[ 21.638466][ T28] audit: type=1400 audit(1712678446.328:81): avc: denied { read } for pid=2767 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.49' (ED25519) to the list of known hosts. 2024/04/09 16:00:50 fuzzer started 2024/04/09 16:00:50 dialing manager at 10.128.0.163:30015 [ 26.187607][ T28] audit: type=1400 audit(1712678450.878:82): avc: denied { node_bind } for pid=3076 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 26.208387][ T28] audit: type=1400 audit(1712678450.878:83): avc: denied { name_bind } for pid=3076 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 26.275393][ T28] audit: type=1400 audit(1712678450.958:84): avc: denied { mounton } for pid=3083 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.276670][ T3083] cgroup: Unknown subsys name 'net' [ 26.298157][ T28] audit: type=1400 audit(1712678450.968:85): avc: denied { mount } for pid=3083 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.325547][ T28] audit: type=1400 audit(1712678450.998:86): avc: denied { unmount } for pid=3083 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.437159][ T3083] cgroup: Unknown subsys name 'rlimit' [ 26.557321][ T28] audit: type=1400 audit(1712678451.248:87): avc: denied { mounton } for pid=3083 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.583014][ T28] audit: type=1400 audit(1712678451.248:88): avc: denied { mount } for pid=3083 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.606283][ T28] audit: type=1400 audit(1712678451.248:89): avc: denied { create } for pid=3083 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.626776][ T28] audit: type=1400 audit(1712678451.248:90): avc: denied { write } for pid=3083 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.635261][ T3084] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.647210][ T28] audit: type=1400 audit(1712678451.248:91): avc: denied { read } for pid=3083 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2024/04/09 16:00:51 syscalls: 2893 2024/04/09 16:00:51 code coverage: enabled 2024/04/09 16:00:51 comparison tracing: enabled 2024/04/09 16:00:51 extra coverage: enabled 2024/04/09 16:00:51 delay kcov mmap: enabled 2024/04/09 16:00:51 setuid sandbox: enabled 2024/04/09 16:00:51 namespace sandbox: enabled 2024/04/09 16:00:51 Android sandbox: enabled 2024/04/09 16:00:51 fault injection: enabled 2024/04/09 16:00:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/04/09 16:00:51 net packet injection: enabled 2024/04/09 16:00:51 net device setup: enabled 2024/04/09 16:00:51 concurrency sanitizer: enabled 2024/04/09 16:00:51 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/04/09 16:00:51 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/04/09 16:00:51 USB emulation: /dev/raw-gadget does not exist 2024/04/09 16:00:51 hci packet injection: /dev/vhci does not exist 2024/04/09 16:00:51 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/04/09 16:00:51 802.15.4 emulation: enabled 2024/04/09 16:00:51 swap file: enabled 2024/04/09 16:00:51 suppressing KCSAN reports in functions: 'xas_clear_mark' 'ext4_free_inodes_count' 'process_scheduled_works' 'atime_needs_update' '__xa_clear_mark' '__count_memcg_events' 'ext4_mark_iloc_dirty' 'jbd2_journal_stop' 'd_instantiate_new' 'exit_mm' '__mod_memcg_state' 'wg_packet_send_staged_packets' 'd_delete' 'vmalloc_info_show' 'jbd2_journal_dirty_metadata' 'alloc_pid' [ 26.753381][ T3083] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/04/09 16:00:51 starting 5 executor processes [ 27.425298][ T3095] chnl_net:caif_netlink_parms(): no params data found [ 27.498176][ T3101] chnl_net:caif_netlink_parms(): no params data found [ 27.542348][ T3096] chnl_net:caif_netlink_parms(): no params data found [ 27.558012][ T3095] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.565080][ T3095] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.572413][ T3095] bridge_slave_0: entered allmulticast mode [ 27.578738][ T3095] bridge_slave_0: entered promiscuous mode [ 27.601750][ T3117] chnl_net:caif_netlink_parms(): no params data found [ 27.610263][ T3095] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.617331][ T3095] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.624593][ T3095] bridge_slave_1: entered allmulticast mode [ 27.631042][ T3095] bridge_slave_1: entered promiscuous mode [ 27.649831][ T3101] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.657012][ T3101] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.664109][ T3101] bridge_slave_0: entered allmulticast mode [ 27.670499][ T3101] bridge_slave_0: entered promiscuous mode [ 27.695997][ T3101] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.703063][ T3101] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.710801][ T3101] bridge_slave_1: entered allmulticast mode [ 27.717282][ T3101] bridge_slave_1: entered promiscuous mode [ 27.740237][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.749376][ T3113] chnl_net:caif_netlink_parms(): no params data found [ 27.764509][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.781454][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.799155][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.818028][ T3096] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.825122][ T3096] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.832309][ T3096] bridge_slave_0: entered allmulticast mode [ 27.838805][ T3096] bridge_slave_0: entered promiscuous mode [ 27.856329][ T3095] team0: Port device team_slave_0 added [ 27.865127][ T3095] team0: Port device team_slave_1 added [ 27.875190][ T3096] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.882261][ T3096] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.889503][ T3096] bridge_slave_1: entered allmulticast mode [ 27.895919][ T3096] bridge_slave_1: entered promiscuous mode [ 27.911412][ T3117] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.918521][ T3117] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.925648][ T3117] bridge_slave_0: entered allmulticast mode [ 27.932054][ T3117] bridge_slave_0: entered promiscuous mode [ 27.953477][ T3101] team0: Port device team_slave_0 added [ 27.966098][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.975292][ T3117] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.982442][ T3117] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.989619][ T3117] bridge_slave_1: entered allmulticast mode [ 27.995974][ T3117] bridge_slave_1: entered promiscuous mode [ 28.011721][ T3095] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.018696][ T3095] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.044769][ T3095] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.055892][ T3095] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.062873][ T3095] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.088882][ T3095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.100192][ T3101] team0: Port device team_slave_1 added [ 28.111557][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.126352][ T3117] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.138614][ T3117] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.180515][ T3101] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.187522][ T3101] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.213488][ T3101] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.224723][ T3101] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.231702][ T3101] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.257649][ T3101] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.273525][ T3113] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.280780][ T3113] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.288160][ T3113] bridge_slave_0: entered allmulticast mode [ 28.294565][ T3113] bridge_slave_0: entered promiscuous mode [ 28.301755][ T3117] team0: Port device team_slave_0 added [ 28.308577][ T3117] team0: Port device team_slave_1 added [ 28.327200][ T3095] hsr_slave_0: entered promiscuous mode [ 28.333097][ T3095] hsr_slave_1: entered promiscuous mode [ 28.340197][ T3096] team0: Port device team_slave_0 added [ 28.346082][ T3113] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.353138][ T3113] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.360433][ T3113] bridge_slave_1: entered allmulticast mode [ 28.366867][ T3113] bridge_slave_1: entered promiscuous mode [ 28.394507][ T3096] team0: Port device team_slave_1 added [ 28.417672][ T3117] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.424627][ T3117] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.450685][ T3117] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.462183][ T3117] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.469356][ T3117] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.495263][ T3117] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.507855][ T3101] hsr_slave_0: entered promiscuous mode [ 28.513770][ T3101] hsr_slave_1: entered promiscuous mode [ 28.519689][ T3101] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.527266][ T3101] Cannot create hsr debugfs directory [ 28.538090][ T3096] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.545046][ T3096] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.570999][ T3096] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.588460][ T3113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.610107][ T3096] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.617141][ T3096] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.643059][ T3096] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.654832][ T3113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.689879][ T3117] hsr_slave_0: entered promiscuous mode [ 28.695958][ T3117] hsr_slave_1: entered promiscuous mode [ 28.701831][ T3117] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.709416][ T3117] Cannot create hsr debugfs directory [ 28.721947][ T3113] team0: Port device team_slave_0 added [ 28.728559][ T3113] team0: Port device team_slave_1 added [ 28.777371][ T3096] hsr_slave_0: entered promiscuous mode [ 28.783555][ T3096] hsr_slave_1: entered promiscuous mode [ 28.789555][ T3096] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.797147][ T3096] Cannot create hsr debugfs directory [ 28.803054][ T3113] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.810123][ T3113] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.836122][ T3113] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.849068][ T3113] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.856095][ T3113] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.882067][ T3113] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.922898][ T3113] hsr_slave_0: entered promiscuous mode [ 28.930163][ T3113] hsr_slave_1: entered promiscuous mode [ 28.936240][ T3113] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.943781][ T3113] Cannot create hsr debugfs directory [ 29.015975][ T3101] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.024554][ T3101] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.034304][ T3101] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.045143][ T3101] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.079096][ T3095] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.088269][ T3095] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.096900][ T3095] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.107652][ T3095] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.141233][ T3096] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.149883][ T3096] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.159181][ T3096] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.167933][ T3096] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.208312][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.216594][ T3117] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.225483][ T3117] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.234986][ T3117] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.244383][ T3117] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.269505][ T3101] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.301074][ T3173] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.308339][ T3173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.317214][ T3173] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.324302][ T3173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.339092][ T3113] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.348917][ T3113] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.357873][ T3113] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.374488][ T3113] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.436246][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.450785][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.459908][ T3117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.480625][ T3095] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.491420][ T3117] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.505379][ T3173] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.512533][ T3173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.528858][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.536036][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.546186][ T3096] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.570251][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.577325][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.589415][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.596585][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.609902][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.617053][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.631897][ T3101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.643243][ T3117] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.653842][ T3117] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.676433][ T3174] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.683528][ T3174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.703894][ T3113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.720512][ T3113] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.743865][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.750990][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.761437][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.768547][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.782392][ T3096] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.814736][ T3095] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.825290][ T3095] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.839550][ T3117] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.851786][ T3113] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.862205][ T3113] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.894714][ T3101] veth0_vlan: entered promiscuous mode [ 29.923372][ T3101] veth1_vlan: entered promiscuous mode [ 29.941310][ T3096] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.959057][ T3101] veth0_macvtap: entered promiscuous mode [ 29.984170][ T3101] veth1_macvtap: entered promiscuous mode [ 30.002922][ T3113] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.021108][ T3101] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.031687][ T3101] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.058916][ T3101] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.067707][ T3101] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.076544][ T3101] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.085424][ T3101] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:00:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x80, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x5dc, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 30.103339][ T3095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.114835][ T3117] veth0_vlan: entered promiscuous mode [ 30.140598][ T3117] veth1_vlan: entered promiscuous mode 16:00:54 executing program 0: 16:00:54 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r0}, 0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f0000000440), 0x10) listen(r1, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) writev(r2, &(0x7f00000002c0)=[{&(0x7f0000000080)='?', 0x20000081}], 0x2) [ 30.204909][ T3113] veth0_vlan: entered promiscuous mode [ 30.219041][ T3117] veth0_macvtap: entered promiscuous mode [ 30.234555][ T3113] veth1_vlan: entered promiscuous mode [ 30.255962][ T3117] veth1_macvtap: entered promiscuous mode [ 30.276601][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.287154][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.299092][ T3117] batman_adv: batadv0: Interface activated: batadv_slave_0 16:00:55 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x1401, 0x1}, 0x10}}, 0x0) 16:00:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) quotactl_fd$Q_GETFMT(r0, 0xffffffff80000402, 0x0, 0x0) [ 30.312520][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.323147][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.351842][ T3117] batman_adv: batadv0: Interface activated: batadv_slave_1 16:00:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000f00)=0x1000000, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth0_to_team\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002240)=[{{&(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @local, @loopback}}}], 0x20}}], 0x1, 0x0) 16:00:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xfffffe1f, &(0x7f00000004c0)=""/153}, 0x15) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x12, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x81d, 0x0, 0x20}, 0x28) [ 30.362930][ T3117] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.371741][ T3117] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.380733][ T3117] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.389552][ T3117] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:00:55 executing program 0: epoll_create1(0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) utimes(0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={r3}, 0x8) [ 30.413348][ T3095] veth0_vlan: entered promiscuous mode [ 30.438344][ T3113] veth0_macvtap: entered promiscuous mode [ 30.453395][ T3095] veth1_vlan: entered promiscuous mode 16:00:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000140)='proc\x00', 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)) syz_open_procfs(r1, &(0x7f0000000100)='auxv\x00') [ 30.462318][ T3113] veth1_macvtap: entered promiscuous mode [ 30.482117][ T3096] veth0_vlan: entered promiscuous mode [ 30.505850][ T3113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.516371][ T3113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.526261][ T3113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.530104][ T3254] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure 16:00:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_retopts={{0x28, 0x0, 0x7, {[@ra={0x94, 0x2}, @timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x0, [{@multicast1}, {@empty}]}]}}}], 0x28}, 0x0) 16:00:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000440)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000400)={r4, 0x1, 0x6}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000cc0)={r4, 0x1, 0x3, @remote}, 0x10) [ 30.536744][ T3113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.541996][ T3113] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.566733][ T3095] veth0_macvtap: entered promiscuous mode [ 30.575214][ T3095] veth1_macvtap: entered promiscuous mode [ 30.583420][ T3096] veth1_vlan: entered promiscuous mode 16:00:55 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x1401, 0x1}, 0x10}}, 0x0) 16:00:55 executing program 0: r0 = memfd_create(&(0x7f0000000580)='\x00\xac=\x9d\xd2?\xbe\xfd!\xee\xc97`_\tz\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10[&\x02k`(\x91^6\x04\x89r{raA\xb2\xb2\x12c\x11\x01Z<\xad\x97\xb8\xdc\xa6x\xcb\x89\xce\x17\xba\xe3\x0eS\"\xea\x9d\x8ej\xa8\xfft\xc5\xa8\xf6\x96\xbb1-w\rp\x91\xc7\xd3V\x18^h.D\xa2\xdd\xeb\xa3@\xc7\x92#_\xfd\xf9\x15\xd5\xed\xfbv\xd7\x0f\'\x86kG\v\xb9\x1fn\xe0M\xef\x06\x00\x00\x00t\xaes\xebi\x89\xec\"\x8f\r\x82\xffl\xf9\xff\x83\x8a\x98\xd3z\xd9\xbf\xff\x1c\r\xf5\x98k13\f\xd71\xf5\n\xb2\f\x84\xfa\x97\xab\xca\xa3\xb5\xad\xa8\x8c\xbdi\xb8H4\x8e\xe0\xd7*\xc2\xb0+|hR\x13\xa1tz\ac\xbc\x10RM\xbfR\x10\xcf\xd0!p\x058%\xb3\x1e\bj^D\x1786\xfc3\xb6r\xfc\xd0\xa6\x06\xfa{\xd2cE4\xbd7\x02\xa1E\x87\xa6\xf8\x86I\xfb\x1c\xcfb\xcb\xa9k\xbe\x84\xc8B{\xba', 0x7) fallocate(r0, 0x0, 0x0, 0x40) read(r0, &(0x7f0000000100)=""/155, 0x9b) read(r0, &(0x7f0000000000)=""/214, 0x1a) [ 30.605844][ T3096] veth0_macvtap: entered promiscuous mode [ 30.619685][ T3113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.630206][ T3113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.640145][ T3113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 16:00:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000f00)=0x1000000, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth0_to_team\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002240)=[{{&(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @local, @loopback}}}], 0x20}}], 0x1, 0x0) 16:00:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@const={0x0, 0x2, 0x0, 0x13, 0x2}, @array={0x2}]}, {0x0, [0x0, 0x2e, 0x3d]}}, 0x0, 0x41}, 0x20) [ 30.651045][ T3113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.663347][ T3113] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.678780][ T3259] batadv_slave_1: entered promiscuous mode [ 30.685496][ T3258] batadv_slave_1: left promiscuous mode [ 30.691766][ T3095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:00:55 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000dc0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000e80)=ANY=[], 0xffdc) [ 30.702293][ T3095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.712435][ T3095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.722925][ T3095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.732769][ T3095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.743249][ T3095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:00:55 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x18, 0x0, &(0x7f00000001c0)) 16:00:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000240)=[0x0, 0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x66, 0x2, 0x8, 0x42}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r3, &(0x7f0000000340)="035af6", 0x20000000}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x3bb, 0x5, 0x7f, 0x16, r3, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x7, 0xfffffeff, 0x8, 0x1f, 0x1810, r3, 0x6, '\x00', r2, r1, 0x4, 0x3, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000140), &(0x7f0000000200)=""/137, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x0, 0x5, &(0x7f0000000100)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x800}], 0x0, 0x81, 0x1b, &(0x7f0000000580)=""/27, 0x40f00, 0x0, '\x00', r2, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[0xffffffffffffffff, r3]}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x53, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000880)='ext4_evict_inode\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') [ 30.755272][ T3095] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.763184][ T3096] veth1_macvtap: entered promiscuous mode [ 30.776909][ T3095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.787462][ T3095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:00:55 executing program 0: setpriority(0x3, 0x0, 0x0) 16:00:55 executing program 3: epoll_create1(0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) utimes(0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={r3}, 0x8) [ 30.797360][ T3095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.808074][ T3095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.817907][ T3095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.828612][ T3095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.840222][ T3095] batman_adv: batadv0: Interface activated: batadv_slave_1 16:00:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}]}}}]}, 0x44}}, 0x0) [ 30.849984][ T3096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.860570][ T3096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.870774][ T3096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.881391][ T3096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.891881][ T3096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:00:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) quotactl_fd$Q_GETFMT(r0, 0xffffffff80000402, 0x0, 0x0) 16:00:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_retopts={{0x28, 0x0, 0x7, {[@ra={0x94, 0x2}, @timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x0, [{@multicast1}, {@empty}]}]}}}], 0x28}, 0x0) [ 30.902505][ T3096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.912340][ T3096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.922785][ T3096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.936221][ T3096] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.944282][ T3113] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 16:00:55 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x1401, 0x1}, 0x10}}, 0x0) [ 30.953148][ T3113] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.962261][ T3113] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.971005][ T3113] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.991108][ T3096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 16:00:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a05c7b5d00008023e9c5bcf5ff7700"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ppoll(&(0x7f0000000000)=[{r3}], 0x1, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10, r4, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB]) 16:00:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000240)=[0x0, 0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x66, 0x2, 0x8, 0x42}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r3, &(0x7f0000000340)="035af6", 0x20000000}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x3bb, 0x5, 0x7f, 0x16, r3, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x7, 0xfffffeff, 0x8, 0x1f, 0x1810, r3, 0x6, '\x00', r2, r1, 0x4, 0x3, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000140), &(0x7f0000000200)=""/137, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x0, 0x5, &(0x7f0000000100)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x800}], 0x0, 0x81, 0x1b, &(0x7f0000000580)=""/27, 0x40f00, 0x0, '\x00', r2, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[0xffffffffffffffff, r3]}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x53, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000880)='ext4_evict_inode\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') [ 31.001691][ T3096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.011813][ T3096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.022298][ T3096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.032184][ T3096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.042771][ T3096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.052689][ T3096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.063167][ T3096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.078233][ T3096] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.097159][ T3096] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.105919][ T3096] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.114630][ T3096] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.123382][ T3096] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.137234][ T3095] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.146092][ T3095] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 16:00:55 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x45) listen(r0, 0x0) dup(r0) r1 = syz_io_uring_setup(0x5169, &(0x7f0000000200)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) syz_io_uring_setup(0xa94, &(0x7f0000000080), &(0x7f0000000040)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r1, 0x48e9, 0x0, 0x0, 0x0, 0x0) [ 31.154999][ T3095] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.163892][ T3095] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:00:55 executing program 1: io_setup(0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) preadv(r0, &(0x7f0000000c80)=[{&(0x7f0000000a00)=""/161, 0xa1}], 0x1, 0x0, 0x0) 16:00:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000440)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000400)={r4, 0x1, 0x6}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000cc0)={r4, 0x1, 0x3, @remote}, 0x10) 16:00:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@setneightbl={0x14, 0x43, 0x1}, 0x14}}, 0x0) [ 31.240758][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 31.240775][ T28] audit: type=1400 audit(1712678455.928:150): avc: denied { read } for pid=3297 comm="syz-executor.3" dev="nsfs" ino=4026532771 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 16:00:56 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000440)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x3c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x20, 0x2b, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}]}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}]}, 0x3c}}, 0x0) [ 31.306858][ T3303] batadv_slave_1: entered promiscuous mode [ 31.327515][ T28] audit: type=1400 audit(1712678455.928:151): avc: denied { open } for pid=3297 comm="syz-executor.3" path="net:[4026532771]" dev="nsfs" ino=4026532771 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.351185][ T28] audit: type=1400 audit(1712678455.928:152): avc: denied { create } for pid=3297 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 31.366526][ T3301] batadv_slave_1: left promiscuous mode [ 31.371820][ T28] audit: type=1400 audit(1712678455.928:153): avc: denied { bind } for pid=3297 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 31.397125][ T28] audit: type=1400 audit(1712678455.928:154): avc: denied { listen } for pid=3297 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 31.417474][ T28] audit: type=1400 audit(1712678455.928:155): avc: denied { create } for pid=3297 comm="syz-executor.3" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 31.438989][ T28] audit: type=1400 audit(1712678455.928:156): avc: denied { map } for pid=3297 comm="syz-executor.3" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3777 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 31.463369][ T28] audit: type=1400 audit(1712678455.928:157): avc: denied { read write } for pid=3297 comm="syz-executor.3" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3777 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 16:00:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000002800270d0000000000001fe0e65c0000", @ANYRES32=r4, @ANYBLOB="f1ff000000000000000000000b0001006367726f7570000034000200300001002c000000080001006270660004000280040006000c"], 0x64}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x5b, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x8c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x5c, 0x2, [@TCA_CGROUP_ACT={0x58}]}}]}, 0x8c}}, 0x0) 16:00:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_retopts={{0x28, 0x0, 0x7, {[@ra={0x94, 0x2}, @timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x0, [{@multicast1}, {@empty}]}]}}}], 0x28}, 0x0) 16:00:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x211b, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x38) 16:00:56 executing program 3: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2$9p(0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f00000007c0)=""/105, 0x69}], 0x1, 0x80, 0x0) 16:00:56 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "c04d831721b66c43", "7e50992d53face4acb591d981848b3d9", "a7844c4e", "6c25c0284645e18b"}, 0x28) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000080)=0x1, 0x4) [ 31.488464][ T28] audit: type=1400 audit(1712678455.938:158): avc: denied { read } for pid=3297 comm="syz-executor.3" path="socket:[3776]" dev="sockfs" ino=3776 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 31.527501][ T28] audit: type=1400 audit(1712678456.068:159): avc: denied { read } for pid=3305 comm="syz-executor.1" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 16:00:56 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x45) listen(r0, 0x0) dup(r0) r1 = syz_io_uring_setup(0x5169, &(0x7f0000000200)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) syz_io_uring_setup(0xa94, &(0x7f0000000080), &(0x7f0000000040)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r1, 0x48e9, 0x0, 0x0, 0x0, 0x0) 16:00:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000240)=[{0x7c}, {0x48}, {0x6, 0x0, 0x0, 0xbffffffe}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) [ 31.577376][ T3315] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:00:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) get_mempolicy(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000074000/0x4000)=nil, 0x4) 16:00:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2a, &(0x7f0000000080)=ANY=[@ANYBLOB="020000000000000002000000e0"], 0x90) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000600)={0x2, {{0x2, 0x0, @multicast2}}, 0x1, 0x1, [{{0x2, 0x0, @dev}}]}, 0x110) close(r2) 16:00:56 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 16:00:56 executing program 4: r0 = memfd_create(&(0x7f0000000580)='\x00\xac=\x9d\xd2?\xbe\xfd!\xee\xc97`_\tz\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10[&\x02k`(\x91^6\x04\x89r{raA\xb2\xb2\x12c\x11\x01Z<\xad\x97\xb8\xdc\xa6x\xcb\x89\xce\x17\xba\xe3\x0eS\"\xea\x9d\x8ej\xa8\xfft\xc5\xa8\xf6\x96\xbb1-w\rp\x91\xc7\xd3V\x18^h.D\xa2\xdd\xeb\xa3@\xc7\x92#_\xfd\xf9\x15\xd5\xed\xfbv\xd7\x0f\'\x86kG\v\xb9\x1fn\xe0M\xef\x06\x00\x00\x00t\xaes\xebi\x89\xec\"\x8f\r\x82\xffl\xf9\xff\x83\x8a\x98\xd3z\xd9\xbf\xff\x1c\r\xf5\x98k13\f\xd71\xf5\n\xb2\f\x84\xfa\x97\xab\xca\xa3\xb5\xad\xa8\x8c\xbdi\xb8H4\x8e\xe0\xd7*\xc2\xb0+|hR\x13\xa1tz\ac\xbc\x10RM\xbfR\x10\xcf\xd0!p\x058%\xb3\x1e\bj^D\x1786\xfc3\xb6r\xfc\xd0\xa6\x06\xfa{\xd2cE4\xbd7\x02\xa1E\x87\xa6\xf8\x86I\xfb\x1c\xcfb\xcb\xa9k\xbe\x84\xc8B{\xba', 0x7) fallocate(r0, 0x0, 0x0, 0x40) read(r0, &(0x7f0000000100)=""/155, 0x9b) read(r0, &(0x7f0000000000)=""/214, 0x1a) 16:00:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}, @IFLA_ADDRESS={0xa}]}, 0x40}}, 0x0) 16:00:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000002800270d0000000000001fe0e65c0000", @ANYRES32=r4, @ANYBLOB="f1ff000000000000000000000b0001006367726f7570000034000200300001002c000000080001006270660004000280040006000c"], 0x64}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x5b, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x8c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x5c, 0x2, [@TCA_CGROUP_ACT={0x58}]}}]}, 0x8c}}, 0x0) 16:00:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000002800270d0000000000001fe0e65c0000", @ANYRES32=r4, @ANYBLOB="f1ff000000000000000000000b0001006367726f7570000034000200300001002c000000080001006270660004000280040006000c"], 0x64}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x5b, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x8c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x5c, 0x2, [@TCA_CGROUP_ACT={0x58}]}}]}, 0x8c}}, 0x0) 16:00:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000240)=[{0x7c}, {0x48}, {0x6, 0x0, 0x0, 0xbffffffe}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 16:00:56 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "c04d831721b66c43", "7e50992d53face4acb591d981848b3d9", "a7844c4e", "6c25c0284645e18b"}, 0x28) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000080)=0x1, 0x4) 16:00:56 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:00:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) get_mempolicy(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000074000/0x4000)=nil, 0x4) [ 31.747613][ T3334] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 31.758660][ T3337] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:00:56 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f000056f000/0x2000)=nil, 0x2000, 0x16) 16:00:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a05c7b5d00008023e9c5bcf5ff7700"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ppoll(&(0x7f0000000000)=[{r3}], 0x1, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10, r4, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB]) 16:00:56 executing program 0: r0 = memfd_create(&(0x7f0000000580)='\x00\xac=\x9d\xd2?\xbe\xfd!