Warning: Permanently added '10.128.0.221' (ECDSA) to the list of known hosts. 2023/03/01 20:58:44 fuzzer started 2023/03/01 20:58:44 dialing manager at 10.128.0.163:45503 [ 47.917690][ T23] audit: type=1400 audit(1677704348.301:74): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 47.922673][ T3116] cgroup: Unknown subsys name 'net' [ 47.940415][ T23] audit: type=1400 audit(1677704348.301:75): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 47.967821][ T23] audit: type=1400 audit(1677704348.331:76): avc: denied { unmount } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.107552][ T3116] cgroup: Unknown subsys name 'rlimit' 2023/03/01 20:59:08 syscalls: 2806 2023/03/01 20:59:08 code coverage: enabled 2023/03/01 20:59:08 comparison tracing: enabled 2023/03/01 20:59:08 extra coverage: enabled 2023/03/01 20:59:08 delay kcov mmap: enabled 2023/03/01 20:59:08 setuid sandbox: enabled 2023/03/01 20:59:08 namespace sandbox: enabled 2023/03/01 20:59:08 Android sandbox: enabled 2023/03/01 20:59:08 fault injection: enabled 2023/03/01 20:59:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/03/01 20:59:08 net packet injection: enabled 2023/03/01 20:59:08 net device setup: enabled 2023/03/01 20:59:08 concurrency sanitizer: enabled 2023/03/01 20:59:08 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/03/01 20:59:08 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/03/01 20:59:08 USB emulation: /dev/raw-gadget does not exist 2023/03/01 20:59:08 hci packet injection: /dev/vhci does not exist 2023/03/01 20:59:08 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/03/01 20:59:08 802.15.4 emulation: enabled 2023/03/01 20:59:08 fetching corpus: 0, signal 0/0 (executing program) [ 48.227034][ T23] audit: type=1400 audit(1677704348.611:77): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 48.251871][ T23] audit: type=1400 audit(1677704348.611:78): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 48.275742][ T23] audit: type=1400 audit(1677704348.611:79): avc: denied { create } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 48.296222][ T23] audit: type=1400 audit(1677704348.611:80): avc: denied { write } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/03/01 20:59:08 fetching corpus: 0, signal 0/0 (executing program) [ 48.316607][ T23] audit: type=1400 audit(1677704348.611:81): avc: denied { read } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/03/01 20:59:09 starting 6 fuzzer processes 20:59:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_0\x00'}) 20:59:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x801c581f, 0x0) 20:59:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@can_newroute={0x154, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0xfffffffffffffff7}}, @CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ab24a8e9615acb7f"}, 0x1}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "dca0c35f5973ae0ff7d3bee58fe7e0f39bafebc3"}}]}, 0x154}}, 0x0) 20:59:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) 20:59:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:09 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) [ 49.563089][ T3110] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=3110 'syz-fuzzer' [ 49.672621][ T23] audit: type=1400 audit(1677704350.051:82): avc: denied { execmem } for pid=3121 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 49.736575][ T23] audit: type=1400 audit(1677704350.081:83): avc: denied { read } for pid=3128 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 50.088297][ T3128] chnl_net:caif_netlink_parms(): no params data found [ 50.279771][ T3128] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.286865][ T3128] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.294066][ T3128] bridge_slave_0: entered allmulticast mode [ 50.301102][ T3128] bridge_slave_0: entered promiscuous mode [ 50.313886][ T3139] chnl_net:caif_netlink_parms(): no params data found [ 50.334900][ T3128] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.342087][ T3128] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.349349][ T3128] bridge_slave_1: entered allmulticast mode [ 50.356065][ T3128] bridge_slave_1: entered promiscuous mode [ 50.362254][ T3134] chnl_net:caif_netlink_parms(): no params data found [ 50.381416][ T3149] chnl_net:caif_netlink_parms(): no params data found [ 50.403237][ T3140] chnl_net:caif_netlink_parms(): no params data found [ 50.425671][ T3128] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.454212][ T3128] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.468209][ T3145] chnl_net:caif_netlink_parms(): no params data found [ 50.520753][ T3128] team0: Port device team_slave_0 added [ 50.531325][ T3128] team0: Port device team_slave_1 added [ 50.542067][ T3134] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.549208][ T3134] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.556639][ T3134] bridge_slave_0: entered allmulticast mode [ 50.563025][ T3134] bridge_slave_0: entered promiscuous mode [ 50.590201][ T3139] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.597560][ T3139] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.604804][ T3139] bridge_slave_0: entered allmulticast mode [ 50.611334][ T3139] bridge_slave_0: entered promiscuous mode [ 50.617908][ T3134] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.625001][ T3134] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.632384][ T3134] bridge_slave_1: entered allmulticast mode [ 50.638783][ T3134] bridge_slave_1: entered promiscuous mode [ 50.661413][ T3139] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.668550][ T3139] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.675804][ T3139] bridge_slave_1: entered allmulticast mode [ 50.682107][ T3139] bridge_slave_1: entered promiscuous mode [ 50.697002][ T3149] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.704220][ T3149] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.711410][ T3149] bridge_slave_0: entered allmulticast mode [ 50.717769][ T3149] bridge_slave_0: entered promiscuous mode [ 50.726250][ T3140] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.733314][ T3140] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.740725][ T3140] bridge_slave_0: entered allmulticast mode [ 50.747125][ T3140] bridge_slave_0: entered promiscuous mode [ 50.753909][ T3128] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 50.760872][ T3128] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.786782][ T3128] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 50.807566][ T3149] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.814625][ T3149] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.821772][ T3149] bridge_slave_1: entered allmulticast mode [ 50.828098][ T3149] bridge_slave_1: entered promiscuous mode [ 50.841299][ T3140] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.848419][ T3140] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.855496][ T3140] bridge_slave_1: entered allmulticast mode [ 50.861816][ T3140] bridge_slave_1: entered promiscuous mode [ 50.868225][ T3128] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 50.875200][ T3128] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.901130][ T3128] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 50.912777][ T3139] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.922953][ T3134] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.941743][ T3145] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.948995][ T3145] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.956306][ T3145] bridge_slave_0: entered allmulticast mode [ 50.962847][ T3145] bridge_slave_0: entered promiscuous mode [ 50.977867][ T3139] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.987981][ T3134] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.002204][ T3145] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.009430][ T3145] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.016836][ T3145] bridge_slave_1: entered allmulticast mode [ 51.023167][ T3145] bridge_slave_1: entered promiscuous mode [ 51.048624][ T3149] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.062967][ T3140] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.087365][ T3149] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.106409][ T3140] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.117554][ T3128] hsr_slave_0: entered promiscuous mode [ 51.123540][ T3128] hsr_slave_1: entered promiscuous mode [ 51.130132][ T3139] team0: Port device team_slave_0 added [ 51.140183][ T3134] team0: Port device team_slave_0 added [ 51.151530][ T3145] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.163168][ T3145] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.178109][ T3139] team0: Port device team_slave_1 added [ 51.184713][ T3134] team0: Port device team_slave_1 added [ 51.191468][ T3149] team0: Port device team_slave_0 added [ 51.198093][ T3149] team0: Port device team_slave_1 added [ 51.248246][ T3140] team0: Port device team_slave_0 added [ 51.257968][ T3140] team0: Port device team_slave_1 added [ 51.273202][ T3149] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.280215][ T3149] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.306152][ T3149] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.317714][ T3145] team0: Port device team_slave_0 added [ 51.323697][ T3139] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.330679][ T3139] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.356613][ T3139] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.372359][ T3134] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.379359][ T3134] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.405388][ T3134] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.419038][ T3149] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.426102][ T3149] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.452242][ T3149] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.463624][ T3145] team0: Port device team_slave_1 added [ 51.469654][ T3139] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.476675][ T3139] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.502645][ T3139] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.518043][ T3134] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.525001][ T3134] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.550919][ T3134] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.576538][ T3140] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.583534][ T3140] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.609514][ T3140] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.622736][ T3140] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.629729][ T3140] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.655943][ T3140] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.681162][ T3145] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.688175][ T3145] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.714195][ T3145] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.727634][ T3145] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.734749][ T3145] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.760714][ T3145] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.789256][ T3149] hsr_slave_0: entered promiscuous mode [ 51.795319][ T3149] hsr_slave_1: entered promiscuous mode [ 51.801223][ T3149] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 51.808787][ T3149] Cannot create hsr debugfs directory [ 51.828769][ T3134] hsr_slave_0: entered promiscuous mode [ 51.834819][ T3134] hsr_slave_1: entered promiscuous mode [ 51.840635][ T3134] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 51.848211][ T3134] Cannot create hsr debugfs directory [ 51.888622][ T3139] hsr_slave_0: entered promiscuous mode [ 51.894760][ T3139] hsr_slave_1: entered promiscuous mode [ 51.900811][ T3139] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 51.908499][ T3139] Cannot create hsr debugfs directory [ 51.916433][ T3140] hsr_slave_0: entered promiscuous mode [ 51.922568][ T3140] hsr_slave_1: entered promiscuous mode [ 51.929406][ T3140] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 51.937025][ T3140] Cannot create hsr debugfs directory [ 51.969668][ T3145] hsr_slave_0: entered promiscuous mode [ 51.975923][ T3145] hsr_slave_1: entered promiscuous mode [ 51.981912][ T3145] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 51.989515][ T3145] Cannot create hsr debugfs directory [ 52.047616][ T3128] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 52.067278][ T3128] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 52.077223][ T3128] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 52.102549][ T3128] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 52.134601][ T3134] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 52.148983][ T3134] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 52.158372][ T3134] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 52.167440][ T3134] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 52.193216][ T3139] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 52.202443][ T3139] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 52.222635][ T3139] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 52.240548][ T3139] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 52.288167][ T3149] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 52.309957][ T3149] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 52.330138][ T3128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.337371][ T3149] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 52.346516][ T3149] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 52.357647][ T3134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.371133][ T3128] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.388820][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.396766][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.404577][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.412724][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.421913][ T3134] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.447953][ T3140] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 52.457378][ T3140] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 52.466065][ T3140] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 52.474950][ T3140] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 52.489699][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.498316][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.507009][ T3232] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.514043][ T3232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.521970][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.530528][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.539123][ T3232] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.546178][ T3232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.553988][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.563061][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.571843][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.580570][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.589829][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.598756][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.608000][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.616003][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.632059][ T3139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.653320][ T3134] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 