[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 118.047369][ T33] kauditd_printk_skb: 4 callbacks suppressed [ 118.047430][ T33] audit: type=1800 audit(1584314799.092:39): pid=11263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 118.113645][ T33] audit: type=1800 audit(1584314799.132:40): pid=11263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 118.864386][ T33] audit: type=1400 audit(1584314799.912:41): avc: denied { map } for pid=11432 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.21' (ECDSA) to the list of known hosts. 2020/03/15 23:26:52 fuzzer started syzkaller login: [ 131.384834][ T33] audit: type=1400 audit(1584314812.432:42): avc: denied { map } for pid=11448 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/15 23:26:57 dialing manager at 10.128.0.26:39629 2020/03/15 23:26:57 syscalls: 2967 2020/03/15 23:26:57 code coverage: enabled 2020/03/15 23:26:57 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/03/15 23:26:57 extra coverage: enabled 2020/03/15 23:26:57 setuid sandbox: enabled 2020/03/15 23:26:57 namespace sandbox: enabled 2020/03/15 23:26:57 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/15 23:26:57 fault injection: enabled 2020/03/15 23:26:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/15 23:26:57 net packet injection: enabled 2020/03/15 23:26:57 net device setup: enabled 2020/03/15 23:26:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/15 23:26:57 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 136.785077][ T33] audit: type=1400 audit(1584314817.832:43): avc: denied { integrity } for pid=11464 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 23:29:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x37, &(0x7f0000000000), 0x20a154cc) [ 303.906920][ T33] audit: type=1400 audit(1584314984.952:44): avc: denied { map } for pid=11466 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 304.520829][T11467] IPVS: ftp: loaded support on port[0] = 21 [ 304.729689][T11467] chnl_net:caif_netlink_parms(): no params data found [ 304.876909][T11467] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.884254][T11467] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.893638][T11467] device bridge_slave_0 entered promiscuous mode [ 304.908921][T11467] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.916307][T11467] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.925695][T11467] device bridge_slave_1 entered promiscuous mode [ 304.976026][T11467] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.994979][T11467] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 305.042840][T11467] team0: Port device team_slave_0 added [ 305.058033][T11467] team0: Port device team_slave_1 added [ 305.113105][T11467] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 305.120173][T11467] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.146768][T11467] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 305.174251][T11467] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 305.181301][T11467] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.207758][T11467] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 305.409145][T11467] device hsr_slave_0 entered promiscuous mode [ 305.663789][T11467] device hsr_slave_1 entered promiscuous mode [ 306.169851][ T33] audit: type=1400 audit(1584314987.212:45): avc: denied { create } for pid=11467 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 306.176850][T11467] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 306.194865][ T33] audit: type=1400 audit(1584314987.212:46): avc: denied { write } for pid=11467 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 306.194962][ T33] audit: type=1400 audit(1584314987.212:47): avc: denied { read } for pid=11467 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 306.362408][T11467] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 306.472084][T11467] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 306.623007][T11467] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 306.945755][T11467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.984990][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.994619][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.018752][T11467] 8021q: adding VLAN 0 to HW filter on device team0 [ 307.042196][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.053199][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.062688][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.069898][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.123444][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 307.132770][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 307.143366][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.152908][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.160194][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.169242][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 307.180626][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 307.206320][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 307.217003][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 307.254554][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 307.264940][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.275274][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.314278][T11467] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 307.324982][T11467] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 307.340509][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 307.350228][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 307.360744][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 307.370478][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.383603][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 307.437055][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 307.444870][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 307.479878][T11467] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 307.545168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 307.555779][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 