72): avc: denied { transition } for pid=1639 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.928134][ T24] audit: type=1400 audit(1652021779.183:73): avc: denied { write } for pid=1639 comm="sh" path="pipe:[14812]" dev="pipefs" ino=14812 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 14.597245][ T1640] sshd (1640) used greatest stack depth: 11408 bytes left Warning: Permanently added '10.128.1.180' (ECDSA) to the list of known hosts. 2022/05/08 14:56:25 fuzzer started 2022/05/08 14:56:25 dialing manager at 10.128.0.163:32803 [ 21.669123][ T24] audit: type=1400 audit(1652021786.923:74): avc: denied { mounton } for pid=1808 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.672629][ T1808] cgroup: Unknown subsys name 'net' [ 21.691840][ T24] audit: type=1400 audit(1652021786.923:75): avc: denied { mount } for pid=1808 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.719147][ T24] audit: type=1400 audit(1652021786.953:76): avc: denied { unmount } for pid=1808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.832759][ T1808] cgroup: Unknown subsys name 'rlimit' 2022/05/08 14:56:27 syscalls: 2727 2022/05/08 14:56:27 code coverage: enabled 2022/05/08 14:56:27 comparison tracing: enabled 2022/05/08 14:56:27 extra coverage: enabled 2022/05/08 14:56:27 delay kcov mmap: enabled 2022/05/08 14:56:27 setuid sandbox: enabled 2022/05/08 14:56:27 namespace sandbox: enabled 2022/05/08 14:56:27 Android sandbox: enabled 2022/05/08 14:56:27 fault injection: enabled 2022/05/08 14:56:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/05/08 14:56:27 net packet injection: enabled 2022/05/08 14:56:27 net device setup: enabled 2022/05/08 14:56:27 concurrency sanitizer: enabled 2022/05/08 14:56:27 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/05/08 14:56:27 USB emulation: /dev/raw-gadget does not exist 2022/05/08 14:56:27 hci packet injection: /dev/vhci does not exist 2022/05/08 14:56:27 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2022/05/08 14:56:27 802.15.4 emulation: enabled [ 21.952718][ T24] audit: type=1400 audit(1652021787.213:77): avc: denied { mounton } for pid=1808 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.977512][ T24] audit: type=1400 audit(1652021787.213:78): avc: denied { mount } for pid=1808 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.001075][ T24] audit: type=1400 audit(1652021787.213:79): avc: denied { create } for pid=1808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.021511][ T24] audit: type=1400 audit(1652021787.213:80): avc: denied { write } for pid=1808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.042385][ T24] audit: type=1400 audit(1652021787.213:81): avc: denied { read } for pid=1808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/05/08 14:56:27 suppressing KCSAN reports in functions: 'do_sys_poll' 'sit_tunnel_xmit' '__xa_clear_mark' 'filemap_read' 'generic_write_end' 'blk_mq_sched_dispatch_requests' 2022/05/08 14:56:27 fetching corpus: 0, signal 0/2000 (executing program) 2022/05/08 14:56:27 fetching corpus: 48, signal 16888/20485 (executing program) 2022/05/08 14:56:28 fetching corpus: 98, signal 26012/31070 (executing program) 2022/05/08 14:56:28 fetching corpus: 148, signal 30987/37491 (executing program) 2022/05/08 14:56:28 fetching corpus: 198, signal 35977/43884 (executing program) 2022/05/08 14:56:28 fetching corpus: 248, signal 40015/49237 (executing program) 2022/05/08 14:56:28 fetching corpus: 298, signal 43572/54067 (executing program) 2022/05/08 14:56:28 fetching corpus: 348, signal 47737/59323 (executing program) 2022/05/08 14:56:28 fetching corpus: 398, signal 50840/63543 (executing program) 2022/05/08 14:56:28 fetching corpus: 448, signal 53605/67388 (executing program) 2022/05/08 14:56:28 fetching corpus: 497, signal 56210/71106 (executing program) 2022/05/08 14:56:28 fetching corpus: 547, signal 58854/74686 (executing program) 2022/05/08 14:56:28 fetching corpus: 597, signal 61137/77945 (executing program) 2022/05/08 14:56:28 fetching corpus: 647, signal 62922/80656 (executing program) 2022/05/08 14:56:28 fetching corpus: 697, signal 64515/83196 (executing program) 2022/05/08 14:56:29 fetching corpus: 747, signal 66689/86151 (executing program) 2022/05/08 14:56:29 fetching corpus: 797, signal 68652/88941 (executing program) 2022/05/08 14:56:29 fetching corpus: 847, signal 72660/93303 (executing program) 2022/05/08 14:56:29 fetching corpus: 897, signal 74353/95763 (executing program) 2022/05/08 14:56:29 fetching corpus: 947, signal 75692/97926 (executing program) 2022/05/08 14:56:29 fetching corpus: 997, signal 77618/100460 (executing program) 2022/05/08 14:56:29 fetching corpus: 1046, signal 79114/102652 (executing program) 2022/05/08 14:56:29 fetching corpus: 1096, signal 80429/104674 (executing program) 2022/05/08 14:56:29 fetching corpus: 1146, signal 82069/106944 (executing program) 2022/05/08 14:56:29 fetching corpus: 1195, signal 83673/109114 (executing program) 2022/05/08 14:56:29 fetching corpus: 1244, signal 84865/110959 (executing program) 2022/05/08 14:56:30 fetching corpus: 1294, signal 86597/113090 (executing program) 2022/05/08 14:56:30 fetching corpus: 1344, signal 87791/114877 (executing program) 2022/05/08 14:56:30 fetching corpus: 1394, signal 89128/116720 (executing program) 2022/05/08 14:56:30 fetching corpus: 1444, signal 90348/118426 (executing program) 2022/05/08 14:56:30 fetching corpus: 1494, signal 91576/120122 (executing program) 2022/05/08 14:56:30 fetching corpus: 1544, signal 92543/121626 (executing program) 2022/05/08 14:56:30 fetching corpus: 1594, signal 93347/123023 (executing program) 2022/05/08 14:56:30 fetching corpus: 1644, signal 94735/124732 (executing program) 2022/05/08 14:56:30 fetching corpus: 1694, signal 96576/126688 (executing program) 2022/05/08 14:56:30 fetching corpus: 1744, signal 97595/128129 (executing program) 2022/05/08 14:56:30 fetching corpus: 1794, signal 98837/129649 (executing program) 2022/05/08 14:56:30 fetching corpus: 1844, signal 100078/131184 (executing program) 2022/05/08 14:56:30 fetching corpus: 1894, signal 101055/132484 (executing program) 2022/05/08 14:56:31 fetching corpus: 1944, signal 102366/133996 (executing program) 2022/05/08 14:56:31 fetching corpus: 1994, signal 103303/135272 (executing program) 2022/05/08 14:56:31 fetching corpus: 2044, signal 104237/136528 (executing program) 2022/05/08 14:56:31 fetching corpus: 2094, signal 105471/137885 (executing program) 2022/05/08 14:56:31 fetching corpus: 2144, signal 106472/139070 (executing program) 2022/05/08 14:56:31 fetching corpus: 2193, signal 107655/140403 (executing program) 2022/05/08 14:56:31 fetching corpus: 2242, signal 108583/141532 (executing program) 2022/05/08 14:56:31 fetching corpus: 2292, signal 109556/142676 (executing program) 2022/05/08 14:56:31 fetching corpus: 2342, signal 110292/143713 (executing program) 2022/05/08 14:56:31 fetching corpus: 2392, signal 111026/144755 (executing program) 2022/05/08 14:56:32 fetching corpus: 2442, signal 111831/145753 (executing program) 2022/05/08 14:56:32 fetching corpus: 2491, signal 112596/146739 (executing program) 2022/05/08 14:56:32 fetching corpus: 2540, signal 113579/147774 (executing program) 2022/05/08 14:56:32 fetching corpus: 2590, signal 114193/148607 (executing program) 2022/05/08 14:56:32 fetching corpus: 2640, signal 114833/149488 (executing program) 2022/05/08 14:56:32 fetching corpus: 2690, signal 115650/150418 (executing program) 2022/05/08 14:56:32 fetching corpus: 2740, signal 116351/151273 (executing program) 2022/05/08 14:56:32 fetching corpus: 2790, signal 116966/152088 (executing program) 2022/05/08 14:56:32 fetching corpus: 2840, signal 117928/152993 (executing program) 2022/05/08 14:56:32 fetching corpus: 2890, signal 118652/153846 (executing program) 2022/05/08 14:56:32 fetching corpus: 2940, signal 119145/154599 (executing program) 2022/05/08 14:56:32 fetching corpus: 2990, signal 119645/155343 (executing program) 2022/05/08 14:56:33 fetching corpus: 3039, signal 120777/156222 (executing program) 2022/05/08 14:56:33 fetching corpus: 3089, signal 121709/157039 (executing program) 2022/05/08 14:56:33 fetching corpus: 3139, signal 122326/157713 (executing program) 2022/05/08 14:56:33 fetching corpus: 3189, signal 123098/158467 (executing program) 2022/05/08 14:56:33 fetching corpus: 3239, signal 123804/159203 (executing program) 2022/05/08 14:56:33 fetching corpus: 3289, signal 125487/160107 (executing program) 2022/05/08 14:56:33 fetching corpus: 3339, signal 126216/160786 (executing program) 2022/05/08 14:56:33 fetching corpus: 3389, signal 126993/161471 (executing program) 2022/05/08 14:56:33 fetching corpus: 3439, signal 127681/162113 (executing program) 2022/05/08 14:56:33 fetching corpus: 3489, signal 128641/162783 (executing program) 2022/05/08 14:56:33 fetching corpus: 3539, signal 129280/163393 (executing program) 2022/05/08 14:56:33 fetching corpus: 3588, signal 129718/163955 (executing program) 2022/05/08 14:56:33 fetching corpus: 3638, signal 130468/164534 (executing program) 2022/05/08 14:56:34 fetching corpus: 3688, signal 131111/165049 (executing program) 2022/05/08 14:56:34 fetching corpus: 3738, signal 131748/165597 (executing program) 2022/05/08 14:56:34 fetching corpus: 3788, signal 132760/166134 (executing program) 2022/05/08 14:56:34 fetching corpus: 3838, signal 133621/166652 (executing program) 2022/05/08 14:56:34 fetching corpus: 3888, signal 134450/167144 (executing program) 2022/05/08 14:56:34 fetching corpus: 3938, signal 135160/167606 (executing program) 2022/05/08 14:56:34 fetching corpus: 3988, signal 136300/168036 (executing program) 2022/05/08 14:56:34 fetching corpus: 4038, signal 137139/168473 (executing program) 2022/05/08 14:56:34 fetching corpus: 4088, signal 137932/168875 (executing program) 2022/05/08 14:56:34 fetching corpus: 4138, signal 138970/169263 (executing program) 2022/05/08 14:56:34 fetching corpus: 4188, signal 139842/169561 (executing program) 2022/05/08 14:56:35 fetching corpus: 4238, signal 140435/169561 (executing program) 2022/05/08 14:56:35 fetching corpus: 4288, signal 140994/169561 (executing program) 2022/05/08 14:56:35 fetching corpus: 4338, signal 142023/169563 (executing program) 2022/05/08 14:56:35 fetching corpus: 4388, signal 142527/169563 (executing program) 2022/05/08 14:56:35 fetching corpus: 4438, signal 143196/169582 (executing program) 2022/05/08 14:56:35 fetching corpus: 4488, signal 143739/169582 (executing program) 2022/05/08 14:56:35 fetching corpus: 4538, signal 144422/169582 (executing program) 2022/05/08 14:56:35 fetching corpus: 4588, signal 144924/169582 (executing program) 2022/05/08 14:56:35 fetching corpus: 4638, signal 145488/169582 (executing program) 2022/05/08 14:56:35 fetching corpus: 4688, signal 146108/169582 (executing program) 2022/05/08 14:56:35 fetching corpus: 4737, signal 147099/169585 (executing program) 2022/05/08 14:56:35 fetching corpus: 4786, signal 147533/169585 (executing program) 2022/05/08 14:56:35 fetching corpus: 4836, signal 148342/169585 (executing program) 2022/05/08 14:56:36 fetching corpus: 4886, signal 148846/169585 (executing program) 2022/05/08 14:56:36 fetching corpus: 4936, signal 149160/169590 (executing program) 2022/05/08 14:56:36 fetching corpus: 4986, signal 149446/169590 (executing program) 2022/05/08 14:56:36 fetching corpus: 5036, signal 150074/169590 (executing program) 2022/05/08 14:56:36 fetching corpus: 5086, signal 150561/169590 (executing program) 2022/05/08 14:56:36 fetching corpus: 5136, signal 150949/169590 (executing program) 2022/05/08 14:56:36 fetching corpus: 5185, signal 151547/169590 (executing program) 2022/05/08 14:56:36 fetching corpus: 5235, signal 151847/169590 (executing program) 2022/05/08 14:56:36 fetching corpus: 5285, signal 152247/169590 (executing program) 2022/05/08 14:56:36 fetching corpus: 5334, signal 152764/169590 (executing program) 2022/05/08 14:56:36 fetching corpus: 5383, signal 153302/169593 (executing program) 2022/05/08 14:56:36 fetching corpus: 5433, signal 154298/169593 (executing program) 2022/05/08 14:56:36 fetching corpus: 5483, signal 154855/169593 (executing program) 2022/05/08 14:56:36 fetching corpus: 5533, signal 155278/169595 (executing program) 2022/05/08 14:56:37 fetching corpus: 5582, signal 155835/169595 (executing program) 2022/05/08 14:56:37 fetching corpus: 5632, signal 156149/169597 (executing program) 2022/05/08 14:56:37 fetching corpus: 5682, signal 156527/169597 (executing program) 2022/05/08 14:56:37 fetching corpus: 5732, signal 156854/169597 (executing program) 2022/05/08 14:56:37 fetching corpus: 5782, signal 157300/169597 (executing program) 2022/05/08 14:56:37 fetching corpus: 5832, signal 157628/169606 (executing program) 2022/05/08 14:56:37 fetching corpus: 5882, signal 158197/169611 (executing program) 2022/05/08 14:56:37 fetching corpus: 5932, signal 158700/169611 (executing program) 2022/05/08 14:56:37 fetching corpus: 5982, signal 159297/169619 (executing program) 2022/05/08 14:56:37 fetching corpus: 6032, signal 159852/169619 (executing program) 2022/05/08 14:56:37 fetching corpus: 6082, signal 160197/169619 (executing program) 2022/05/08 14:56:37 fetching corpus: 6132, signal 160498/169625 (executing program) 2022/05/08 14:56:37 fetching corpus: 6182, signal 161015/169625 (executing program) 2022/05/08 14:56:38 fetching corpus: 6232, signal 161879/169629 (executing program) 2022/05/08 14:56:38 fetching corpus: 6282, signal 162268/169629 (executing program) 2022/05/08 14:56:38 fetching corpus: 6332, signal 162652/169629 (executing program) 2022/05/08 14:56:38 fetching corpus: 6382, signal 163217/169629 (executing program) 2022/05/08 14:56:38 fetching corpus: 6432, signal 163534/169629 (executing program) 2022/05/08 14:56:38 fetching corpus: 6482, signal 164186/169629 (executing program) 2022/05/08 14:56:38 fetching corpus: 6532, signal 164681/169629 (executing program) 2022/05/08 14:56:38 fetching corpus: 6582, signal 164940/169629 (executing program) 2022/05/08 14:56:38 fetching corpus: 6632, signal 165458/169629 (executing program) 2022/05/08 14:56:38 fetching corpus: 6677, signal 165857/169631 (executing program) 2022/05/08 14:56:38 fetching corpus: 6678, signal 165869/169643 (executing program) 2022/05/08 14:56:38 fetching corpus: 6678, signal 165869/169643 (executing program) 2022/05/08 14:56:40 starting 6 fuzzer processes 14:56:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000580)='./bus\x00', 0x0) chdir(&(0x7f0000000200)='./bus\x00') r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) lchown(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) 14:56:40 executing program 1: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000000040)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 14:56:40 executing program 3: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x100}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:56:40 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 14:56:40 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x4048084) 14:56:40 executing program 4: add_key$user(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='/', 0x1, 0xffffffffffffffff) [ 35.101968][ T24] audit: type=1400 audit(1652021800.343:82): avc: denied { execmem } for pid=1816 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 35.126320][ T24] audit: type=1400 audit(1652021800.383:83): avc: denied { read } for pid=1820 comm="syz-executor.1" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 35.147699][ T24] audit: type=1400 audit(1652021800.383:84): avc: denied { open } for pid=1820 comm="syz-executor.1" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 35.171119][ T24] audit: type=1400 audit(1652021800.383:85): avc: denied { mounton } for pid=1820 comm="syz-executor.1" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 35.192568][ T24] audit: type=1400 audit(1652021800.383:86): avc: denied { module_request } for pid=1820 comm="syz-executor.1" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 35.248205][ T24] audit: type=1400 audit(1652021800.503:87): avc: denied { sys_module } for pid=1823 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 35.580610][ T1827] chnl_net:caif_netlink_parms(): no params data found [ 35.592947][ T1828] chnl_net:caif_netlink_parms(): no params data found [ 35.625260][ T1823] chnl_net:caif_netlink_parms(): no params data found [ 35.664607][ T1820] chnl_net:caif_netlink_parms(): no params data found [ 35.717947][ T1828] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.724999][ T1828] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.732592][ T1828] device bridge_slave_0 entered promiscuous mode [ 35.749936][ T1847] chnl_net:caif_netlink_parms(): no params data found [ 35.762347][ T1828] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.769437][ T1828] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.777418][ T1828] device bridge_slave_1 entered promiscuous mode [ 35.790188][ T1827] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.797264][ T1827] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.804737][ T1827] device bridge_slave_0 entered promiscuous mode [ 35.813684][ T1827] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.820727][ T1827] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.828927][ T1827] device bridge_slave_1 entered promiscuous mode [ 35.881137][ T1828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.901315][ T1827] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.916272][ T1828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.925468][ T1823] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.932517][ T1823] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.939991][ T1823] device bridge_slave_0 entered promiscuous mode [ 35.948853][ T1823] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.955968][ T1823] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.964063][ T1823] device bridge_slave_1 entered promiscuous mode [ 35.971272][ T1827] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.981914][ T1838] chnl_net:caif_netlink_parms(): no params data found [ 35.990226][ T1820] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.997254][ T1820] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.004690][ T1820] device bridge_slave_0 entered promiscuous mode [ 36.041817][ T1820] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.048848][ T1820] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.056426][ T1820] device bridge_slave_1 entered promiscuous mode [ 36.063343][ T1828] team0: Port device team_slave_0 added [ 36.068933][ T1847] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.075998][ T1847] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.083541][ T1847] device bridge_slave_0 entered promiscuous mode [ 36.104797][ T1828] team0: Port device team_slave_1 added [ 36.110515][ T1847] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.117563][ T1847] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.125058][ T1847] device bridge_slave_1 entered promiscuous mode [ 36.132465][ T1823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.144335][ T1823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.154678][ T1827] team0: Port device team_slave_0 added [ 