\xee\xc97`_\tz\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10[&\x02k`(\x91^6\x04\x89r{raA\xb2\xb2\x12c\x11\x01Z<\xad\x97\xb8\xdc\xa6x\xcb\x89\xce\x17\xba\xe3\x0eS\"\xea\x9d\x8ej\xa8\xfft\xc5\xa8\xf6\x96\xbb1-w\rp\x91\xc7\xd3V\x18^h.D\xa2\xdd\xeb\xa3@\xc7\x92#_\xfd\xf9\x15\xd5\xed\xfbv\xd7\x0f\'\x86kG\v\xb9\x1fn\xe0M\xef\x06\x00\x00\x00t\xaes\xebi\x89\xec\"\x8f\r\x82\xffl\xf9\xff\x83\x8a\x98\xd3z\xd9\xbf\xff\x1c\r\xf5\x98k13\f\xd71\xf5\n\xb2\f\x84\xfa\x97\xab\xca\xa3\xb5\xad\xa8\x8c\xbdi\xb8H4\x8e\xe0\xd7*\xc2\xb0+|hR\x13\xa1tz\ac\xbc\x10RM\xbfR\x10\xcf\xd0!p\x058%\xb3\x1e\bj^D\x1786\xfc3\xb6r\xfc\xd0\xa6\x06\xfa{\xd2cE4\xbd7\x02\xa1E\x87\xa6\xf8\x86I\xfb\x1c\xcfb\xcb\xa9k\xbe\x84\xc8B{\xba', 0x7) fallocate(r0, 0x0, 0x0, 0x40) read(r0, &(0x7f0000000100)=""/155, 0x9b) read(r0, &(0x7f0000000000)=""/214, 0x1a) 16:00:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}, @IFLA_ADDRESS={0xa}]}, 0x40}}, 0x0) 16:00:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000002800270d0000000000001fe0e65c0000", @ANYRES32=r4, @ANYBLOB="f1ff000000000000000000000b0001006367726f7570000034000200300001002c000000080001006270660004000280040006000c"], 0x64}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x5b, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x8c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x5c, 0x2, [@TCA_CGROUP_ACT={0x58}]}}]}, 0x8c}}, 0x0) [ 31.922208][ T3354] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 16:00:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000002800270d0000000000001fe0e65c0000", @ANYRES32=r4, @ANYBLOB="f1ff000000000000000000000b0001006367726f7570000034000200300001002c000000080001006270660004000280040006000c"], 0x64}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x5b, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x8c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x5c, 0x2, [@TCA_CGROUP_ACT={0x58}]}}]}, 0x8c}}, 0x0) 16:00:56 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "c04d831721b66c43", "7e50992d53face4acb591d981848b3d9", "a7844c4e", "6c25c0284645e18b"}, 0x28) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000080)=0x1, 0x4) 16:00:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x10000611) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETS2(r2, 0x540b, 0x0) 16:00:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) get_mempolicy(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000074000/0x4000)=nil, 0x4) [ 32.278340][ T3365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 16:00:57 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f000056f000/0x2000)=nil, 0x2000, 0x16) 16:00:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000f00)=0x1000000, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth0_to_team\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002240)=[{{&(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @local, @loopback}}}], 0x20}}], 0x1, 0x0) 16:00:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000002800270d0000000000001fe0e65c0000", @ANYRES32=r4, @ANYBLOB="f1ff000000000000000000000b0001006367726f7570000034000200300001002c000000080001006270660004000280040006000c"], 0x64}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x5b, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x8c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x5c, 0x2, [@TCA_CGROUP_ACT={0x58}]}}]}, 0x8c}}, 0x0) 16:00:57 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}, @IFLA_ADDRESS={0xa}]}, 0x40}}, 0x0) 16:00:57 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "c04d831721b66c43", "7e50992d53face4acb591d981848b3d9", "a7844c4e", "6c25c0284645e18b"}, 0x28) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000080)=0x1, 0x4) 16:00:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000002800270d0000000000001fe0e65c0000", @ANYRES32=r4, @ANYBLOB="f1ff000000000000000000000b0001006367726f7570000034000200300001002c000000080001006270660004000280040006000c"], 0x64}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x5b, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x8c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x5c, 0x2, [@TCA_CGROUP_ACT={0x58}]}}]}, 0x8c}}, 0x0) 16:00:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@setneightbl={0x14, 0x43, 0x1}, 0x14}}, 0x0) [ 32.457140][ T3375] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 16:00:57 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)={{0x7f}, {0x20}, 0x0, 0x7}) 16:00:57 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2$9p(0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f00000007c0)=""/105, 0x69}], 0x1, 0x80, 0x0) 16:00:57 executing program 3: io_setup(0x9, &(0x7f00000025c0)=0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) io_submit(r0, 0x1, &(0x7f0000003800)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 16:00:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000040)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "ff00f5", 0x28, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0xc2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x11}, @mptcp=@capable={0x1e, 0xc}]}}}}}}}}, 0x0) [ 32.532175][ T3384] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:00:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty}}}, 0x90) r2 = open(&(0x7f0000000240)='./file0\x00', 0x62042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x48) 16:00:57 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x400145042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r1, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[], 0x1670e68) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) cachestat(r0, &(0x7f0000000240), &(0x7f0000000280), 0x0) 16:00:57 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}, @IFLA_ADDRESS={0xa}]}, 0x40}}, 0x0) [ 32.588966][ T3391] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 16:00:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@setneightbl={0x14, 0x43, 0x1}, 0x14}}, 0x0) 16:00:57 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)={{0x7f}, {0x20}, 0x0, 0x7}) 16:00:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="48000000100005070000040011cb323d00000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f5261aa51acb1d59e0a43ca38", @ANYRES32=r3, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=@delchain={0x3c, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ENC_KEY_ID={0x8}]}}]}, 0x3c}}, 0x0) 16:00:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000340)={@local, @random="ace07178608e", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "93a2f5", 0x18, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@eol]}}}}}}}}, 0x0) 16:00:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty}}}, 0x90) r2 = open(&(0x7f0000000240)='./file0\x00', 0x62042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x48) 16:00:57 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x400145042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r1, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[], 0x1670e68) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) cachestat(r0, &(0x7f0000000240), &(0x7f0000000280), 0x0) 16:00:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {0xa, 0x0, 0x1f}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) 16:00:57 executing program 2: io_setup(0x9, &(0x7f00000025c0)=0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) io_submit(r0, 0x1, &(0x7f0000003800)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 32.702669][ T3404] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 32.737621][ T3407] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 16:00:57 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:00:57 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:00:57 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:00:58 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)={{0x7f}, {0x20}, 0x0, 0x7}) 16:00:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="48000000100005070000040011cb323d00000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f5261aa51acb1d59e0a43ca38", @ANYRES32=r3, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=@delchain={0x3c, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ENC_KEY_ID={0x8}]}}]}, 0x3c}}, 0x0) 16:00:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty}}}, 0x90) r2 = open(&(0x7f0000000240)='./file0\x00', 0x62042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x48) 16:00:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000340)={@local, @random="ace07178608e", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "93a2f5", 0x18, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@eol]}}}}}}}}, 0x0) 16:00:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {0xa, 0x0, 0x1f}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) 16:00:58 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f000056f000/0x2000)=nil, 0x2000, 0x16) 16:00:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'veth0_vlan\x00', 0x0}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000800)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x90) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000680)={r3, r2, 0x25, 0x0, @void}, 0x10) dup(r3) close_range(r0, 0xffffffffffffffff, 0x0) 16:00:58 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2$9p(0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f00000007c0)=""/105, 0x69}], 0x1, 0x80, 0x0) 16:00:58 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 33.819413][ T3428] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 33.838977][ T3435] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 16:00:58 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:00:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x10000611) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETS2(r2, 0x540b, 0x0) 16:00:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004d00)=@newlink={0x3c, 0x10, 0x421, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}]}, 0x3c}}, 0x0) 16:00:59 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000100), 0x10) connect$can_bcm(r0, &(0x7f0000000140), 0x10) 16:00:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000340)={@local, @random="ace07178608e", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "93a2f5", 0x18, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@eol]}}}}}}}}, 0x0) 16:00:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="48000000100005070000040011cb323d00000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f5261aa51acb1d59e0a43ca38", @ANYRES32=r3, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=@delchain={0x3c, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ENC_KEY_ID={0x8}]}}]}, 0x3c}}, 0x0) 16:00:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {0xa, 0x0, 0x1f}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) 16:00:59 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'veth0_vlan\x00', 0x0}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000800)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x90) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000680)={r3, r2, 0x25, 0x0, @void}, 0x10) dup(r3) close_range(r0, 0xffffffffffffffff, 0x0) 16:00:59 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:00:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'veth0_vlan\x00', 0x0}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000800)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x90) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000680)={r3, r2, 0x25, 0x0, @void}, 0x10) dup(r3) close_range(r0, 0xffffffffffffffff, 0x0) [ 35.208219][ T3462] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 35.221728][ T3467] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 16:00:59 executing program 2: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/diskstats\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000400)={0x0, 'geneve1\x00', {0x3}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1b}}, @local, @dev={0xfe, 0x80, '\x00', 0x31}, 0x200, 0x3, 0x5, 0x0, 0x94c, 0x1020002, r2}) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f0000000140)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x354, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x338, 0x8, 0x0, 0x1, [{0x30c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_ALLOWEDIPS={0x278, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0xec}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7237cd2e6c2e32c3d65c29e21a4ed8743729f42a74b631f75abc0694df59ac59"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r8}]}, 0x354}}, 0x0) 16:01:00 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004d00)=@newlink={0x3c, 0x10, 0x421, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}]}, 0x3c}}, 0x0) 16:01:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) sigaltstack(0x0, 0x0) [ 35.310212][ T3462] syz-executor.0 (3462) used greatest stack depth: 10904 bytes left 16:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {0xa, 0x0, 0x1f}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) 16:01:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000340)={@local, @random="ace07178608e", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "93a2f5", 0x18, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@eol]}}}}}}}}, 0x0) 16:01:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'veth0_vlan\x00', 0x0}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000800)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x90) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000680)={r3, r2, 0x25, 0x0, @void}, 0x10) dup(r3) close_range(r0, 0xffffffffffffffff, 0x0) [ 36.124740][ T2785] ================================================================== [ 36.132891][ T2785] BUG: KCSAN: data-race in dont_mount / step_into [ 36.139337][ T2785] [ 36.141664][ T2785] read-write to 0xffff88810d216d80 of 4 bytes by task 3073 on cpu 1: [ 36.149729][ T2785] dont_mount+0x27/0x40 [ 36.153900][ T2785] vfs_unlink+0x288/0x3f0 [ 36.158238][ T2785] do_unlinkat+0x236/0x4c0 [ 36.162664][ T2785] __x64_sys_unlink+0x30/0x40 [ 36.167352][ T2785] do_syscall_64+0xd3/0x1d0 [ 