52.663738][ T3134] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.682867][ T3128] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 52.693408][ T3128] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.704726][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.713251][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.721731][ T3200] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.728833][ T3200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.736969][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.745405][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.754034][ T3200] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.761105][ T3200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.769211][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.778345][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.787183][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.795827][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.804503][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.812895][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.821495][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.829831][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.838366][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.846642][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.854893][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.863225][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.871663][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.879953][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.888382][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.896427][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.904598][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.912214][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.922639][ T3139] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.931398][ T3145] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 52.950031][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.959326][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.973975][ T3145] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 52.998138][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.007177][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.015719][ T3232] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.022854][ T3232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.031120][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.039893][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.048329][ T3232] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.055359][ T3232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.063306][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.072102][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 53.079743][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 53.087270][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.096453][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.105124][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.114181][ T3145] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 53.127434][ T3134] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.143127][ T3139] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.153499][ T3139] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.165027][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.172999][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.182478][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.190948][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.199975][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.208278][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.217239][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.225704][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.234582][ T3145] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 53.265345][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.273075][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 53.282043][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.297541][ T3140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.312250][ T3128] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.333141][ T3140] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.342418][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 53.351901][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 53.359408][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.367626][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.381034][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 53.389811][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.411333][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.426225][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.434655][ T3200] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.441770][ T3200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.455212][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.463888][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.472424][ T3200] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.479533][ T3200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.487530][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.496284][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.519450][ T3149] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.532112][ T3140] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.542556][ T3140] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.554371][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.562534][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.571161][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.579779][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.588196][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.596870][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.605234][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.613612][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.621833][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.630083][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.637975][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.645839][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 53.653255][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 53.660924][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.668957][ T887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.679575][ T3139] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.698569][ T3149] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.706088][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 53.714273][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.723377][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.731259][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.747374][ T3145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.754474][ T3134] veth0_vlan: entered promiscuous mode [ 53.763815][ T3128] veth0_vlan: entered promiscuous mode [ 53.782940][ T3134] veth1_vlan: entered promiscuous mode [ 53.793493][ T3145] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.804810][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 53.813356][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 53.821614][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.830545][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.839144][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.847622][ T3232] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.854763][ T3232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.862647][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.871160][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.879775][ T3232] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.886868][ T3232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.894764][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.903924][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.913030][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 53.922114][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.930800][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.938742][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.946567][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.954251][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.962287][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.973339][ T3128] veth1_vlan: entered promiscuous mode [ 53.991688][ T3134] veth0_macvtap: entered promiscuous mode [ 53.999222][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 54.008579][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 54.016771][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 54.024857][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.033452][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.041960][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.050563][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.059082][ T3200] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.066241][ T3200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.074039][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 54.081542][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 54.088944][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.097304][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.108089][ T3140] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.116429][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.124536][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.132407][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 54.140413][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.148938][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.157612][ T3200] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.164661][ T3200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.177145][ T3128] veth0_macvtap: entered promiscuous mode [ 54.184623][ T3128] veth1_macvtap: entered promiscuous mode [ 54.196850][ T3134] veth1_macvtap: entered promiscuous mode [ 54.214207][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.232371][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.241276][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.249769][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.257823][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.266455][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.275019][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.283575][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.291889][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.300940][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.309660][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.318354][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.327077][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.335497][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.344241][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 54.352915][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.361664][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.370100][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.382707][ T3149] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.394510][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.407566][ T3134] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 54.420991][ T3145] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.431980][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.440538][ T3128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 54.451041][ T3128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 54.462368][ T3128] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 54.469841][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 54.478320][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.486823][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.495120][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.503705][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 54.512265][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.521099][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.529519][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.538027][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 54.546788][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.567182][ T3134] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 54.576984][ T3139] veth0_vlan: entered promiscuous mode [ 54.589949][ T3128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 54.600478][ T3128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 54.614756][ T3128] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 54.625997][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 54.635896][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 54.644814][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 54.653758][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.662561][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 54.671307][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 54.681033][ T3139] veth1_vlan: entered promiscuous mode [ 54.689449][ T3128] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.698240][ T3128] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.707028][ T3128] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.715837][ T3128] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.733460][ T3140] veth0_vlan: entered promiscuous mode [ 54.740418][ T3134] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.749183][ T3134] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.758002][ T3134] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.766709][ T3134] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.781163][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.790325][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.798460][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 54.807657][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 54.816304][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.824862][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 54.832480][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 54.842043][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.849804][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.867521][ T3145] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.877112][ T3149] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.898449][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 54.906925][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 54.914372][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 54.922243][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.930966][ T3232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.940389][ T3139] veth0_macvtap: entered promiscuous mode [ 54.948293][ T3140] veth1_vlan: entered promiscuous mode [ 54.963329][ T3139] veth1_macvtap: entered promiscuous mode [ 54.985379][ T23] kauditd_printk_skb: 6 callbacks suppressed [ 54.985393][ T23] audit: type=1400 audit(1677704355.361:90): avc: denied { mounton } for pid=3128 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 54.992496][ T3140] veth0_macvtap: entered promiscuous mode [ 55.045128][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 55.053490][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 55.061779][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 55.070066][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.078535][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 