307.616248][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 307.627958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.653973][T11467] device veth0_vlan entered promiscuous mode [ 307.665478][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.675018][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.709927][T11467] device veth1_vlan entered promiscuous mode [ 307.794518][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 307.803907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 307.813356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 307.823171][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 307.847008][T11467] device veth0_macvtap entered promiscuous mode [ 307.873955][T11467] device veth1_macvtap entered promiscuous mode [ 307.936679][T11467] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 307.945231][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 307.954551][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 307.963701][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 307.973524][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 308.000934][T11467] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 308.009646][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 308.020298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 308.468098][ T33] audit: type=1400 audit(1584314989.492:48): avc: denied { associate } for pid=11467 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 23:29:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000080)={@dev, 0x2}, 0x20) 23:29:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x28) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) ioctl$SIOCPNADDRESOURCE(r2, 0x89e0, &(0x7f0000000180)=0x200) [ 308.956807][ T33] audit: type=1400 audit(1584314990.002:49): avc: denied { open } for pid=11500 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 308.981267][ T33] audit: type=1400 audit(1584314990.002:50): avc: denied { kernel } for pid=11500 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 23:29:50 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000040)={{}, 0x0, 0x0, 0x0}) [ 309.005229][ T33] audit: type=1400 audit(1584314990.002:51): avc: denied { confidentiality } for pid=11500 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 309.053590][ C0] hrtimer: interrupt took 69795 ns 23:29:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x28) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) ioctl$SIOCPNADDRESOURCE(r2, 0x89e0, &(0x7f0000000180)=0x200) [ 310.006670][T11509] IPVS: ftp: loaded support on port[0] = 21 23:29:51 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x3, &(0x7f0000000140)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) [ 310.243632][T11509] chnl_net:caif_netlink_parms(): no params data found [ 310.450222][T11509] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.457664][T11509] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.466976][T11509] device bridge_slave_0 entered promiscuous mode [ 310.483977][T11509] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.491185][T11509] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.500533][T11509] device bridge_slave_1 entered promiscuous mode [ 310.555125][T11509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.574454][T11509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:29:51 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x34, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}]}, 0x34}}, 0x0) [ 310.635163][T11509] team0: Port device team_slave_0 added [ 310.650489][T11509] team0: Port device team_slave_1 added [ 310.693354][T11509] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 310.700481][T11509] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.726494][T11509] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 310.745846][T11509] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 310.753005][T11509] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.779169][T11509] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 310.898553][T11509] device hsr_slave_0 entered promiscuous mode [ 311.053290][T11509] device hsr_slave_1 entered promiscuous mode [ 311.202901][T11509] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 311.210580][T11509] Cannot create hsr debugfs directory 23:29:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x58}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'caif0\x00', 0x2000}) 23:29:52 executing program 0: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7f, 0x0, 0x20000dd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0}) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000100000000000000001a00000008009a00000000000800010000000000340022800800050000000000080002000000000008000200000000000800030000000000080007000000000008000700000000070021006161"], 0x3}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x58}}, 0x0) fcntl$setlease(r0, 0x400, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 311.634694][T11509] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 311.653378][T11529] EXT4-fs (loop0): Unrecognized mount option "À" or missing value [ 311.661460][T11529] EXT4-fs (loop0): failed to parse options in superblock: À [ 311.669505][T11529] EXT4-fs (loop0): invalid inodes per group: 16384 [ 311.669505][T11529] [ 311.691155][T11509] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 311.849343][T11509] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 311.945768][T11509] netdevsim netdevsim1 netdevsim3: renamed from eth3 23:29:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1c8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x218) 23:29:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001cc0)="2e00000018008102e00f80ecdb4cb92e0a06022c000cd300e8bd6efb120009000e003f000300000006000500fe2e", 0x2e}], 0x1}, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = gettid() fcntl$setown(r1, 0x8, r2) r3 = getpgid(r2) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xff, 0x2d, 0x1, 0xff, 0x0, 0x76c8, 0xc004, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xf115, 