36.186275][ T1827] team0: Port device team_slave_1 added [ 36.192831][ T1820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.202325][ T1828] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.209240][ T1828] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.235133][ T1828] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.250303][ T1847] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.267905][ T1820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.277148][ T1828] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.284083][ T1828] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.309975][ T1828] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.325512][ T1847] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.335078][ T1823] team0: Port device team_slave_0 added [ 36.341412][ T1823] team0: Port device team_slave_1 added [ 36.351106][ T1827] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.358141][ T1827] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.384082][ T1827] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.399535][ T1838] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.406668][ T1838] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.414319][ T1838] device bridge_slave_0 entered promiscuous mode [ 36.430049][ T1827] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.437045][ T1827] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.463021][ T1827] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.482919][ T1838] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.489966][ T1838] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.497653][ T1838] device bridge_slave_1 entered promiscuous mode [ 36.512995][ T1823] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.519938][ T1823] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.545938][ T1823] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.557194][ T1820] team0: Port device team_slave_0 added [ 36.572441][ T1847] team0: Port device team_slave_0 added [ 36.579227][ T1847] team0: Port device team_slave_1 added [ 36.585038][ T1823] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.591978][ T1823] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.617861][ T1823] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.630466][ T1828] device hsr_slave_0 entered promiscuous mode [ 36.636951][ T1828] device hsr_slave_1 entered promiscuous mode [ 36.643926][ T1820] team0: Port device team_slave_1 added [ 36.673249][ T1838] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.702186][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.709188][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.735120][ T1820] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.746478][ T1838] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.761264][ T1827] device hsr_slave_0 entered promiscuous mode [ 36.768934][ T1827] device hsr_slave_1 entered promiscuous mode [ 36.775307][ T1827] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.783674][ T1827] Cannot create hsr debugfs directory [ 36.789207][ T1847] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.796194][ T1847] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.822146][ T1847] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.837356][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.844315][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.870219][ T1820] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.892630][ T1847] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.899556][ T1847] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.925441][ T1847] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.937581][ T1823] device hsr_slave_0 entered promiscuous mode [ 36.944123][ T1823] device hsr_slave_1 entered promiscuous mode [ 36.950373][ T1823] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.957916][ T1823] Cannot create hsr debugfs directory [ 36.964820][ T1838] team0: Port device team_slave_0 added [ 36.987997][ T1838] team0: Port device team_slave_1 added [ 37.006057][ T1820] device hsr_slave_0 entered promiscuous mode [ 37.012652][ T1820] device hsr_slave_1 entered promiscuous mode [ 37.018919][ T1820] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.026478][ T1820] Cannot create hsr debugfs directory [ 37.048851][ T1838] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.055821][ T1838] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.081746][ T1838] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.098409][ T1847] device hsr_slave_0 entered promiscuous mode [ 37.104837][ T1847] device hsr_slave_1 entered promiscuous mode [ 37.111135][ T1847] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.119645][ T1847] Cannot create hsr debugfs directory [ 37.140122][ T1838] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.147145][ T1838] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.173050][ T1838] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.226706][ T1838] device hsr_slave_0 entered promiscuous mode [ 37.233058][ T1838] device hsr_slave_1 entered promiscuous mode [ 37.239343][ T1838] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.246945][ T1838] Cannot create hsr debugfs directory [ 37.269721][ T1828] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.278873][ T1828] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.302332][ T1828] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.312723][ T1828] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.329166][ T1827] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.343667][ T1827] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.353017][ T1827] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.367833][ T1827] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.394934][ T1823] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.414959][ T1823] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.428251][ T1823] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.437447][ T1823] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.444603][ T24] audit: type=1400 audit(1652021802.703:88): avc: denied { remove_name } for pid=1423 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 37.467175][ T24] audit: type=1400 audit(1652021802.703:89): avc: denied { rename } for pid=1423 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 37.501213][ T1828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.512424][ T1828] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.525458][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.533247][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.560409][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.568898][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.577355][ T1913] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.584521][ T1913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.592317][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.600756][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.609032][ T1913] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.616173][ T1913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.623909][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 37.642610][ T1820] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.652067][ T1820] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.670434][ T1828] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.680868][ T1828] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.693026][ T1847] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.704264][ T1820] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.714353][ T1820] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.724181][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 37.732255][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 37.741018][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 37.749340][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 37.757753][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 37.766294][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.774668][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.782996][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.791286][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.801151][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 37.809059][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.820624][ T1847] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.829458][ T1847] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.838146][ T1847] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.849336][ T1827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.864058][ T1827] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.872312][ T1838] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 37.883218][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.890800][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.914466][ T1838] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 37.923078][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.930471][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.938158][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.946720][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.955058][ T1910] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.962161][ T1910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.969883][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.978433][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.986662][ T1910] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.993747][ T1910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.001448][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.010089][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.018849][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 38.027141][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 38.035820][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.044106][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.053296][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.061134][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 38.081779][ C1] ================================================================== [ 38.088682][ T1820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.089856][ C1] BUG: KCSAN: data-race in prandom_seed / prandom_u32 [ 38.100703][ T1820] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.103233][ C1] [ 38.103240][ C1] read to 0xffff888237d28858 of 8 bytes by task 1916 on cpu 0: [ 38.103255][ C1] prandom_seed+0xeb/0x270 [ 38.103278][ C1] addrconf_dad_work+0x265/0xbb0 [ 38.124416][ T1820] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.128960][ C1] process_one_work+0x3d3/0x720 [ 38.128985][ C1] worker_thread+0x618/0xa70 [ 38.129005][ C1] kthread+0x1a9/0x1e0 [ 38.139347][ T1820] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.144118][ C1] ret_from_fork+0x1f/0x30 [ 38.144139][ C1] [ 38.144142][ C1] write to 0xffff888237d28858 of 8 bytes by interrupt on cpu 1: [ 38.161314][ T1823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.163034][ C1] prandom_u32+0x12f/0x190 [ 38.163058][ C1] mrp_join_timer+0x3ea/0x430 [ 38.163079][ C1] call_timer_fn+0x2e/0x240 [ 38.172581][ T1823] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.177373][ C1] expire_timers+0x116/0x240 [ 38.195507][ T1823] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.197440][ C1] __run_timers+0x350/0x400 [ 38.204028][ T1823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.208562][ C1] run_timer_softirq+0x2e/0x60 [ 38.226517][ T1823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.233655][ C1] __do_softirq+0x158/0x2e3 [ 38.233678][ C1] irq_exit_rcu+0x41/0x70 [ 38.233696][ C1] sysvec_apic_timer_interrupt+0x8d/0xb0 [ 38.243524][ T1828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.245175][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 38.272251][ C1] acpi_idle_enter+0x27b/0x300 [ 38.277012][ C1] cpuidle_enter_state+0x2ee/0x7a0 [ 38.282128][ C1] cpuidle_enter+0x3c/0x60 [ 38.286540][ C1] do_idle+0x1b2/0x250 [ 38.290606][ C1] cpu_startup_entry+0x15/0x20 [ 38.295370][ C1] start_secondary+0x78/0x80 [ 38.299958][ C1] secondary_startup_64_no_verify+0xc4/0xcb [ 38.305851][ C1] [ 38.308161][ C1] value changed: 0x83b81255c99e33d9 -> 0x7dbd85fd6d502dc7 [ 38.315256][ C1] [ 38.317565][ C1] Reported by Kernel Concurrency Sanitizer on: [ 38.323696][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.18.0-rc5-syzkaller-00178-g30c8e80f7932-dirty #0 [ 38.333929][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.343976][ C1] ================================================================== [ 38.361247][ T1827] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.371606][ T1827] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.383496][ T1838] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 38.392348][ T1838] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 38.400630][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.408247][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.415874][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.425328][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.433629][ T1916] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.440679][ T1916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.448515][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.457015][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.465295][ T1916] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.472335][ T1916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.480017][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.488674][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.497430][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 38.505751][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 38.514037][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.522334][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.530772][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.538791][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.547108][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.555298][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.563411][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.570996][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.578618][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.587029][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.595188][ T1916] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.602300][ T1916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.609985][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.618489][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.626722][ T1916] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.633788][ T1916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.641481][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.650113][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.659075][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 38.667401][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 38.675933][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.684586][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.693342][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.701654][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.710091][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.718497][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.726752][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 38.734167][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 38.741523][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.750077][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.758639][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.766877][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.775286][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.783560][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.798778][ T1820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.823740][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.831646][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 38.845442][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.853060][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.860797][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 38.868812][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.876375][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.883880][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 38.891214][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 38.898707][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.907166][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.919719][ T1827] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.941592][ T1828] device veth0_vlan entered promiscuous mode [ 38.950166][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 38.957923][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 38.965810][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.973967][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.983032][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.990529][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.010314][ T1847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.019490][ T1828] device veth1_vlan entered promiscuous mode [ 39.034699][ T1847] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.051108][ T1823] device veth0_vlan entered promiscuous mode [ 39.061580][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 39.069712][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 39.078535][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.086275][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.094666][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.102764][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.111270][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.119073][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.129793][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 39.138328][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.149556][ T1823] device veth1_vlan entered promiscuous mode [ 39.165470][ T1828] device veth0_macvtap entered promiscuous mode [ 39.180292][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 39.188186][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.196744][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.205106][ T1916] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.212176][ T1916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.219979][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 39.228239][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.236628][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.244973][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.253198][ T1916] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.260258][ T1916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.267902][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.276381][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.285129][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.293566][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.305711][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 