55.087177][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.100257][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.110854][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.120766][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.131497][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.142743][ T3139] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.152580][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.158269][ T23] audit: type=1400 audit(1677704355.531:91): avc: denied { read write } for pid=3134 comm="syz-executor.1" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 55.163173][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.198226][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.208694][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.211575][ T23] audit: type=1400 audit(1677704355.571:92): avc: denied { open } for pid=3134 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 55.221524][ T3139] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 55.243352][ T23] audit: type=1400 audit(1677704355.571:93): avc: denied { ioctl } for pid=3134 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=101 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 55.276307][ T23] audit: type=1400 audit(1677704355.581:94): avc: denied { read } for pid=3297 comm="syz-executor.1" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 20:59:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x801c581f, 0x0) 20:59:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x801c581f, 0x0) 20:59:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x801c581f, 0x0) [ 55.301136][ T23] audit: type=1400 audit(1677704355.581:95): avc: denied { open } for pid=3297 comm="syz-executor.1" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 55.326015][ T23] audit: type=1400 audit(1677704355.581:96): avc: denied { ioctl } for pid=3297 comm="syz-executor.1" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x581f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 20:59:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x801c581f, 0x0) 20:59:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x801c581f, 0x0) 20:59:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x801c581f, 0x0) [ 55.354480][ T3140] veth1_macvtap: entered promiscuous mode [ 55.366079][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 55.387543][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.398995][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.412029][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.420932][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 55.429796][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.440226][ T3139] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.448980][ T3139] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.457821][ T3139] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.466641][ T3139] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.488948][ T3140] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.499493][ T3140] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.509434][ T3140] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.519887][ T3140] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.529756][ T3140] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.540184][ T3140] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 20:59:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_0\x00'}) 20:59:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) [ 55.551414][ T3140] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.560865][ T3140] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.571573][ T3140] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.581416][ T3140] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.591860][ T3140] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.601716][ T3140] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.612397][ T3140] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.623617][ T3140] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 55.631106][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 55.639954][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.649174][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 55.657827][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.666442][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.675078][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.684042][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 55.692690][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.714761][ T3140] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.723720][ T3140] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.732477][ T3140] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.741271][ T3140] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 20:59:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@can_newroute={0x154, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0xfffffffffffffff7}}, @CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ab24a8e9615acb7f"}, 0x1}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "3f036c34f530752d7611c35149b471819add21378cdf10f3e9c41c58c7b91ec2d1492f888110be10e70a365558b5286c271e24dc83a6024c4cafb765693366ec2029774160d6b5b7136f3453ddb781f481f1ab04fbbffc61596e2490b33a68ed6ee5d1b32fa9b54f8af3bc9c5c8712b3d4810d0ab1b9745a5c46a6d0a66177901843be8752e858bae12f1f9ab837332fa2964c6c75f57cdd79d15da8f37b581f87bfa1338ee116af0bc79e8ca5867f8a6a505df7161930bc248e8b3e268fc22a2c55132589d2c6307e95c48843d0dd5f71d68d12313d53ad1e85ee5ec966602e98f74aa300d76dfa4c299cca8c8cec68f928d446e24d77d29610e41d61af6fce", 0x0, "dca0c35f5973ae0ff7d3bee58fe7e0f39bafebc3"}}]}, 0x154}}, 0x0) [ 55.864598][ T3149] veth0_vlan: entered promiscuous mode [ 55.875460][ T3242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 55.884828][ T3242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.902579][ T3337] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:59:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) [ 55.912207][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.921422][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.929478][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 55.939566][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.951279][ T3149] veth1_vlan: entered promiscuous mode [ 55.958036][ T3341] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 55.967831][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 55.980584][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.988565][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.998630][ T3145] veth0_vlan: entered promiscuous mode [ 56.013020][ T3149] veth0_macvtap: entered promiscuous mode [ 56.022781][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 56.030895][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 56.039549][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.049047][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 56.061810][ T3149] veth1_macvtap: entered promiscuous mode [ 56.073348][ T3145] veth1_vlan: entered promiscuous mode [ 56.089834][ T3149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.100356][ T3149] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.110198][ T3149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.120732][ T3149] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.130578][ T3149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.141103][ T3149] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.151103][ T3149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.161548][ T3149] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.174523][ T3149] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.186676][ T3242] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 