0x4, @perf_config_ext={0x9, 0xfffffffffffffffc}, 0x2000, 0x2, 0x0, 0x9, 0x5, 0x8, 0xff62}, r3, 0x3, r4, 0x4) [ 312.276751][T11541] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 312.284184][T11541] IPv6: NLM_F_CREATE should be set when creating new route [ 312.291469][T11541] IPv6: NLM_F_CREATE should be set when creating new route [ 312.298865][T11541] IPv6: NLM_F_CREATE should be set when creating new route [ 312.326103][T11541] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 312.438638][T11509] 8021q: adding VLAN 0 to HW filter on device bond0 23:29:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) write(r0, &(0x7f00000001c0)="46aaff0f57500fd6002835a69a25aea53971597258d55e", 0x17) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x60000000, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2={0x0}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty={[0x23]}}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r3, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}]}, 0x48}, 0x1, 0x0, 0x0, 0x8005}, 0x4000000) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2={0xff, 0x11}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) [ 312.518837][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.528330][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.553552][T11509] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.580331][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 312.590081][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.600351][ T2772] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.607604][ T2772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.660114][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 312.669586][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 312.679342][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 312.688567][ T2772] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.695807][ T2772] bridge0: port 2(bridge_slave_1) entered forwarding state 23:29:53 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000)="9df24a9f2149898aee0d899b8658b704d4b200000000000000093c22abeb6fdd2d58574f75598012303d7c647accd0d0a10fd9a4f9fce0e084292a357ed78772343f9360b851335cf61dc1a82d1e00bc024e05cd921a7d969199f34d1e300c94bb8dd9ee8d0bb684bc5e63b50d940c7e5741686995096806beaef534c8978159b7", 0x81, 0x0, &(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) [ 312.704813][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 312.715478][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 312.828757][T11509] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 312.839266][T11509] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 312.866117][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 312.876637][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 312.886956][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 312.897258][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 312.907481][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 312.916933][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 312.926792][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 312.936396][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 312.949841][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 312.961184][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:29:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @rc={0x1f, @none, 0x7}, @ax25={0x3, @default, 0x3}, @hci={0x1f, 0x4, 0x4}, 0xffff, 0x0, 0x0, 0x0, 0x3ff, &(0x7f0000000140)='ip6gre0\x00', 0x5, 0x0, 0x7}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x58}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x58}}, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r5}, 0x14) getsockname$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000400)=[@in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e23, 0xa79, @rand_addr="9f4d3c2a0e1c628371798a46e1a2612b", 0x8}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @remote}, 0x1ae84fb}], 0x68) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vxcan1\x00', r6}) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=@newchain={0xd0, 0x64, 0x20, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0xfff1, 0x10}, {0x7, 0xc}, {0x0, 0x10}}, [@TCA_CHAIN={0x8, 0xb, 0x3ff}, @TCA_RATE={0x6, 0x5, {0x3f, 0x8}}, @TCA_RATE={0x6, 0x5, {0x1f, 0x21}}, @filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x68, 0x2, [@TCA_FLOWER_KEY_ETH_DST_MASK={0xa, 0x5, [0xff, 0xff, 0x0, 0xff]}, @TCA_FLOWER_KEY_FLAGS_MASK={0x8, 0x30, 0x3ff}, @TCA_FLOWER_KEY_IPV6_DST={0x14, 0x10, @remote}, @TCA_FLOWER_KEY_IPV6_SRC_MASK={0x14, 0xf, [0xff, 0xff, 0xffffff00, 0xffffffff]}, @TCA_FLOWER_KEY_CT_MARK_MASK={0x8}, @TCA_FLOWER_CLASSID={0x8, 0x1, {0xfff3, 0xffe0}}, @TCA_FLOWER_KEY_VLAN_ID={0x6, 0x17, 0xfc0}, @TCA_FLOWER_KEY_IP_TOS_MASK={0x5, 0x4a, 0x98}, @TCA_FLOWER_KEY_ICMPV6_TYPE_MASK={0x5}]}}, @TCA_RATE={0x6, 0x5, {0x20, 0x5f}}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x4, 0x3}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x24040094}, 0x8890) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5d, 0x25}}, &(0x7f0000000000)='GPL\x00', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) [ 313.060157][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 313.069256][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 313.137826][T11509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 313.166808][ T33] audit: type=1400 audit(1584314994.212:52): avc: denied { ioctl } for pid=11553 comm="syz-executor.0" path="socket:[29511]" dev="sockfs" ino=29511 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 313.245465][ T33] audit: type=1400 audit(1584314994.252:53): avc: denied { prog_load } for pid=11553 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 313.280430][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 313.290376][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 313.361129][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 313.371554][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.400008][T11509] device veth0_vlan entered promiscuous mode [ 