36.171864][ T2785] entry_SYSCALL_64_after_hwframe+0x72/0x7a [ 36.177762][ T2785] [ 36.180110][ T2785] read to 0xffff88810d216d80 of 4 bytes by task 2785 on cpu 0: [ 36.187649][ T2785] step_into+0x12f/0x810 [ 36.191980][ T2785] walk_component+0x169/0x230 [ 36.196659][ T2785] path_lookupat+0x10a/0x2b0 [ 36.201258][ T2785] filename_lookup+0x127/0x300 [ 36.206028][ T2785] user_path_at_empty+0x42/0x120 [ 36.210976][ T2785] do_readlinkat+0x92/0x210 [ 36.215492][ T2785] __x64_sys_readlink+0x47/0x60 [ 36.220360][ T2785] do_syscall_64+0xd3/0x1d0 16:01:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'veth0_vlan\x00', 0x0}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000800)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x90) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000680)={r3, r2, 0x25, 0x0, @void}, 0x10) dup(r3) close_range(r0, 0xffffffffffffffff, 0x0) 16:01:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000100), 0x10) connect$can_bcm(r0, &(0x7f0000000140), 0x10) [ 36.224878][ T2785] entry_SYSCALL_64_after_hwframe+0x72/0x7a [ 36.230776][ T2785] [ 36.233114][ T2785] value changed: 0x00600008 -> 0x00008008 [ 36.238831][ T2785] [ 36.241149][ T2785] Reported by Kernel Concurrency Sanitizer on: [ 36.247294][ T2785] CPU: 0 PID: 2785 Comm: udevd Not tainted 6.9.0-rc3-syzkaller-00011-g20cb38a7af88 #0 [ 36.256842][ T2785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 36.266898][ T2785] ================================================================== 16:01:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="48000000100005070000040011cb323d00000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f5261aa51acb1d59e0a43ca38", @ANYRES32=r3, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=@delchain={0x3c, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ENC_KEY_ID={0x8}]}}]}, 0x3c}}, 0x0) 16:01:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004d00)=@newlink={0x3c, 0x10, 0x421, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}]}, 0x3c}}, 0x0) 16:01:01 executing program 4: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/diskstats\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000400)={0x0, 'geneve1\x00', {0x3}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1b}}, @local, @dev={0xfe, 0x80, '\x00', 0x31}, 0x200, 0x3, 0x5, 0x0, 0x94c, 0x1020002, r2}) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f0000000140)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x354, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x338, 0x8, 0x0, 0x1, [{0x30c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_ALLOWEDIPS={0x278, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0xec}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7237cd2e6c2e32c3d65c29e21a4ed8743729f42a74b631f75abc0694df59ac59"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r8}]}, 0x354}}, 0x0) 16:01:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x10000611) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETS2(r2, 0x540b, 0x0) [ 36.315635][ T3493] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 16:01:01 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:01:01 executing program 4: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/diskstats\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000400)={0x0, 'geneve1\x00', {0x3}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1b}}, @local, @dev={0xfe, 0x80, '\x00', 0x31}, 0x200, 0x3, 0x5, 0x0, 0x94c, 0x1020002, r2}) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f0000000140)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x354, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x338, 0x8, 0x0, 0x1, [{0x30c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_ALLOWEDIPS={0x278, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0xec}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7237cd2e6c2e32c3d65c29e21a4ed8743729f42a74b631f75abc0694df59ac59"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r8}]}, 0x354}}, 0x0) 16:01:01 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:01:01 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) sigaltstack(0x0, 0x0) 16:01:01 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) sigaltstack(0x0, 0x0) 16:01:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'veth0_vlan\x00', 0x0}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000800)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x90) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000680)={r3, r2, 0x25, 0x0, @void}, 0x10) dup(r3) close_range(r0, 0xffffffffffffffff, 0x0) 16:01:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000100), 0x10) connect$can_bcm(r0, &(0x7f0000000140), 0x10) 16:01:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/diskstats\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000400)={0x0, 'geneve1\x00', {0x3}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1b}}, @local, @dev={0xfe, 0x80, '\x00', 0x31}, 0x200, 0x3, 0x5, 0x0, 0x94c, 0x1020002, r2}) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f0000000140)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x354, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x338, 0x8, 0x0, 0x1, [{0x30c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_ALLOWEDIPS={0x278, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0xec}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7237cd2e6c2e32c3d65c29e21a4ed8743729f42a74b631f75abc0694df59ac59"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r8}]}, 0x354}}, 0x0) 16:01:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'veth0_vlan\x00', 0x0}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000800)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x90) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000680)={r3, r2, 0x25, 0x0, @void}, 0x10) dup(r3) close_range(r0, 0xffffffffffffffff, 0x0) 16:01:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8}, @IFLA_XFRM_LINK={0x8}]}}}]}, 0x44}}, 0x0) 16:01:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) sigaltstack(0x0, 0x0) 16:01:02 executing program 2: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/diskstats\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000400)={0x0, 'geneve1\x00', {0x3}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1b}}, @local, @dev={0xfe, 0x80, '\x00', 0x31}, 0x200, 0x3, 0x5, 0x0, 0x94c, 0x1020002, r2}) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f0000000140)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x354, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x338, 0x8, 0x0, 0x1, [{0x30c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_ALLOWEDIPS={0x278, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0xec}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7237cd2e6c2e32c3d65c29e21a4ed8743729f42a74b631f75abc0694df59ac59"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r8}]}, 0x354}}, 0x0) 16:01:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x10000611) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETS2(r2, 0x540b, 0x0) [ 37.431933][ T3529] __nla_validate_parse: 4 callbacks suppressed [ 37.431952][ T3529] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.1'. 16:01:02 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:01:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) sigaltstack(0x0, 0x0) 16:01:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000100), 0x10) connect$can_bcm(r0, &(0x7f0000000140), 0x10) 16:01:02 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:01:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 37.477491][ T3535] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.2'. 16:01:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8}, @IFLA_XFRM_LINK={0x8}]}}}]}, 0x44}}, 0x0) 16:01:02 executing program 3: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/diskstats\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000400)={0x0, 'geneve1\x00', {0x3}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1b}}, @local, @dev={0xfe, 0x80, '\x00', 0x31}, 0x200, 0x3, 0x5, 0x0, 0x94c, 0x1020002, r2}) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f0000000140)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x354, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x338, 0x8, 0x0, 0x1, [{0x30c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_ALLOWEDIPS={0x278, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0xec}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7237cd2e6c2e32c3d65c29e21a4ed8743729f42a74b631f75abc0694df59ac59"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r8}]}, 0x354}}, 0x0) 16:01:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) sigaltstack(0x0, 0x0) 16:01:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001095, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000840)='./file0\x00', 0x808734, &(0x7f0000000340)={[{@sb={'sb', 0x3d, 0x6}}, {@delalloc}, {@quota}, {@barrier}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@errors_continue}, {@dioread_lock}, {@nojournal_checksum}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@nobarrier}, {@block_validity}, {@data_ordered}]}, 0x1, 0x455, &(0x7f0000000cc0)="$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") 16:01:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x6) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/diskstats\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x8) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000400)={0x0, 'geneve1\x00', {0x3}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1b}}, @local, @dev={0xfe, 0x80, '\x00', 0x31}, 0x200, 0x3, 0x5, 0x0, 0x94c, 0x1020002, r2}) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f0000000140)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x354, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x338, 0x8, 0x0, 0x1, [{0x30c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_ALLOWEDIPS={0x278, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0xec}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7237cd2e6c2e32c3d65c29e21a4ed8743729f42a74b631f75abc0694df59ac59"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r8}]}, 0x354}}, 0x0) 16:01:03 executing program 1: unshare(0x60600) r0 = mq_open(&(0x7f0000000040)='\x9av{\xae\x91\xd4\xac\x02\xe6\xe3\xeb\xe5\xbf\a\x1b\xef\x00', 0x40, 0x0, 0x0) mq_getsetattr(r0, 0x0, 0x0) 16:01:03 executing program 2: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) syz_open_pts(r2, 0x0) splice(r2, &(0x7f0000000040)=0x2, r0, &(0x7f00000000c0)=0x40, 0x8, 0x6) r3 = socket(0x21, 0x2, 0x2) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x8, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x59]}}, &(0x7f0000000180)=""/219, 0x27, 0xdb, 0x0, 0x800}, 0x20) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f0000000300)) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="73797e3193b93c69179f6d51c2ae8d514b232dc8a3165ecc378a287a103b859d866f18d448d0ec8145c6cae2d81b"], 0x2e) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x110, 0x6, 0x0, 0xfffffffffffffde8) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xd5, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x48, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x2, 0x5, 0x10001, 0x2040, r8, 0x69d3, '\x00', r9, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x6}, 0x48) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xfffffffffffeffff) close(r5) r10 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r10, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r10, &(0x7f0000000000)=""/45, 0x44, 0x0, 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r5, 0x0, 0x200000000622c, 0x0) 16:01:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="8000000000010104000000000000000002000000240001801400018008000100e000000208000200ac1414000c0002800500010063000000240002800c00028005000100000000001400018008000100e0000002080002"], 0x80}}, 0x0) [ 38.494689][ T3565] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.3'. [ 38.534199][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 38.534216][ T28] audit: type=1400 audit(1712678463.218:175): avc: denied { cpu } for pid=3563 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.584747][ T28] audit: type=1400 audit(1712678463.258:176): avc: denied { write } for pid=3563 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.587359][ T3564] loop4: detected capacity change from 0 to 512 [ 38.612425][ T3568] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. [ 38.630843][ T3564] EXT4-fs: Ignoring sb option on remount 16:01:03 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) sigaltstack(0x0, 0x0) 16:01:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8}, @IFLA_XFRM_LINK={0x8}]}}}]}, 0x44}}, 0x0) [ 38.640418][ T3572] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 38.663768][ T3564] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 38.673546][ T3564] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: writeback. 