56.194902][ T3242] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 56.204527][ T3242] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 56.212598][ T3242] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 56.222480][ T3242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.233256][ T3149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.243763][ T3149] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.253607][ T3149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.264064][ T3149] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.273890][ T3149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.284344][ T3149] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.294179][ T3149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.304622][ T3149] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.317298][ T3149] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.325410][ T3145] veth0_macvtap: entered promiscuous mode [ 56.334039][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 56.342799][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.351579][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 56.360400][ T3231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.371434][ T3242] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 56.380727][ T3149] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.389443][ T3149] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.398254][ T3149] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.407083][ T3149] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.418710][ T3145] veth1_macvtap: entered promiscuous mode [ 56.437766][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.448347][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.458273][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.468716][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.478584][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.489033][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.499089][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.509606][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.519533][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.529961][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.541327][ T3145] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.554701][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 56.562924][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 56.571799][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.581716][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.592305][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.602327][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.612896][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.622939][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.633649][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.643488][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.654041][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.663862][ T3145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.674295][ T3145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.687071][ T3145] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.700710][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 56.710494][ T23] audit: type=1400 audit(1677704357.081:97): avc: denied { read } for pid=3343 comm="syz-executor.4" name="mISDNtimer" dev="devtmpfs" ino=224 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 56.717698][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.733682][ T23] audit: type=1400 audit(1677704357.081:98): avc: denied { open } for pid=3343 comm="syz-executor.4" path="/dev/mISDNtimer" dev="devtmpfs" ino=224 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 56.745352][ T3145] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.765382][ T23] audit: type=1400 audit(1677704357.081:99): avc: denied { ioctl } for pid=3343 comm="syz-executor.4" path="/dev/mISDNtimer" dev="devtmpfs" ino=224 ioctlcmd=0x4940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 56.799280][ T3145] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.807995][ T3145] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.816795][ T3145] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.945658][ T3348] ================================================================== [ 56.953790][ T3348] BUG: KCSAN: data-race in filemap_read / generic_write_end [ 56.961106][ T3348] [ 56.963443][ T3348] write to 0xffff88810a958708 of 8 bytes by task 3347 on cpu 1: [ 56.971152][ T3348] generic_write_end+0xb4/0x360 [ 56.976155][ T3348] ext4_da_write_end+0x4bd/0x630 [ 56.981145][ T3348] generic_perform_write+0x253/0x3d0 [ 56.986449][ T3348] ext4_buffered_write_iter+0x234/0x3e0 [ 56.992031][ T3348] ext4_file_write_iter+0xd7/0x10e0 [ 56.997262][ T3348] vfs_write+0x45a/0x750 [ 57.001547][ T3348] ksys_write+0xeb/0x1a0 [ 57.005861][ T3348] __x64_sys_write+0x42/0x50 [ 57.010495][ T3348] do_syscall_64+0x41/0xc0 [ 57.014948][ T3348] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.020876][ T3348] [ 57.023210][ T3348] read to 0xffff88810a958708 of 8 bytes by task 3348 on cpu 0: [ 57.030783][ T3348] filemap_read+0x247/0x680 [ 57.035328][ T3348] generic_file_read_iter+0x76/0x320 [ 57.040675][ T3348] ext4_file_read_iter+0x1cc/0x290 [ 57.045986][ T3348] generic_file_splice_read+0xe3/0x290 [ 57.051485][ T3348] splice_direct_to_actor+0x25a/0x5f0 [ 57.056922][ T3348] do_splice_direct+0x104/0x180 [ 57.061807][ T3348] do_sendfile+0x3b8/0x950 [ 57.066249][ T3348] __x64_sys_sendfile64+0x110/0x150 [ 57.071468][ T3348] do_syscall_64+0x41/0xc0 [ 57.075922][ T3348] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.081862][ T3348] [ 57.084203][ T3348] value changed: 0x000000000033d000 -> 0x000000000033e000 [ 57.091325][ T3348] [ 57.093661][ T3348] Reported by Kernel Concurrency Sanitizer on: [ 57.099941][ T3348] CPU: 0 PID: 3348 Comm: syz-executor.5 Not tainted 6.2.0-syzkaller-13115-gee3f96b16468-dirty #0 [ 57.110564][ T3348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 57.120639][ T3348] ================================================================== 20:59:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) 20:59:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_0\x00'}) 20:59:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@can_newroute={0x154, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0xfffffffffffffff7}}, @CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ab24a8e9615acb7f"}, 0x1}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "dca0c35f5973ae0ff7d3bee58fe7e0f39bafebc3"}}]}, 0x154}}, 0x0) 20:59:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) 20:59:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) 20:59:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@can_newroute={0x154, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0xfffffffffffffff7}}, @CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ab24a8e9615acb7f"}, 0x1}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "dca0c35f5973ae0ff7d3bee58fe7e0f39bafebc3"}}]}, 0x154}}, 0x0) 20:59:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) 20:59:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) 20:59:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_0\x00'}) 20:59:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) [ 57.216725][ T3356] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:59:17 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) [ 57.316313][ T3368] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:59:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) 20:59:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:21 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) 20:59:21 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) 