313.410335][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.418509][ T33] audit: type=1400 audit(1584314994.462:54): avc: denied { prog_run } for pid=11553 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 313.419596][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.481478][T11509] device veth1_vlan entered promiscuous mode 23:29:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8, 0x35, 0x1}, 0x8) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) ioctl$CAPI_GET_PROFILE(r4, 0xc0404309, &(0x7f0000000200)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/147, 0x93, 0x2002, &(0x7f0000000140)={0x11, 0xc, r3, 0x1, 0x8, 0x6, @broadcast}, 0x14) [ 313.575601][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 313.584968][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 313.594348][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 313.604291][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 313.629743][T11509] device veth0_macvtap entered promiscuous mode [ 313.667680][T11509] device veth1_macvtap entered promiscuous mode [ 313.734353][T11509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 313.744999][T11509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.758391][T11509] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 313.766701][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 313.776370][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 313.785463][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 313.795235][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 313.831926][T11509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 313.844797][T11509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.862396][T11509] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 313.872808][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 313.883096][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:29:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x74, &(0x7f0000000140)={r4, 0x0, 0x20}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={r4, 0x4c}, 0x8) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x5}]}, 0x1c}}, 0x0) [ 314.960963][ T33] audit: type=1400 audit(1584314996.002:55): avc: denied { create } for pid=11584 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 23:29:56 executing program 0: r0 = epoll_create1(0x80000) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000280)={0x1, 0x2, 0x1000, 0xe9, &(0x7f0000000180)="7b712a475697647dcc7da2bd35d8a1a3db0b2b028ffaecc606a7cfdf132378461545514beef785992368f77deaa92172e0d508a531d7d1c8555514c3d4a81012f883973758778e77fe3a114383c9c9d90f210f94cd6071896deb03648020245561356b2fd512113b255dfe1ce43d1b98741e742a8535f6f7df229d9d448fdcd04b3868be3aead78169adec3d566eb873ad97c18a3e560ebde3ab14c064173c4dd5a37c7ce8b3d8f9284e6ea82fd94f3b3dd7337a1ca65df261e3c4d8b89f5482a3e61449dd7bf5cbe0c5c30739a6c805b9ab8679bbace4a6462c8cf6eb0a97545ee635aa80d8240a38", 0x1e, 0x0, &(0x7f0000000100)="77b81183a708330efb7dc66e7e32c6006132253e76b69bf0f1180c53cc2f"}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="58297b1b6a0000050000000800000000d700009d05000000d82458737cc23d2ff6997eda939da8d9b2b90a6b8ab4b563fb6018e8e82a2d48a60a0fa0079da8fd0b074a88ffff000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006970766c616e00001400028006000100000000000600020000000000140003006970766c616e31000000000000000000"], 0x58}}, 0x0) fstatfs(r1, &(0x7f0000000000)=""/93) [ 315.043574][ T33] audit: type=1400 audit(1584314996.052:56): avc: denied { write } for pid=11584 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 23:29:56 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000040)) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x240000, 0x0) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000000140)={0xff, 0x3}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0504cd080e76feffff6e93791f9dcf419077cb5faa0189820f7736bc2e61808fbdbd78b6dd4b063ff030bab91e28eff5dffddbdec9746cfbca78e0bcbf9192fcc88917155386bdd31530c12428945c464f09e3fe1dcdbe7ef14fdac0ad5016394c55f5c11ec75d9e36a7cf89fab32de633ad2a5eb4b4c39085fa67d483430d6a348be50ff78a7c6b8126b6922000a207779c39a4243cd9150c36b752c453d710ff1985a08eb966eb0f2a715caaa3dcc9bcea62a5d3778b8bfc2ee257370e600f4b92ac1d810b93557fc3f09037e64b21d8dc8c69b9efbfcba613676dd96da5f6e6936b", @ANYRES16=r3, @ANYBLOB="010300000000000000000d00000008000300", @ANYRES32=r6, @ANYBLOB], 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x48000) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r7 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) openat$cgroup_int(r7, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x800, &(0x7f0000000300)={0xa, 0x4e1f, 0x0, @mcast1}, 0x1c) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x1000, 0x0) 23:29:56 executing program 0: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="000000000000e67300000000", @ANYRES32=r1, @ANYBLOB="000000000300000095000000000000006549800001000000851000000500000018280000", @ANYRES32=r2, @ANYBLOB="00000000cf000000"], &(0x7f00000000c0)='GPL\x00', 0x2, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0xd, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffeba, 0x10, 0x0}, 0x74) 23:29:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r3, @in, 0x0, 0xfffd, 0x0, 0x0, 0x300}, 0x9c) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x4c, r4, 0x8, 0x246f, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7f}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000092) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r3, 0xfa}, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) 23:29:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r3, @in, 0x0, 0xfffd, 0x0, 0x0, 0x300}, 0x9c) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x4c, r4, 0x8, 0x246f, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7f}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000092) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r3, 0xfa}, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) 23:29:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r3, @in, 0x0, 0xfffd, 0x0, 0x0, 0x300}, 