16:01:03 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) sendmsg$nl_route(r0, 0x0, 0x0) [ 38.679544][ T28] audit: type=1400 audit(1712678463.318:177): avc: denied { create } for pid=3571 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 38.704744][ T28] audit: type=1400 audit(1712678463.318:178): avc: denied { remount } for pid=3563 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 38.725139][ T28] audit: type=1400 audit(1712678463.328:179): avc: denied { write } for pid=3571 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 38.746024][ T28] audit: type=1400 audit(1712678463.328:180): avc: denied { create } for pid=3569 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 38.750959][ T3579] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:01:03 executing program 4: syz_emit_ethernet(0xbe, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x9c, 0x0, @wg}}}}}, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x7c, 0x0, @wg=@data={0x4, 0x0, 0x0, '\x00'/100}}}}}}, 0x0) [ 38.766358][ T28] audit: type=1400 audit(1712678463.328:181): avc: denied { write } for pid=3569 comm="syz-executor.2" path="socket:[4469]" dev="sockfs" ino=4469 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 38.774048][ T3579] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 38.802311][ T28] audit: type=1400 audit(1712678463.388:182): avc: denied { getopt } for pid=3569 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 16:01:03 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fusectl\x00', 0x3015800, &(0x7f0000000500)='cgroup.procs\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() setrlimit(0xe, &(0x7f0000000640)={0x7, 0x5}) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="f735ed47ec733e39dc387d000400"], &(0x7f0000000300)='#&\xe8+-\x18@\x00', 0x8, 0xe0d0a764790f0b33) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x6) ptrace$ARCH_SHSTK_DISABLE(0x1e, 0x0, 0x1, 0x5002) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f00000005c0)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 16:01:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x2, 0x3, 0x5, 0x0, 0x0, {}, [@NFQA_CFG_MASK={0x8}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x20}, @NFQA_CFG_CMD={0x8}]}, 0x2c}}, 0x0) [ 38.976775][ T28] audit: type=1400 audit(1712678463.668:183): avc: denied { unmount } for pid=3096 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 16:01:03 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) listen(r0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:01:03 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r0}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clock_settime(0x0, 0x0) 16:01:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="8000000000010104000000000000000002000000240001801400018008000100e000000208000200ac1414000c0002800500010063000000240002800c00028005000100000000001400018008000100e0000002080002"], 0x80}}, 0x0) 16:01:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001095, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000840)='./file0\x00', 0x808734, &(0x7f0000000340)={[{@sb={'sb', 0x3d, 0x6}}, {@delalloc}, {@quota}, {@barrier}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@errors_continue}, {@dioread_lock}, {@nojournal_checksum}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@nobarrier}, {@block_validity}, {@data_ordered}]}, 0x1, 0x455, &(0x7f0000000cc0)="$eJzs3E1oHFUcAPD/zCat9iux1mpjq9EqBj+SJq3agxdFwYOCoId6jElaYreNNBFsCRpF6lEK3sWj4M2bJ72IehK86lkpFA1CqqeV2Z1JN2s2X+52a/b3g2nem3m77/0z7828nddNAF1rMPsnidgTET9HRF8tu7LAYO3H9cX5ib8W5yeSqFRe/T2plltanJ8oihav251nhtKI9MMkr2RZT/7z7Hi5PHUhz4zMnXtrZPbipSemz42fmTozdX7s5MkTx0effmrsyfVCWNpInFlcSwPvzhw+9OLrV16eOHXlje+/yNp78Ej+JnVxtMpgFvgflarGYw+3urIO21uXTno62BA2pZQPyN7q+O+LUtw4eX3xwgcdbRzQVtm9aWfzwwsVYBtLotMtADqjuNFnn3+L7SZNPW4J156tfQDK4r6eb7UjPZHmZXrbWP9gRJxa+PvTbIs2PYcAAKj3dTb/eXy1+V8aB+vK7cvXUPoj4o6I2B8Rd0bEgYi4K6Ja9u6IuGeT9Q825JcWf/1y5Z706pYC26Bs/vdMvra1cv5XzP6iv5Tn9lbj701OT5enjuW/k6Ho3ZnlR9eo45vnf/q42bH6+V+2ZfUXc8G8HVd7Gh7QTY7PjbdqUnrt/YiBntXiT5ZXApKIOBQRA5t7631FYvrRzw83K7R+/GtowTpT5bOIR2rnfyEa4i8ka69PjtwW5aljI0Wv+Lcffrz8SrP6/1P8LZCd/10r+39Dib4/s/hnL16qrdfObr6Oy7981PQzzVb7/47kteqa9Y583zvjc3MXRiN2JC9V8yv2j914bZEvymfxDx1dffzvz1+TxX9vRGSd+EhE3BcR9+dtfyAiHoyIo2vE/91zD7259fjbK4t/ctXr33L/7687/5V8b9YRlnvEeonS2W+/alb/xs7/iWpqKN9Tvf6tY6MN3PIvDgAAAP5H0ojYE0k6vJxO0+Hh2v/hPxC70vLM7Nxjp2fePj9Z+45Af/SmxZOuvrrnoaPJQv6OtfxY/qy4OH48f278Sen2an54YqY82eHYodvtbjL+M7+VOt06oO18Xwu6V+P4TzvUDuDmc/+H7mX8Q/cy/qF7rTb+32vIWwuA7cn9H7qX8Q/da/3x7woB25XRDV1p49/il5CoT0Ta/rqKv+Jxi4TcVYkOX5gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABa5J8AAAD//4WR6Qo=") 16:01:04 executing program 3: clock_adjtime(0x0, &(0x7f0000000200)={0x503, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}) [ 39.702779][ T28] audit: type=1400 audit(1712678464.388:184): avc: denied { bind } for pid=3593 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 16:01:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8}, @IFLA_XFRM_LINK={0x8}]}}}]}, 0x44}}, 0x0) 16:01:04 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) sendmsg$nl_route(r0, 0x0, 0x0) [ 39.839719][ T3599] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 39.926006][ T3601] loop2: detected capacity change from 0 to 512 [ 39.932552][ T3601] EXT4-fs: Ignoring sb option on remount [ 39.938770][ T3601] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 39.948556][ T3601] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: writeback. 16:01:04 executing program 2: syz_emit_ethernet(0xbe, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x9c, 0x0, @wg}}}}}, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x7c, 0x0, @wg=@data={0x4, 0x0, 0x0, '\x00'/100}}}}}}, 0x0) 16:01:04 executing program 3: syz_emit_ethernet(0xbe, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x9c, 0x0, @wg}}}}}, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x7c, 0x0, @wg=@data={0x4, 0x0, 0x0, '\x00'/100}}}}}}, 0x0) 16:01:04 executing program 4: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) syz_open_pts(r2, 0x0) splice(r2, &(0x7f0000000040)=0x2, r0, &(0x7f00000000c0)=0x40, 0x8, 0x6) r3 = socket(0x21, 0x2, 0x2) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x8, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x59]}}, &(0x7f0000000180)=""/219, 0x27, 0xdb, 0x0, 0x800}, 0x20) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f0000000300)) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="73797e3193b93c69179f6d51c2ae8d514b232dc8a3165ecc378a287a103b859d866f18d448d0ec8145c6cae2d81b"], 0x2e) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x110, 0x6, 0x0, 0xfffffffffffffde8) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xd5, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x48, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x2, 0x5, 0x10001, 0x2040, r8, 0x69d3, '\x00', r9, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x6}, 0x48) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xfffffffffffeffff) close(r5) r10 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r10, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r10, &(0x7f0000000000)=""/45, 0x44, 0x0, 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r5, 0x0, 0x200000000622c, 0x0) 16:01:04 executing program 1: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) syz_open_pts(r2, 0x0) splice(r2, &(0x7f0000000040)=0x2, r0, &(0x7f00000000c0)=0x40, 0x8, 0x6) r3 = socket(0x21, 0x2, 0x2) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x8, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x59]}}, &(0x7f0000000180)=""/219, 0x27, 0xdb, 0x0, 0x800}, 0x20) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f0000000300)) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="73797e3193b93c69179f6d51c2ae8d514b232dc8a3165ecc378a287a103b859d866f18d448d0ec8145c6cae2d81b"], 0x2e) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x110, 0x6, 0x0, 0xfffffffffffffde8) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xd5, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x48, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x2, 0x5, 0x10001, 0x2040, r8, 0x69d3, '\x00', r9, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x6}, 0x48) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xfffffffffffeffff) close(r5) r10 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r10, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r10, &(0x7f0000000000)=""/45, 0x44, 0x0, 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r5, 0x0, 0x200000000622c, 0x0) 16:01:04 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) listen(r0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:01:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="8000000000010104000000000000000002000000240001801400018008000100e000000208000200ac1414000c0002800500010063000000240002800c00028005000100000000001400018008000100e0000002080002"], 0x80}}, 0x0) 16:01:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001095, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000840)='./file0\x00', 0x808734, &(0x7f0000000340)={[{@sb={'sb', 0x3d, 0x6}}, {@delalloc}, {@quota}, {@barrier}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@errors_continue}, {@dioread_lock}, {@nojournal_checksum}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@nobarrier}, {@block_validity}, {@data_ordered}]}, 0x1, 0x455, &(0x7f0000000cc0)="$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") 16:01:05 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) listen(r0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 40.517089][ T3619] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 40.525290][ T3619] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.4'. [ 40.609691][ T3623] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 40.617982][ T3623] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.1'. 16:01:05 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6064cdd800100000fe0000000000007bae020000c0bdff0100000000001670df67000000000000001f00c2"], 0x0) [ 40.699222][ T3626] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 16:01:05 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='cpu<00||!') [ 40.751414][ T3628] loop2: detected capacity change from 0 to 512 [ 40.759807][ T3628] EXT4-fs: Ignoring sb option on remount [ 40.766576][ T3628] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 40.777970][ T3628] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: writeback. 16:01:05 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) sendmsg$nl_route(r0, 0x0, 0x0) 16:01:05 executing program 3: syz_emit_ethernet(0xbe, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x9c, 0x0, @wg}}}}}, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x7c, 0x0, @wg=@data={0x4, 0x0, 0x0, '\x00'/100}}}}}}, 0x0) 16:01:05 executing program 0: syz_emit_ethernet(0xbe, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x9c, 0x0, @wg}}}}}, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x7c, 0x0, @wg=@data={0x4, 0x0, 0x0, '\x00'/100}}}}}}, 0x0) 16:01:05 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) listen(r0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:01:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="8000000000010104000000000000000002000000240001801400018008000100e000000208000200ac1414000c0002800500010063000000240002800c00028005000100000000001400018008000100e0000002080002"], 0x80}}, 0x0) 16:01:06 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) listen(r0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:01:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001095, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000840)='./file0\x00', 0x808734, &(0x7f0000000340)={[{@sb={'sb', 0x3d, 0x6}}, {@delalloc}, {@quota}, {@barrier}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@errors_continue}, {@dioread_lock}, {@nojournal_checksum}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@nobarrier}, {@block_validity}, {@data_ordered}]}, 0x1, 0x455, &(0x7f0000000cc0)="$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") 16:01:06 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6064cdd800100000fe0000000000007bae020000c0bdff0100000000001670df67000000000000001f00c2"], 0x0) 16:01:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)=ANY=[@ANYBLOB="54010000100033060000000000000000ffffffff0000000000000000610500000000000000000000000000000000000000000000000000000000020000fdffffff00", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="fe8800000000000000000000000000010000000032000000fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0004"], 