20:59:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) 20:59:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:21 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) 20:59:21 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) 20:59:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:21 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) 20:59:21 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) 20:59:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) 20:59:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) [ 61.044151][ T3450] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 61.066298][ T3454] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:59:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) 20:59:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) 20:59:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) [ 61.472324][ T3463] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 61.482178][ T3466] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:59:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) 20:59:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) 20:59:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'dvmrp0\x00'}]}]}]}]}, 0x44}}, 0x0) 20:59:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) 20:59:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_0\x00'}) [ 61.690522][ T3474] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 61.701990][ T3475] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 20:59:22 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) [ 61.797200][ T23] kauditd_printk_skb: 2 callbacks suppressed [ 61.797244][ T23] audit: type=1400 audit(1677704362.181:102): avc: denied { write } for pid=3480 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 20:59:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0)=0x101, 0x4) sendfile(r1, r0, 0x0, 0x15d000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 20:59:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) 20:59:22 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_0\x00'}) 20:59:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x0) 20:59:22 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_0\x00'}) 20:59:22 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:22 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) 20:59:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) 20:59:23 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:23 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) 20:59:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:23 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:23 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="a2ef2757692158880675a36c961751ca75aa9d0c7eb78ca0d396591ef765afae50eb69e579210bfcef75503ad5a8cd00c55380db62e57e375a83ad8e6665d141c8dfdb7328078d1c7110bc06d87773b47ed157585745036ac452bcb1405d822d454bd69dbe7d373e0b2d6fe2bf31969e3484794739a8d37b8f4fc0bb4b34c4b0c5611cc878d07b89ec9a5193e93fd2f718b094d5b15246834187a9a2bd9c2afd1858933a5f0d6ca63583dff8b7fe193c4747b2ea94ee", 0xb6, r0) keyctl$setperm(0x5, r1, 0x1000e00) add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5296c5edf2b528c7b278e217276d109b0d89706b5c1d733937932b8c8538a123f5b73d1e739a7491133717221d53b6caddb51f66d18e0f8cf0d3fa9bf11155f6cb4985da1c2f263e81a02745846469ede70f628119830fdff7c4301f69bd283b8e750fe5ea9007a33ac5351c187c88496864f2373eed6f2c834ef4887d", 0x7d, r0) 20:59:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) [ 62.678464][ T23] audit: type=1400 audit(1677704363.061:103): avc: denied { create } for pid=3517 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 20:59:23 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) 20:59:23 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) [ 62.758191][ T23] audit: type=1400 audit(1677704363.061:104): avc: denied { setopt } for pid=3517 comm="syz-executor.1" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 62.778880][ T23] audit: type=1400 audit(1677704363.061:105): avc: denied { bpf } for pid=3517 comm="syz-executor.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 20:59:23 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) [ 62.799851][ T23] audit: type=1400 audit(1677704363.061:106): avc: denied { read } for pid=3517 comm="syz-executor.1" name="rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 62.823148][ T23] audit: type=1400 audit(1677704363.061:107): avc: denied { open } for pid=3517 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 20:59:23 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) 20:59:23 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) [ 62.847019][ T23] audit: type=1400 audit(1677704363.061:108): avc: denied { ioctl } for pid=3517 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=219 ioctlcmd=0x7003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 20:59:23 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) 20:59:23 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) 20:59:23 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) 20:59:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:23 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) 20:59:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x3c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1) 20:59:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) 20:59:23 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x0, 0x0, @vifc_lcl_ifindex=r3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_AIE_ON(r4, 0x7004) [ 63.179966][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. 20:59:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) [ 63.220846][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 63.222710][ T23] audit: type=1400 audit(1677704363.601:109): avc: denied { create } for pid=3599 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 63.293083][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 63.308766][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 63.329355][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 63.332283][ T23] audit: type=1400 audit(1677704363.631:110): avc: denied { create } for pid=3599 comm="syz-executor.4" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 63.343325][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. 20:59:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) [ 63.360259][ T23] audit: type=1400 audit(1677704363.631:111): avc: denied { map } for pid=3599 comm="syz-executor.4" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18657 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 63.392361][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 63.408614][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 63.424297][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. 20:59:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) [ 63.444478][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 63.448468][ C1] hrtimer: interrupt took 25298 ns 20:59:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) 20:59:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:24 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x600c8044, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = dup2(r1, r0) sendto$inet6(r2, 0x0, 0x0, 0x3e4981f0f3535c4a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x600c0040, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:59:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) 20:59:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) 20:59:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:26 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1}}, 0x0) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="de", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 20:59:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={