0x9c) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x4c, r4, 0x8, 0x246f, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7f}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000092) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r3, 0xfa}, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) 23:29:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r3, @in, 0x0, 0xfffd, 0x0, 0x0, 0x300}, 0x9c) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x4c, r4, 0x8, 0x246f, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7f}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000092) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r3, 0xfa}, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) 23:29:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r3, @in, 0x0, 0xfffd, 0x0, 0x0, 0x300}, 0x9c) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x4c, r4, 0x8, 0x246f, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7f}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000092) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r3, 0xfa}, 0x0) 23:29:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r3, @in, 0x0, 0xfffd, 0x0, 0x0, 0x300}, 0x9c) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x4c, r4, 0x8, 0x246f, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7f}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000092) 23:29:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40000000000000061111000000000008510000002000000850000000700000095000000000000009500801200000000"], &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000200)) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:setfiles_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x31}}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008884}, 0x80) 23:29:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r3, @in, 0x0, 0xfffd, 0x0, 0x0, 0x300}, 0x9c) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') 23:29:58 executing program 1: sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f00000031c0)={0x0, 0x0, &(0x7f0000003180)={&(0x7f0000000040)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14}}]}, 0x38}}, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x58}}, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', r3}) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x74, &(0x7f0000000140)={r5, 0x0, 0x20}, &(0x7f0000000040)=0x18) r6 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r6, 0xc0445611, &(0x7f0000000200)={0x7fff, 0x9, 0x4, 0x0, 0x7, {r7, r8/1000+30000}, {0x4, 0xc, 0x2, 0xf9, 0x1f, 0xe0, "49f1efb1"}, 0x8, 0x2, @offset=0x7, 0x2, 0x0, 0xffffffffffffffff}) r10 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r9, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r10, 0xbceb143248a38605, 0x70bd29, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000007}, 0x4000001) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000000)={r5, 0x8}, 0x8) 23:29:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r3, @in, 0x0, 0xfffd, 0x0, 0x0, 0x300}, 0x9c) 23:29:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 23:29:58 executing program 1: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x78, 0x0, 0x5, [{0x6, 0xe5, 0xe, 0x7, 'systembdevbdev'}, {0x5, 0x1f, 0x24, 0x40, 'vboxnet1cgroupmd5sumposix_acl_access'}]}, 0x78) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r2, &(0x7f000000bd00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f0000001400)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000004a80)=[@hoplimit={{0x10, 0x29, 0x34, 0x8001}}], 0x10}}], 0x2, 0x0) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r3, 0x80044121, &(0x7f0000000140)) 23:29:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x3, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c060}, 0x400) [ 317.888715][T11642] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:29:59 executing program 1: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0xc00) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x0, 0xd2, 0x7, 0x9, 0x3, 0x6, 0x64, 0x31f, 0x40, 0x1b7, 0x9, 0x7, 0x38, 0x1, 0x3, 0x1, 0x61}, [{0x1, 0x8, 0x2, 0x9, 0xddb, 0x4, 0x4db7f91b, 0x6}], "93d34d2bd0d313e82c114166da0b60016c703997285bfac4f6e8ca464d4c7bd3909a5dda3de6c43ee9d9d199637c8cdc3e7b2e154c2fd25be0f0b791063795ed46105de8722a34999aecea20fc66c46d13646935926b5fb3d3b0c9158595a7830e013b8bbdaefeab1e523f45bc76bc48b89b421b9830af41ff23afba8760e8404de83c4768f9d923f060ae0eb251115fb075e6d055d09eed335701c6b683179d88b3da9d71f050e7b6a62a42f1adab8bd75e53cfc3177e100985b4b9ef1c2532e42c067bd64ca5c4c1689ef3209b9cf501", [[], [], [], [], [], [], []]}, 0x849) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000000)={0x7fffffff, 0x3, 0x1}) syz_read_part_table(0xfffffffd, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="020182ffffff0a000000ff45ac0000ffffffbf000800000000000000004000ffffffa6000000e1000000887700720030070005000fffff000000008000da55aa", 0x2, 0x1c8}]) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000100)={0x2, 'syz_tun\x00', {0x1}, 0x8161}) 23:29:59 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x48001, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x37}, 0xfffffff9}, @in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x37}, 0x3}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e22, 0x200, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x40}, @in6={0xa, 0x4e21, 0x3, @empty, 0x40}], 0xa0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0xa, "e872b7"}, 0x5, 0x3) recvfrom$l2tp(0xffffffffffffffff, &(0x7f00000001c0)=""/82, 0x52, 0x60, &(0x7f0000000240)={0x2, 0x0, @empty}, 0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x618d58d}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000300)={r2, 0x9, 0x5, 0x5, 0x3, 0x7}, 0x14) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0445609, &(0x7f0000000340)={0xfffffffb, 0x7, 0x4, 0x40000, 0x4, {0x0, 0x2710}, {0x2, 0x8, 0x53, 0xf3, 0x5, 0x7, "fadc48e0"}, 0x800, 0x3, @offset=0x9d, 0x4, 0x0, r0}) bind$vsock_stream(r3, &(0x7f00000003c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000400)={{0x1d, @initdev={0xac, 0x1e, 