39.313631][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.321301][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 39.329181][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.337001][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 39.345414][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.358664][ T1838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.367479][ T1828] device veth1_macvtap entered promiscuous mode [ 39.378785][ T1847] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 39.389217][ T1847] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.408353][ T1838] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.421613][ T1820] device veth0_vlan entered promiscuous mode [ 39.429238][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 39.437122][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.445926][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.454428][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.462798][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.470935][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.479243][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.487350][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 39.495874][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.504132][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.511595][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.519246][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.527367][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.536897][ T1823] device veth0_macvtap entered promiscuous mode [ 39.546063][ T1823] device veth1_macvtap entered promiscuous mode [ 39.559323][ T1828] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.566735][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.574377][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 39.583008][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 39.590953][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.598609][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.606268][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.614714][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.622979][ T77] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.630006][ T77] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.637756][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.646243][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.655148][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.667483][ T1847] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.685074][ T1827] device veth0_vlan entered promiscuous mode [ 39.691827][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 39.699184][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 39.707302][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.715958][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.724311][ T1914] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.731402][ T1914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.739135][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.747781][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.755982][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.764779][ T1823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.775279][ T1823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.785943][ T1823] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.794627][ T1820] device veth1_vlan entered promiscuous mode [ 39.803012][ T1828] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.813329][ T1828] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.822072][ T1828] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.830750][ T1828] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.839515][ T1828] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.850105][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 39.858272][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.865806][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.873477][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.882007][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.890568][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 39.899089][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.907543][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.915973][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.924284][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.933351][ T1823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.943769][ T1823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.954993][ T1823] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.969522][ T1820] device veth0_macvtap entered promiscuous mode [ 39.980493][ T1838] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 39.990917][ T1838] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.005523][ T1827] device veth1_vlan entered promiscuous mode [ 40.014320][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 40.022374][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.030845][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.039273][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.047637][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.056016][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 40.064281][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 40.072862][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 40.081135][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.089363][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 40.097504][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.106671][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 40.114543][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 40.123013][ T1823] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.131772][ T1823] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.140442][ T1823] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.149173][ T1823] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.171859][ T1820] device veth1_macvtap entered promiscuous mode [ 40.178634][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.186545][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.194008][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.203213][ T1838] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.244340][ T24] audit: type=1400 audit(1652021805.503:90): avc: denied { mounton } for pid=1828 comm="syz-executor.2" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 40.269543][ T1827] device veth0_macvtap entered promiscuous mode [ 40.281411][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.294306][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.306023][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.316445][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.326244][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.336680][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.347379][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.360840][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.371282][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.381133][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.381913][ T24] audit: type=1400 audit(1652021805.623:91): avc: denied { read write } for pid=1828 comm="syz-executor.2" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 40.391538][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.393039][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.415739][ T24] audit: type=1400 audit(1652021805.623:92): avc: denied { open } for pid=1828 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 40.456752][ T24] audit: type=1400 audit(1652021805.623:93): avc: denied { ioctl } for pid=1828 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 40.482433][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 40.483221][ T24] audit: type=1400 audit(1652021805.693:94): avc: denied { open } for pid=1990 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 40.509459][ T24] audit: type=1400 audit(1652021805.693:95): avc: denied { perfmon } for pid=1990 comm="syz-executor.2" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 40.510991][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.530524][ T24] audit: type=1400 audit(1652021805.693:96): avc: denied { kernel } for pid=1990 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 40.559938][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.568610][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.578113][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.587772][ T1827] device veth1_macvtap entered promiscuous mode [ 40.598499][ T1820] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.607323][ T1820] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.608455][ T24] audit: type=1400 audit(1652021805.853:97): avc: denied { create } for pid=1990 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 40.616026][ T1820] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.644636][ T1820] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.661985][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.670011][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.684230][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.686341][ T24] audit: type=1400 audit(1652021805.943:98): avc: denied { mounton } for pid=1998 comm="syz-executor.0" path="/root/syzkaller-testdir2461865211/syzkaller.HCjShq/0/file0" dev="sda1" ino=1162 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 40.696518][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.719149][ T24] audit: type=1400 audit(1652021805.943:99): avc: denied { mount } for pid=1998 comm="syz-executor.0" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 40.729593][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.761479][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.771892][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.781667][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 14:56:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000580)='./bus\x00', 0x0) chdir(&(0x7f0000000200)='./bus\x00') r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) lchown(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) 14:56:46 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 40.792093][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.804010][ T1827] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.821907][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.841074][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 14:56:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000580)='./bus\x00', 0x0) chdir(&(0x7f0000000200)='./bus\x00') r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) lchown(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) [ 40.858455][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.868906][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.878740][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.889237][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:56:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000580)='./bus\x00', 0x0) chdir(&(0x7f0000000200)='./bus\x00') r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) lchown(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) 14:56:46 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 40.899125][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.909608][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.928630][ T1827] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.944749][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 14:56:46 executing program 0: unshare(0xc040400) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0xc0286687) [ 40.954240][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.968269][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.982372][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.999488][ T1827] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 14:56:46 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 41.008287][ T1827] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.016984][ T1827] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.025673][ T1827] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 14:56:46 executing program 1: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000000040)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 41.077330][ T1847] device veth0_vlan entered promiscuous mode [ 41.090448][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.104471][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.120360][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.128361][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.140856][ T1847] device veth1_vlan entered promiscuous mode [ 41.169896][ T1838] device veth0_vlan entered promiscuous mode [ 41.179293][ T1838] device veth1_vlan entered promiscuous mode [ 41.189901][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.198401][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 41.206655][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.214791][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.223474][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.231404][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.239796][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.249389][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.257201][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.273819][ T1847] device veth0_macvtap entered promiscuous mode [ 41.282521][ T1847] device veth1_macvtap entered promiscuous mode [ 41.313084][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 41.321228][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.329490][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.337468][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.345885][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.356394][ T1847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.366887][ T1847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.376777][ T1847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.387237][ T1847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.397052][ T1847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.407452][ T1847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.417308][ T1847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.427706][ T1847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.438879][ T1847] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.447958][ T1838] device veth0_macvtap entered promiscuous mode [ 41.455459][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.463545][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.472389][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.483716][ T1847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.494332][ T1847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.504132][ T1847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.514533][ T1847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.524323][ T1847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.534813][ T1847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.544678][ T1847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.555078][ T1847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.566098][ T1847] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.574593][ T1838] device veth1_macvtap entered promiscuous mode [ 41.581875][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.589852][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.598541][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.612807][ T1847] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.621492][ T1847] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.630203][ T1847] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.639000][ T1847] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.655213][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.665636][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.675516][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.685917][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.695767][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.706264][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.716054][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.726491][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.736284][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.746703][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.758048][ T1838] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.774558][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.783456][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.794493][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.804960][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.814770][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.825245][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.835033][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.845461][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.855262][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.865666][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.875458][ T1838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.885868][ T1838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.897435][ T1838] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.907963][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.916594][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.931420][ T1838] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.940149][ T1838] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.948830][ T1838] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.957582][ T1838] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 14:56:47 executing program 3: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x100}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:56:47 executing program 0: unshare(0xc040400) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0xc0286687) 14:56:47 executing program 1: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000000040)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 14:56:47 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000180)=0x5, 0x9) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @quota={{0xa}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 14:56:47 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x4048084) 14:56:47 executing program 0: unshare(0xc040400) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0xc0286687) 14:56:47 executing program 1: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000000040)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 14:56:47 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x4048084) 14:56:47 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:47 executing program 0: unshare(0xc040400) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0xc0286687) 14:56:47 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x4048084) 14:56:48 executing program 3: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x100}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:56:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000180)=0x5, 