0x154}}, 0x0) 16:01:06 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) sendmsg$nl_route(r0, 0x0, 0x0) 16:01:06 executing program 4: syz_emit_ethernet(0xbe, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x9c, 0x0, @wg}}}}}, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x7c, 0x0, @wg=@data={0x4, 0x0, 0x0, '\x00'/100}}}}}}, 0x0) 16:01:06 executing program 2: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) syz_open_pts(r2, 0x0) splice(r2, &(0x7f0000000040)=0x2, r0, &(0x7f00000000c0)=0x40, 0x8, 0x6) r3 = socket(0x21, 0x2, 0x2) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x8, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x59]}}, &(0x7f0000000180)=""/219, 0x27, 0xdb, 0x0, 0x800}, 0x20) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f0000000300)) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="73797e3193b93c69179f6d51c2ae8d514b232dc8a3165ecc378a287a103b859d866f18d448d0ec8145c6cae2d81b"], 0x2e) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x110, 0x6, 0x0, 0xfffffffffffffde8) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xd5, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x48, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x2, 0x5, 0x10001, 0x2040, r8, 0x69d3, '\x00', r9, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x6}, 0x48) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xfffffffffffeffff) close(r5) r10 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r10, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r10, &(0x7f0000000000)=""/45, 0x44, 0x0, 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r5, 0x0, 0x200000000622c, 0x0) 16:01:06 executing program 1: syz_emit_ethernet(0xbe, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x9c, 0x0, @wg}}}}}, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x7c, 0x0, @wg=@data={0x4, 0x0, 0x0, '\x00'/100}}}}}}, 0x0) [ 41.682160][ T3652] loop0: detected capacity change from 0 to 512 [ 41.688544][ T3652] EXT4-fs: Ignoring sb option on remount [ 41.696507][ T3652] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 41.706207][ T3652] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: writeback. 16:01:06 executing program 0: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) syz_open_pts(r2, 0x0) splice(r2, &(0x7f0000000040)=0x2, r0, &(0x7f00000000c0)=0x40, 0x8, 0x6) r3 = socket(0x21, 0x2, 0x2) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x8, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x59]}}, &(0x7f0000000180)=""/219, 0x27, 0xdb, 0x0, 0x800}, 0x20) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f0000000300)) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="73797e3193b93c69179f6d51c2ae8d514b232dc8a3165ecc378a287a103b859d866f18d448d0ec8145c6cae2d81b"], 0x2e) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x110, 0x6, 0x0, 0xfffffffffffffde8) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xd5, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x48, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x2, 0x5, 0x10001, 0x2040, r8, 0x69d3, '\x00', r9, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x6}, 0x48) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xfffffffffffeffff) close(r5) r10 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r10, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r10, &(0x7f0000000000)=""/45, 0x44, 0x0, 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r5, 0x0, 0x200000000622c, 0x0) 16:01:06 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) listen(r0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:01:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x3}}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 16:01:06 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) listen(r0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 42.097724][ T3668] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:01:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffbd, &(0x7f0000000040)={&(0x7f00000003c0)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @sit={{0x8}, {0x24, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}, @IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x40}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0x3, r2}]}, 0x60}}, 0x0) [ 42.195712][ T3674] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 16:01:07 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6064cdd800100000fe0000000000007bae020000c0bdff0100000000001670df67000000000000001f00c2"], 0x0) 16:01:07 executing program 1: syz_emit_ethernet(0x68, &(0x7f0000000340)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02adf7", 0x32, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x2, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, '\x00', 0x0, 0x2b, 0x0, @mcast1, @local, [], "1e52"}}}}}}}, 0x0) 16:01:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x40, 0x66, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 16:01:07 executing program 4: syz_emit_ethernet(0x86, &(0x7f00000010c0)={@local, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x3, 0x0, 0x0, @broadcast=0x1000000, {0x17, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @broadcast, @empty, {[@timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x0, [{@remote, 0x4e210000}]}, @timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x0, [{@multicast1}, {}, {@dev}, {@private}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@multicast1}]}]}}}}}}}, 0x0) 16:01:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) llistxattr(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 16:01:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000700)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x801, 0x0, 0x0, {0x2}}], {0x14}}, 0x3c}}, 0x0) 16:01:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x3}}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 16:01:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff010}, {0xac}, {0x6}]}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) write$sndseq(r2, &(0x7f0000000380)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time}], 0x1c) 16:01:07 executing program 2: syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffbd, &(0x7f0000000040)={&(0x7f00000003c0)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @sit={{0x8}, {0x24, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}, @IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x40}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0x3, r2}]}, 0x60}}, 0x0) 16:01:07 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6064cdd800100000fe0000000000007bae020000c0bdff0100000000001670df67000000000000001f00c2"], 0x0) 16:01:07 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x2, 0x0, @local}, 0x10, 0x0}, 0x4008804) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000280)="c1", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/81, 0x51}], 0x1}, 0x0) 16:01:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x40, 0x66, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 16:01:07 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x1) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) 16:01:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000003100)=@gcm_128={{0x303}, "0400", "0d07080d004fcf0000e8ffff1a8600", "cf0d00", "8657e2b7e43b34e4"}, 0x28) write$binfmt_script(r0, &(0x7f0000001300)=ANY=[], 0x8f) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfccf}, &(0x7f0000000240)=0x40) writev(r0, &(0x7f00000030c0)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000180)=0x40) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0x1}], 0x1) 16:01:07 executing program 3: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) syz_open_pts(r2, 0x0) splice(r2, &(0x7f0000000040)=0x2, r0, &(0x7f00000000c0)=0x40, 0x8, 0x6) r3 = socket(0x21, 0x2, 0x2) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x8, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x59]}}, &(0x7f0000000180)=""/219, 0x27, 0xdb, 0x0, 0x800}, 0x20) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f0000000300)) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="73797e3193b93c69179f6d51c2ae8d514b232dc8a3165ecc378a287a103b859d866f18d448d0ec8145c6cae2d81b"], 0x2e) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x110, 0x6, 0x0, 0xfffffffffffffde8) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xd5, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x48, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x2, 0x5, 0x10001, 0x2040, r8, 0x69d3, '\x00', r9, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x6}, 0x48) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xfffffffffffeffff) close(r5) r10 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r10, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r10, &(0x7f0000000000)=""/45, 0x44, 0x0, 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r5, 0x0, 0x200000000622c, 0x0) 16:01:07 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@bridge_delneigh={0x24, 0x1e, 0x1, 0x0, 0x0, {0x7}, [@NDA_VLAN={0x6}]}, 0x24}}, 0x0) 16:01:07 executing program 4: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) syz_open_pts(r2, 0x0) splice(r2, &(0x7f0000000040)=0x2, r0, &(0x7f00000000c0)=0x40, 0x8, 0x6) r3 = socket(0x21, 0x2, 0x2) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x8, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x59]}}, &(0x7f0000000180)=""/219, 0x27, 0xdb, 0x0, 0x800}, 0x20) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f0000000300)) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="73797e3193b93c69179f6d51c2ae8d514b232dc8a3165ecc378a287a103b859d866f18d448d0ec8145c6cae2d81b"], 0x2e) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x110, 0x6, 0x0, 0xfffffffffffffde8) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xd5, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x48, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x2, 0x5, 0x10001, 0x2040, r8, 0x69d3, '\x00', r9, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x6}, 0x48) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xfffffffffffeffff) close(r5) r10 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r10, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r10, &(0x7f0000000000)=""/45, 0x44, 0x0, 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r5, 0x0, 0x200000000622c, 0x0) 16:01:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x3}}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 16:01:08 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=0x1, 0xffffffffffffffff, 0xc}, 0x20) 16:01:08 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffbd, &(0x7f0000000040)={&(0x7f00000003c0)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @sit={{0x8}, {0x24, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}, @IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x40}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0x3, r2}]}, 0x60}}, 0x0) [ 43.541717][ T3724] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 43.549874][ T3724] __nla_validate_parse: 3 callbacks suppressed [ 43.549884][ T3724] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.3'. [ 43.617696][ T3726] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 43.625867][ T3726] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.4'. 