0x4, 0x0}, 0x4e23, 0x1, 'ovf\x00', 0x8, 0x2, 0x24}, {@multicast2, 0x4e22, 0x0, 0x3, 0x0, 0x7}}, 0x44) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsa\x00', 0x142, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r4, 0xc01864b0, &(0x7f00000004c0)={0xce, 0x2000000, 0xd, 0x7fff, 0x9}) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x20000, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, &(0x7f0000000540)={0x3b, @multicast1, 0x4e24, 0x2, 'lc\x00', 0x20, 0x0, 0x3f}, 0x2c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000580)=r5, 0x4) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000005c0)) r7 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r7, 0x8982, &(0x7f0000000600)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000680)={0x1, 0xa, [@broadcast, @random="d09368fc2917", @local, @link_local, @empty, @remote, @local, @broadcast, @dev={[], 0x10}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}]}) 23:29:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) 23:29:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) 23:29:59 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x58}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@mpls_newroute={0x24, 0x18, 0x4, 0x70bd2b, 0x25dfdbfb, {0x1c, 0x20, 0x80, 0x1, 0xfe, 0x3, 0xff, 0xb, 0x900}, [@RTA_DST={0x8, 0x1, {0x9}}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x24000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="0dffffff", @ANYRES16=r0, @ANYBLOB="c18f10000000000000006b00000073235a67024322f8f14c08dc113d238e5981b32c7ccc2ad9e962bb431f8a4a3235c02aed7ac9bc47f68ce4e427230533a168f3fe3027519dc26ced3aa007a2b9edcba2448647c5803b88afd167d328902d3d5bc59036a9c7397b95cff2503b0ffe547147d20c29360973987f071855f44b14811494a4a7ff7d59b1c0493428ce7b0d318f7d868a78b25f7766ad65069e15dc7102703b8662c2f2ee95c5196719a26a862370c902652ab235205ad2c8eb03e819d9ac2f5fa9ff74a92287acb3d24526ae220b31b4e16b80b1e607ed6fc0d3cb1ea514"], 0x14}}, 0x0) 23:29:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) 23:29:59 executing program 1: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x200800, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r1, 0x14, 0x1, r2}, 0x14) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='cmdline\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:30:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) [ 319.081018][T11668] IPVS: ftp: loaded support on port[0] = 21 23:30:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) [ 319.420570][T11668] chnl_net:caif_netlink_parms(): no params data found [ 319.602562][T11668] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.609906][T11668] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.619310][T11668] device bridge_slave_0 entered promiscuous mode [ 319.638882][T11668] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.646295][T11668] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.655697][T11668] device bridge_slave_1 entered promiscuous mode [ 319.708047][T11668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.731229][T11668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.786781][T11668] team0: Port device team_slave_0 added [ 319.804342][T11668] team0: Port device team_slave_1 added [ 319.852642][T11668] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 319.859712][T11668] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 319.885834][T11668] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 319.907690][T11668] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 319.915029][T11668] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 319.941176][T11668] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 320.069031][T11668] device hsr_slave_0 entered promiscuous mode [ 320.109706][T11668] device hsr_slave_1 entered promiscuous mode [ 320.162444][T11668] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 320.170211][T11668] Cannot create hsr debugfs directory 23:30:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) [ 320.617863][T11668] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 320.673567][T11668] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 320.734324][T11668] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 320.796921][T11668] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 321.312612][T11668] 8021q: adding VLAN 0 to HW filter on device bond0 23:30:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) [ 321.391807][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.401004][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.462178][T11668] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.533904][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.543831][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.552920][ T2772] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.560107][ T2772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.619224][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.628316][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.638315][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.647917][ T2772] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.655177][ T2772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.664162][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.674998][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:30:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r2, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="1c00000013638d0ebfc4fae75cf8895ea554f6a7d7169c57d15fb071a8799435d18ff2b016a963c08e9d08d3e2f7ff7183461abfe3aeebc316a0226b1373d812caf73181c4ba2372574092e98935b9d1b56dde7d2c40193c774982118b3d9082185fb4ce334acf4bf4af276b917685d46187963ac51b4d58911ec41fcfbdbbe3432ac05e38acdd26f42c0194afa0b2f936f53804138be762d7ad8bd52a3002", @ANYRES16=r3, @ANYBLOB="000326bd7000ffdbdf25040000000800020003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000011}, 0x11) ioctl$TCSETX(r1, 0x5433, &(0x7f0000000240)={0x4, 0x9, [0x1ff, 0x4, 0x0, 0x2, 0x1], 