0x9) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @quota={{0xa}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 14:56:48 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:48 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:48 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:48 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:48 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:48 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:48 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:48 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:48 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:48 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:49 executing program 3: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x100}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:56:49 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x6]}, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x6d4}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x9, 0x7, 0x5}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x4b30, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) 14:56:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000180)=0x5, 0x9) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @quota={{0xa}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 14:56:49 executing program 2: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x100}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:56:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @exit], &(0x7f0000000180)='GPL\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:56:49 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x2, 0x2, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@remote}}, @sadb_x_policy={0x24, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@private2, @in6=@rand_addr=' \x01\x00'}}, @sadb_x_sa2={0x2}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in6=@private0}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0x130}}, 0x0) 14:56:49 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x2, 0x2, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@remote}}, @sadb_x_policy={0x24, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@private2, @in6=@rand_addr=' \x01\x00'}}, @sadb_x_sa2={0x2}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in6=@private0}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0x130}}, 0x0) 14:56:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @exit], &(0x7f0000000180)='GPL\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:56:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f00000001c0)=@in6={0x2, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in={0xa, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[@timestamping={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 14:56:49 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x2, 0x2, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@remote}}, @sadb_x_policy={0x24, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@private2, @in6=@rand_addr=' \x01\x00'}}, @sadb_x_sa2={0x2}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in6=@private0}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0x130}}, 0x0) 14:56:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000180)=0x5, 0x9) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @quota={{0xa}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 14:56:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @exit], &(0x7f0000000180)='GPL\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:56:49 executing program 2: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x100}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:56:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f00000001c0)=@in6={0x2, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in={0xa, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[@timestamping={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 14:56:49 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x2, 0x2, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@remote}}, @sadb_x_policy={0x24, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@private2, @in6=@rand_addr=' \x01\x00'}}, @sadb_x_sa2={0x2}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in6=@private0}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0x130}}, 0x0) 14:56:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @exit], &(0x7f0000000180)='GPL\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:56:49 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)='!pu\t\t<6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 14:56:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x10, 0x11, 0x0, 0x1, @hash={{0x9}, @void}}]}], {0x14, 0x10}}, 0x94}}, 0x0) 14:56:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f00000001c0)=@in6={0x2, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in={0xa, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[@timestamping={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 14:56:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x70, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x34, 0x11, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_LEN={0x8}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}}]}], {0x14, 0x10}}, 0xb8}}, 0x0) 14:56:49 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)='!pu\t\t<6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 14:56:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f00000001c0)=@in6={0x2, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in={0xa, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[@timestamping={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 14:56:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:50 executing program 2: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x100}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:56:50 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:50 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)='!pu\t\t<6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 14:56:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x10, 0x11, 0x0, 0x1, @hash={{0x9}, @void}}]}], {0x14, 0x10}}, 0x94}}, 0x0) 14:56:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x70, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x34, 0x11, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_LEN={0x8}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}}]}], {0x14, 0x10}}, 0xb8}}, 0x0) 14:56:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:50 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:50 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)='!pu\t\t<6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 14:56:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x70, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x34, 0x11, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_LEN={0x8}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}}]}], {0x14, 0x10}}, 0xb8}}, 0x0) 14:56:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:50 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:51 executing program 1: set_mempolicy(0x3, &(0x7f0000000080)=0x622f7f31, 0x101) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/mdstat\x00', 0x0, 0x0) 14:56:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x10, 0x11, 0x0, 0x1, @hash={{0x9}, @void}}]}], {0x14, 0x10}}, 0x94}}, 0x0) 14:56:51 executing program 4: syz_emit_ethernet(0x2c6, &(0x7f0000000700)={@local, @link_local={0xe}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "7ec000", 0x290, 0x3a, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0xa, "a78ce540b259808000000000040023493b87aafaffffffffffffff230a2472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5af1902"}, {0x0, 0x1, "ffffefffc5dcf62ae9db598c"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92326a7051e460a13ddde25a5b85b9d93090d625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb84619755403946f5ab6560d2d0124624cc383bf15d4fe6b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d255518751501f4d980e61c2d908a95c5f4a1a2367bc591dd8b094822ff0822a18b79f7c5eba31fb68b2d734a6671e27182aee4de24a4a5c6186c0df000000f390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907cbaa39eb8164e240069f656d3a05fecf894222a141123f5acaa556b9f30dcab2b90aa23e667016effc5dc49dfb58d8931"}, {0x1f, 0xd, "b2983cd6569b1fd77921b6d1fe14db4ad8f2f4f5a6a19006913b48aabf840689f1a9f4a73265018644e28ca709ebd97347f34a2c9a5fd353b64728a136d0b46f0fd042c8caf90fa5c7a078270832beebc46f62ba86d1462205a1f25eb4582f6c71260000000001"}, {0x1, 0x0, "bf83154139"}]}}}}}}, 0x0) 14:56:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x70, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x34, 0x11, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_LEN={0x8}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}}]}], {0x14, 0x10}}, 0xb8}}, 0x0) 14:56:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:51 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYSTEM={0x8, 0x1a, @multicast1}, @IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x44}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005f3f770005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 14:56:51 executing program 4: syz_emit_ethernet(0x2c6, &(0x7f0000000700)={@local, @link_local={0xe}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "7ec000", 0x290, 0x3a, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0xa, "a78ce540b259808000000000040023493b87aafaffffffffffffff230a2472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5af1902"}, {0x0, 