16:01:08 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="f1ff060004000000000000000900010063616b65000000001400020008000800ff03000008000c"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="67a9fde500000000280012800a00010076786c616e"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 16:01:08 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x2, 0x0, @local}, 0x10, 0x0}, 0x4008804) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000280)="c1", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/81, 0x51}], 0x1}, 0x0) 16:01:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x40, 0x66, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 16:01:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}, @NFTA_PAYLOAD_SREG={0x8, 0x5, 0x1, 0x0, 0x3}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) [ 43.971673][ T3736] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 43.981040][ T3736] netlink: 'syz-executor.1': attribute type 12 has an invalid length. [ 43.991873][ T3736] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 44.000688][ T3736] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 44.009486][ T3736] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 44.018332][ T3736] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 44.027284][ T3736] vxlan0: entered promiscuous mode 16:01:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000003100)=@gcm_128={{0x303}, "0400", "0d07080d004fcf0000e8ffff1a8600", "cf0d00", "8657e2b7e43b34e4"}, 0x28) write$binfmt_script(r0, &(0x7f0000001300)=ANY=[], 0x8f) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfccf}, &(0x7f0000000240)=0x40) writev(r0, &(0x7f00000030c0)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000180)=0x40) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0x1}], 0x1) 16:01:08 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) preadv(r0, &(0x7f0000002640)=[{&(0x7f0000000080)=""/117, 0x75}], 0x300, 0x7fffffffffffffff, 0x0) 16:01:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x3}}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 16:01:09 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0x14) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000100)=0x2) 16:01:09 executing program 4: syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffbd, &(0x7f0000000040)={&(0x7f00000003c0)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @sit={{0x8}, {0x24, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}, @IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x40}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0x3, r2}]}, 0x60}}, 0x0) 16:01:09 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x2, 0x0, @local}, 0x10, 0x0}, 0x4008804) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000280)="c1", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/81, 0x51}], 0x1}, 0x0) 16:01:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x40, 0x66, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 16:01:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}]}, @NFT_MSG_NEWRULE={0x84, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x5c, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @synproxy={{0xd}, @void}}, {0x24, 0x1, 0x0, 0x1, @tproxy={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x3}]}}}, {0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xcc6d6bf9ebe73065}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x100}}, 0x40000) [ 44.621809][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 44.621862][ T28] audit: type=1400 audit(1712678469.308:191): avc: denied { ioctl } for pid=3746 comm="syz-executor.0" path="/dev/mISDNtimer" dev="devtmpfs" ino=224 ioctlcmd=0x4940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 16:01:09 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x109800) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) 16:01:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000003100)=@gcm_128={{0x303}, "0400", "0d07080d004fcf0000e8ffff1a8600", "cf0d00", "8657e2b7e43b34e4"}, 0x28) write$binfmt_script(r0, &(0x7f0000001300)=ANY=[], 0x8f) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfccf}, &(0x7f0000000240)=0x40) writev(r0, &(0x7f00000030c0)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000180)=0x40) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0x1}], 0x1) 16:01:09 executing program 1: r0 = fsopen(&(0x7f0000000080)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000180)='rootcontext', &(0x7f0000000040)='E\xe1\x85\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fsmount(r0, 0x0, 0x84) [ 44.758274][ T3736] syz-executor.1 (3736) used greatest stack depth: 10440 bytes left 16:01:09 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) preadv(r0, &(0x7f0000002640)=[{&(0x7f0000000080)=""/117, 0x75}], 0x300, 0x7fffffffffffffff, 0x0) 16:01:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) fadvise64(r0, 0x0, 0x0, 0x1) ftruncate(r0, 0x8001) mlock(&(0x7f0000001000/0x2000)=nil, 0x2000) syz_clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 16:01:09 executing program 4: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@link_local={0x3}, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @loopback}, "110022ebffff0000"}}}}}, 0x0) 16:01:09 executing program 2: io_uring_setup(0x1694, &(0x7f0000000080)) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup(r0) ioctl$PTP_EXTTS_REQUEST2(r1, 0xc0603d0f, &(0x7f0000000040)) [ 44.981164][ T28] audit: type=1400 audit(1712678469.668:192): avc: denied { read } for pid=3757 comm="syz-executor.4" name="usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 45.004939][ T28] audit: type=1400 audit(1712678469.668:193): avc: denied { open } for pid=3757 comm="syz-executor.4" path="/dev/usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 16:01:09 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x2, 0x0, @local}, 0x10, 0x0}, 0x4008804) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000280)="c1", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/81, 0x51}], 0x1}, 0x0) [ 45.029055][ T28] audit: type=1400 audit(1712678469.668:194): avc: denied { ioctl } for pid=3757 comm="syz-executor.4" path="/dev/usbmon0" dev="devtmpfs" ino=117 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 45.030182][ T3762] SELinux: security_context_str_to_sid (Eá…) failed with errno=-22 16:01:09 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000780)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0}) 16:01:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0x36, 0x0, 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000000180)='pagemap\x00') 16:01:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}]}, @NFT_MSG_NEWRULE={0x84, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x5c, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @synproxy={{0xd}, @void}}, {0x24, 0x1, 0x0, 0x1, @tproxy={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x3}]}}}, {0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xcc6d6bf9ebe73065}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x100}}, 0x40000) 16:01:09 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x109800) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) 16:01:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000003100)=@gcm_128={{0x303}, "0400", "0d07080d004fcf0000e8ffff1a8600", "cf0d00", "8657e2b7e43b34e4"}, 0x28) write$binfmt_script(r0, &(0x7f0000001300)=ANY=[], 0x8f) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfccf}, &(0x7f0000000240)=0x40) writev(r0, &(0x7f00000030c0)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000180)=0x40) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0x1}], 0x1) [ 45.369231][ T28] audit: type=1400 audit(1712678470.058:195): avc: denied { read } for pid=3774 comm="syz-executor.3" name="sg0" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 45.370325][ T23] ------------[ cut here ]------------ [ 45.393147][ T28] audit: type=1400 audit(1712678470.058:196): avc: denied { open } for pid=3774 comm="syz-executor.3" path="/dev/sg0" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 45.398568][ T23] WARNING: CPU: 1 PID: 23 at drivers/scsi/sg.c:2236 sg_remove_sfp_usercontext+0x3cd/0x3f0 [ 45.425101][ T28] audit: type=1400 audit(1712678470.058:197): avc: denied { ioctl } for pid=3774 comm="syz-executor.3" path="/dev/sg0" dev="devtmpfs" ino=113 ioctlcmd=0x2285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 45.432633][ T23] Modules linked in: 16:01:10 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000003400090000000000000000000300"], 0x2c}}, 0x0) [ 45.432644][ T23] CPU: 1 PID: 23 Comm: kworker/1:0 Not tainted 6.9.0-rc3-syzkaller-00011-g20cb38a7af88 #0 [ 45.472153][ T23] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 45.482388][ T23] Workqueue: events sg_remove_sfp_usercontext [ 45.488771][ T23] RIP: 0010:sg_remove_sfp_usercontext+0x3cd/0x3f0 [ 45.495256][ T23] Code: e2 fe 4c 89 ff e8 33 c4 f8 ff 31 ff e8 4c 8f d5 fe 48 83 c4 28 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 34 2e e2 fe 90 <0f> 0b 90 e9 36 ff ff ff e8 26 2e e2 fe 48 89 df be 03 00 00 00 e8 [ 45.515055][ T23] RSP: 0018:ffffc900000cfd10 EFLAGS: 00010293 [ 45.521187][ T23] RAX: ffffffff824bf2ec RBX: ffff8881021d1c98 RCX: ffff888100f82100 [ 45.529186][ T23] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 45.537312][ T23] RBP: 0000000000000002 R08: ffffffff824bf21d R09: 0000000080040002 [ 45.545396][ T23] R10: 0000000080040003 R11: 000188811717ffff R12: ffff88811717e060 [ 45.553421][ T23] R13: ffff88811717e000 R14: ffff8881021d1c00 R15: ffff88810014f000 [ 45.561483][ T23] FS: 0000000000000000(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 45.570635][ T23] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.575424][ T28] audit: type=1400 audit(1712678470.258:198): avc: denied { write } for pid=3778 comm="syz-executor.0" name="task" dev="proc" ino=5507 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 45.577302][ T23] CR2: 00007f1b007332d8 CR3: 0000000006032000 CR4: 00000000003506f0 [ 45.607059][ T23] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 45.611588][ T28] audit: type=1400 audit(1712678470.298:199): avc: denied { add_name } for pid=3778 comm="syz-executor.0" name="core" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 45.615102][ T23] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 45.635377][ T28] audit: type=1400 audit(1712678470.298:200): avc: denied { create } for pid=3778 comm="syz-executor.0" name="core" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 45.643297][ T23] Call Trace: [ 45.643307][ T23] [ 45.669786][ T23] ? __warn+0x13c/0x350 [ 45.673987][ T23] ? report_bug+0x315/0x420 [ 45.678523][ T23] ? sg_remove_sfp_usercontext+0x3cd/0x3f0 [ 45.684327][ T23] ? handle_bug+0x3e/0x70 [ 45.688812][ T23] ? exc_invalid_op+0x1a/0x50 [ 45.693523][ T23] ? asm_exc_invalid_op+0x1a/0x20 [ 45.698677][ T23] ? sg_remove_sfp_usercontext+0x2fd/0x3f0 [ 45.704486][ T23] ? sg_remove_sfp_usercontext+0x3cc/0x3f0 [ 45.710423][ T23] ? sg_remove_sfp_usercontext+0x3cd/0x3f0 16:01:10 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) preadv(r0, &(0x7f0000002640)=[{&(0x7f0000000080)=""/117, 0x75}], 0x300, 0x7fffffffffffffff, 0x0) [ 45.716283][ T23] process_scheduled_works+0x465/0x990 [ 45.721765][ T23] worker_thread+0x526/0x730 [ 45.726406][ T23] ? __pfx_worker_thread+0x10/0x10 [ 45.731543][ T23] kthread+0x1d1/0x210 [ 45.736227][ T23] ? __pfx_kthread+0x10/0x10 [ 45.741339][ T23] ret_from_fork+0x4b/0x60 [ 45.745794][ T23] ? __pfx_kthread+0x10/0x10 [ 45.750425][ T23] ret_from_fork_asm+0x1a/0x30 [ 45.755371][ T23] [ 45.758470][ T23] ---[ end trace 0000000000000000 ]--- 16:01:10 executing program 4: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@link_local={0x3}, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @loopback}, "110022ebffff0000"}}}}}, 0x0) 16:01:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[@ANYBLOB="000600000000000005020000c20400000000c910fe8000000000000000000000000000bb0000000010"], 0x40) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x8000, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 16:01:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="300000003200310300000000000000000000000008000400040000ef13000100100001000b00010073616d706c65"], 0x30}}, 0x0) 16:01:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe0}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000180)='r', 0x1}], 0x1) sendmmsg$inet(r0, &(0x7f0000007ec0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000680)="f48384274d2bac67ab85aede6ce2f5e39c88685b2624aa926669cf82329144ee1a06631529204ab41109db90c58d1ea983f8ed0f40f2a742799228382973e53bf8b95b1ebc9b00188925ee5f482dc843afa8a5bb4998c004461fd303385e07fcc21612f128598dcfe6bf5d858491a5d6eb159048cd268ff7bba585a1ca97e0329c40274d6f97427c1c2c3bf107a35e4152c120b0eb221bab78a9bd85ec88d202460476e0135ecc8ebac3fd836b264dd6900402645badb2dd8f6e1b5e6f827b1e3d", 0xc1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000008380)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000002c0)="e7cb288ab416d9c45b8717959580eff46434fa3b3a55a489567e879fec190c2bb15223756b407a1be80fbbded6202d1f781b739a114c545dd8ed66a806267a358c66358e076f810b4b0abd1f4ef69da6966c7182a6a2cafd12b59f6a8f25fc0de9c4491384a390cac9dc7282e48b7b462779a23f685ffc949ac625303a0159533f6c350f4c92c8af2811080fd888bdf0ba831cb3ccd5f3e8175d05787ec3158ad9fda40c808be67c0c065e655e94c8e3de00c701be42715cc9b2e7aa0d0bd5", 0xbf}, {&(0x7f0000000380)="0a12", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000640)="80", 0x1}], 0x1}}], 0x2, 0x488c1) 16:01:10 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000780)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0}) [ 46.061176][ T3787] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 16:01:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB="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"/319], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@map=r1, r0, 0x26}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@map=r1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)