0xff}) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="100300000a2efd1b95ebfee9c59e6c8c773fb8e041849e050000003f3048314f8545b12a4d95dbfdfe357759ac36b2169d08ae2001fa4c769d1953ed9404101c43cda544754b", @ANYRES16=r3, @ANYBLOB="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"], 0x310}, 0x1, 0x0, 0x0, 0x4000}, 0x1) [ 321.762875][T11668] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 321.773895][T11668] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 321.803751][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.814657][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.824702][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.834854][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.844826][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.854197][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.864314][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.873740][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.956719][T11668] 8021q: adding VLAN 0 to HW filter on device batadv0 23:30:03 executing program 1: r0 = socket$packet(0x11, 0x808000000002, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x58}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, r4) fchown(r1, r3, r4) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r0, 0x107, 0x9, 0x0, &(0x7f0000000080)) [ 322.003543][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.014083][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.022928][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 322.030670][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 322.139546][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 322.149031][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.231593][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 322.241403][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.269415][T11668] device veth0_vlan entered promiscuous mode [ 322.281029][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.290131][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.333656][T11668] device veth1_vlan entered promiscuous mode [ 322.393326][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 322.402713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 322.470157][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.480211][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.521036][T11668] device veth0_macvtap entered promiscuous mode [ 322.558313][T11668] device veth1_macvtap entered promiscuous mode [ 322.627171][T11668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.638611][T11668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.648617][T11668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.659154][T11668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.672628][T11668] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 322.693526][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 322.704757][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.713988][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.723836][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.763857][T11668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.776220][T11668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.786277][T11668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.796819][T11668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.810436][T11668] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 322.821398][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 322.831450][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 323.505247][T11725] IPVS: set_ctl: invalid protocol: 59 224.0.0.1:20004 [ 323.526955][T11726] IPVS: set_ctl: invalid protocol: 59 224.0.0.1:20004 23:30:04 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="440000001f000100000000000000000000000000300001006c00010009000100627066001c00028018000200000000000000000000000000000000010100000004000600d29a7343f0909f9c62e0ac9a074f53f3d7815a0b2224ff80f4de95aa60679c5012b5a4eb738f683f501edc86c2db09ebb27b1644aadec4641dc0000c3d25f7c9dcdf77680fbc83190b16137a0b38301d9f0b8abf2e79d19f6a406ffecf972d7705ca11837c7962fe934104b41f795d516f9f851c38b7b81b9bd2976392df5f"], 0x1}}, 0x0) 23:30:04 executing program 0: shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) 23:30:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000706010400000000000000000000000005000100070000000800064000000100070000000800064000000007"], 0x34}}, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, r4}, 0x14) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x424001, 0x0) setsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000240), 0x4) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r7, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r8, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x10001}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x33}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}]}, 0x34}, 0x1, 0x0, 0x0, 0x40048800}, 0x44004000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @empty}, @GTPA_TID={0xc}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_LINK={0x8, 0x1, r6}, @GTPA_I_TEI={0x8, 0x8, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4804}, 0x4000000) 23:30:04 executing program 0: shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) [ 323.761168][T11734] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 23:30:05 executing program 0: shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) 23:30:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @rand_addr="51dab17fef045d7b293c3d6781fc6708"}]}, &(0x7f0000000180)=0x10) 23:30:05 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'sed\x00', 0x0, 0x7}, {@remote}}, 0x44) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x81}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x9}, &(0x7f00000001c0)=0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x58}}, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r0, 0x80044dfd, &(0x7f0000000040)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3, 0x30, r0, 0x10000000) [ 324.557619][T11752] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 20) [ 324.567436][T11752] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb006e61) [ 