0x1, "ffffefffc5dcf62ae9db598c"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92326a7051e460a13ddde25a5b85b9d93090d625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb84619755403946f5ab6560d2d0124624cc383bf15d4fe6b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d255518751501f4d980e61c2d908a95c5f4a1a2367bc591dd8b094822ff0822a18b79f7c5eba31fb68b2d734a6671e27182aee4de24a4a5c6186c0df000000f390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907cbaa39eb8164e240069f656d3a05fecf894222a141123f5acaa556b9f30dcab2b90aa23e667016effc5dc49dfb58d8931"}, {0x1f, 0xd, "b2983cd6569b1fd77921b6d1fe14db4ad8f2f4f5a6a19006913b48aabf840689f1a9f4a73265018644e28ca709ebd97347f34a2c9a5fd353b64728a136d0b46f0fd042c8caf90fa5c7a078270832beebc46f62ba86d1462205a1f25eb4582f6c71260000000001"}, {0x1, 0x0, "bf83154139"}]}}}}}}, 0x0) 14:56:51 executing program 1: set_mempolicy(0x3, &(0x7f0000000080)=0x622f7f31, 0x101) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/mdstat\x00', 0x0, 0x0) 14:56:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdc0}]}) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:56:51 executing program 1: set_mempolicy(0x3, &(0x7f0000000080)=0x622f7f31, 0x101) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/mdstat\x00', 0x0, 0x0) 14:56:51 executing program 4: syz_emit_ethernet(0x2c6, &(0x7f0000000700)={@local, @link_local={0xe}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "7ec000", 0x290, 0x3a, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0xa, "a78ce540b259808000000000040023493b87aafaffffffffffffff230a2472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5af1902"}, {0x0, 0x1, "ffffefffc5dcf62ae9db598c"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92326a7051e460a13ddde25a5b85b9d93090d625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb84619755403946f5ab6560d2d0124624cc383bf15d4fe6b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d255518751501f4d980e61c2d908a95c5f4a1a2367bc591dd8b094822ff0822a18b79f7c5eba31fb68b2d734a6671e27182aee4de24a4a5c6186c0df000000f390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907cbaa39eb8164e240069f656d3a05fecf894222a141123f5acaa556b9f30dcab2b90aa23e667016effc5dc49dfb58d8931"}, {0x1f, 0xd, "b2983cd6569b1fd77921b6d1fe14db4ad8f2f4f5a6a19006913b48aabf840689f1a9f4a73265018644e28ca709ebd97347f34a2c9a5fd353b64728a136d0b46f0fd042c8caf90fa5c7a078270832beebc46f62ba86d1462205a1f25eb4582f6c71260000000001"}, {0x1, 0x0, "bf83154139"}]}}}}}}, 0x0) 14:56:51 executing program 5: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000080000001f0000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6211813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x44, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) 14:56:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60fe01, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) recvmmsg(r2, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/96, 0x60}], 0x1}}, {{0x0, 0x0, &(0x7f0000001740)}}, {{0x0, 0x0, 0x0}}], 0x3, 0x1, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(r3, 0x3, &(0x7f0000000000)=[&(0x7f0000259000/0x4000)=nil, &(0x7f000010d000/0x3000)=nil, &(0x7f00000cd000/0xb000)=nil], &(0x7f0000000040)=[0x0, 0x0, 0x6, 0x2], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0) 14:56:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x10, 0x11, 0x0, 0x1, @hash={{0x9}, @void}}]}], {0x14, 0x10}}, 0x94}}, 0x0) 14:56:51 executing program 1: set_mempolicy(0x3, &(0x7f0000000080)=0x622f7f31, 0x101) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/mdstat\x00', 0x0, 0x0) 14:56:51 executing program 4: syz_emit_ethernet(0x2c6, &(0x7f0000000700)={@local, @link_local={0xe}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "7ec000", 0x290, 0x3a, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0xa, "a78ce540b259808000000000040023493b87aafaffffffffffffff230a2472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5af1902"}, {0x0, 0x1, "ffffefffc5dcf62ae9db598c"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92326a7051e460a13ddde25a5b85b9d93090d625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb84619755403946f5ab6560d2d0124624cc383bf15d4fe6b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d255518751501f4d980e61c2d908a95c5f4a1a2367bc591dd8b094822ff0822a18b79f7c5eba31fb68b2d734a6671e27182aee4de24a4a5c6186c0df000000f390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907cbaa39eb8164e240069f656d3a05fecf894222a141123f5acaa556b9f30dcab2b90aa23e667016effc5dc49dfb58d8931"}, {0x1f, 0xd, "b2983cd6569b1fd77921b6d1fe14db4ad8f2f4f5a6a19006913b48aabf840689f1a9f4a73265018644e28ca709ebd97347f34a2c9a5fd353b64728a136d0b46f0fd042c8caf90fa5c7a078270832beebc46f62ba86d1462205a1f25eb4582f6c71260000000001"}, {0x1, 0x0, "bf83154139"}]}}}}}}, 0x0) 14:56:51 executing program 1: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) [ 46.392462][ T2205] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 46.401840][ T2205] netlink: 'syz-executor.2': attribute type 7 has an invalid length. [ 46.415717][ T24] kauditd_printk_skb: 11 callbacks suppressed [ 46.415730][ T24] audit: type=1400 audit(1652021811.663:111): avc: denied { prog_run } for pid=2203 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 14:56:52 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYSTEM={0x8, 0x1a, @multicast1}, @IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x44}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005f3f770005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 14:56:52 executing program 4: prctl$PR_SET_MM_MAP(0x3c, 0xe, &(0x7f0000000140)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff7000/0x7000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) 14:56:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x6c}, {0x7c}, {0x6, 0x0, 0x0, 0xffffff99}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 14:56:52 executing program 1: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 14:56:52 executing program 5: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000080000001f0000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6211813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x44, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) 14:56:52 executing program 4: prctl$PR_SET_MM_MAP(0x3c, 0xe, &(0x7f0000000140)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff7000/0x7000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) [ 47.176310][ T2205] syz-executor.2 (2205) used greatest stack depth: 11208 bytes left [ 47.201109][ T24] audit: type=1400 audit(1652021812.453:112): avc: denied { setopt } for pid=2226 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 14:56:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60fe01, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) recvmmsg(r2, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/96, 0x60}], 0x1}}, {{0x0, 0x0, &(0x7f0000001740)}}, {{0x0, 0x0, 0x0}}], 0x3, 0x1, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(r3, 0x3, &(0x7f0000000000)=[&(0x7f0000259000/0x4000)=nil, &(0x7f000010d000/0x3000)=nil, &(0x7f00000cd000/0xb000)=nil], &(0x7f0000000040)=[0x0, 0x0, 0x6, 0x2], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0) 14:56:52 executing program 4: prctl$PR_SET_MM_MAP(0x3c, 0xe, &(0x7f0000000140)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff7000/0x7000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) 14:56:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x6c}, {0x7c}, {0x6, 0x0, 0x0, 0xffffff99}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) [ 47.242974][ T2233] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 47.252345][ T2233] netlink: 'syz-executor.2': attribute type 7 has an invalid length. 14:56:52 executing program 4: prctl$PR_SET_MM_MAP(0x3c, 0xe, &(0x7f0000000140)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff7000/0x7000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) 14:56:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x6c}, {0x7c}, {0x6, 0x0, 0x0, 0xffffff99}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 14:56:52 executing program 5: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000080000001f0000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6211813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x44, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) 14:56:53 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYSTEM={0x8, 0x1a, @multicast1}, @IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x44}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005f3f770005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 14:56:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60fe01, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) recvmmsg(r2, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/96, 0x60}], 0x1}}, {{0x0, 0x0, &(0x7f0000001740)}}, {{0x0, 0x0, 0x0}}], 0x3, 0x1, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(r3, 0x3, &(0x7f0000000000)=[&(0x7f0000259000/0x4000)=nil, &(0x7f000010d000/0x3000)=nil, &(0x7f00000cd000/0xb000)=nil], &(0x7f0000000040)=[0x0, 0x0, 0x6, 0x2], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0) 14:56:53 executing program 1: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 14:56:53 executing program 5: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000080000001f0000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6211813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x44, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) 14:56:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x6c}, {0x7c}, {0x6, 0x0, 0x0, 0xffffff99}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0)