324.577769][T11752] FAT-fs (loop2): Filesystem has been set read-only [ 324.585261][T11752] ===================================================== [ 324.592245][T11752] BUG: KMSAN: uninit-value in fat_evict_inode+0x2f4/0x920 [ 324.599363][T11752] CPU: 1 PID: 11752 Comm: syz-executor.2 Not tainted 5.6.0-rc2-syzkaller #0 [ 324.608030][T11752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.618092][T11752] Call Trace: [ 324.621391][T11752] dump_stack+0x1c9/0x220 [ 324.625741][T11752] kmsan_report+0xf7/0x1e0 [ 324.630180][T11752] __msan_warning+0x58/0xa0 [ 324.634697][T11752] fat_evict_inode+0x2f4/0x920 [ 324.639484][T11752] ? fat_write_inode+0x250/0x250 [ 324.644424][T11752] evict+0x4ab/0xe10 [ 324.648341][T11752] iput+0xa70/0xe10 [ 324.652173][T11752] fat_fill_super+0x7b5c/0x89b0 [ 324.657092][T11752] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 324.662906][T11752] ? kmsan_get_metadata+0x11d/0x180 [ 324.668123][T11752] vfat_fill_super+0xa6/0xc0 [ 324.672730][T11752] mount_bdev+0x654/0x880 [ 324.677064][T11752] ? vfat_mount+0xe0/0xe0 [ 324.681409][T11752] vfat_mount+0xc9/0xe0 [ 324.685583][T11752] legacy_get_tree+0x169/0x2e0 [ 324.690350][T11752] ? __fat_nfs_get_inode+0x6f0/0x6f0 [ 324.695651][T11752] ? legacy_parse_monolithic+0x2c0/0x2c0 [ 324.701284][T11752] vfs_get_tree+0xdd/0x580 [ 324.705722][T11752] do_mount+0x365c/0x4ac0 [ 324.710066][T11752] ? _copy_from_user+0x15b/0x260 [ 324.715034][T11752] __se_compat_sys_mount+0x3a8/0xa10 [ 324.720340][T11752] ? kmsan_get_metadata+0x4f/0x180 [ 324.725474][T11752] __ia32_compat_sys_mount+0x157/0x1b0 [ 324.730952][T11752] ? locks_show+0x580/0x580 [ 324.736006][T11752] do_fast_syscall_32+0x3c7/0x6e0 [ 324.741062][T11752] entry_SYSENTER_compat+0x68/0x77 [ 324.746182][T11752] RIP: 0023:0xf7f53d99 [ 324.750257][T11752] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 324.769868][T11752] RSP: 002b:00000000f5d4def0 EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 324.778287][T11752] RAX: ffffffffffffffda RBX: 00000000f5d4df8c RCX: 0000000020000380 [ 324.786266][T11752] RDX: 00000000f5d4df6c RSI: 0000000000000000 RDI: 00000000f5d4dfcc [ 324.794243][T11752] RBP: 00000000f5d4e168 R08: 0000000000000000 R09: 0000000000000000 [ 324.802215][T11752] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 324.810189][T11752] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 324.818179][T11752] [ 324.820513][T11752] Uninit was created at: [ 324.824769][T11752] kmsan_save_stack_with_flags+0x3c/0x90 [ 324.830405][T11752] kmsan_alloc_page+0x12a/0x310 [ 324.835258][T11752] __alloc_pages_nodemask+0x5712/0x5e80 [ 324.840801][T11752] alloc_pages_current+0x67d/0x990 [ 324.845901][T11752] alloc_slab_page+0x111/0x12f0 [ 324.850742][T11752] new_slab+0x2bc/0x1130 [ 324.854970][T11752] ___slab_alloc+0x1533/0x1f30 [ 324.859978][T11752] kmem_cache_alloc+0xb23/0xd70 [ 324.864819][T11752] fat_alloc_inode+0x58/0x120 [ 324.869489][T11752] new_inode_pseudo+0xb1/0x590 [ 324.874255][T11752] new_inode+0x5a/0x3d0 [ 324.878412][T11752] fat_fill_super+0x634b/0x89b0 [ 324.883254][T11752] vfat_fill_super+0xa6/0xc0 [ 324.887840][T11752] mount_bdev+0x654/0x880 [ 324.892155][T11752] vfat_mount+0xc9/0xe0 [ 324.896311][T11752] legacy_get_tree+0x169/0x2e0 [ 324.901062][T11752] vfs_get_tree+0xdd/0x580 [ 324.905474][T11752] do_mount+0x365c/0x4ac0 [ 324.909797][T11752] __se_compat_sys_mount+0x3a8/0xa10 [ 324.915073][T11752] __ia32_compat_sys_mount+0x157/0x1b0 [ 324.920529][T11752] do_fast_syscall_32+0x3c7/0x6e0 [ 324.925545][T11752] entry_SYSENTER_compat+0x68/0x77 [ 324.930812][T11752] ===================================================== [ 324.937726][T11752] Disabling lock debugging due to kernel taint [ 324.943860][T11752] Kernel panic - not syncing: panic_on_warn set ... [ 324.950440][T11752] CPU: 1 PID: 11752 Comm: syz-executor.2 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 324.960482][T11752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.970615][T11752] Call Trace: [ 324.973907][T11752] dump_stack+0x1c9/0x220 [ 324.978237][T11752] panic+0x3d5/0xc3e [ 324.982167][T11752] kmsan_report+0x1df/0x1e0 [ 324.986681][T11752] __msan_warning+0x58/0xa0 [ 324.991182][T11752] fat_evict_inode+0x2f4/0x920 [ 324.995947][T11752] ? fat_write_inode+0x250/0x250 [ 325.000873][T11752] evict+0x4ab/0xe10 [ 325.004772][T11752] iput+0xa70/0xe10 [ 325.008589][T11752] fat_fill_super+0x7b5c/0x89b0 [ 325.013472][T11752] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 325.019273][T11752] ? kmsan_get_metadata+0x11d/0x180 [ 325.024468][T11752] vfat_fill_super+0xa6/0xc0 [ 325.029071][T11752] mount_bdev+0x654/0x880 [ 325.033779][T11752] ? vfat_mount+0xe0/0xe0 [ 325.038113][T11752] vfat_mount+0xc9/0xe0 [ 325.042278][T11752] legacy_get_tree+0x169/0x2e0 [ 325.047037][T11752] ? __fat_nfs_get_inode+0x6f0/0x6f0 [ 325.052324][T11752] ? legacy_parse_monolithic+0x2c0/0x2c0 [ 325.057952][T11752] vfs_get_tree+0xdd/0x580 [ 325.062379][T11752] do_mount+0x365c/0x4ac0 [ 325.066702][T11752] ? _copy_from_user+0x15b/0x260 [ 325.071657][T11752] __se_compat_sys_mount+0x3a8/0xa10 [ 325.076946][T11752] ? kmsan_get_metadata+0x4f/0x180 [ 325.082054][T11752] __ia32_compat_sys_mount+0x157/0x1b0 [ 325.087510][T11752] ? locks_show+0x580/0x580 [ 325.092004][T11752] do_fast_syscall_32+0x3c7/0x6e0 [ 325.097041][T11752] entry_SYSENTER_compat+0x68/0x77 [ 325.102136][T11752] RIP: 0023:0xf7f53d99 [ 325.106197][T11752] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 325.125792][T11752] RSP: 002b:00000000f5d4def0 EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 325.134193][T11752] RAX: ffffffffffffffda RBX: 00000000f5d4df8c RCX: 0000000020000380 [ 325.142249][T11752] RDX: 00000000f5d4df6c RSI: 0000000000000000 RDI: 00000000f5d4dfcc [ 325.153087][T11752] RBP: 00000000f5d4e168 R08: 0000000000000000 R09: 0000000000000000 [ 325.161056][T11752] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 325.169030][T11752] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 325.178427][T11752] Kernel Offset: 0x2c600000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 325.190051][T11752] Rebooting in 86400 seconds..