Starting sshd: OK syzkaller syzkaller login: [ 13.502096][ T24] kauditd_printk_skb: 38 callbacks suppressed [ 13.502109][ T24] audit: type=1400 audit(1652084278.036:72): avc: denied { transition } for pid=1637 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.507091][ T24] audit: type=1400 audit(1652084278.036:73): avc: denied { write } for pid=1637 comm="sh" path="pipe:[500]" dev="pipefs" ino=500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 14.381953][ T1640] scp (1640) used greatest stack depth: 11824 bytes left [ 14.389039][ T1638] sshd (1638) used greatest stack depth: 11528 bytes left Warning: Permanently added '10.128.1.78' (ECDSA) to the list of known hosts. 2022/05/09 08:18:04 fuzzer started 2022/05/09 08:18:04 dialing manager at 10.128.0.163:34081 [ 22.617642][ T24] audit: type=1400 audit(1652084287.156:74): avc: denied { mounton } for pid=1807 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.618513][ T1807] cgroup: Unknown subsys name 'net' [ 22.640340][ T24] audit: type=1400 audit(1652084287.156:75): avc: denied { mount } for pid=1807 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.667680][ T24] audit: type=1400 audit(1652084287.176:76): avc: denied { unmount } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.778029][ T1807] cgroup: Unknown subsys name 'rlimit' [ 22.897524][ T24] audit: type=1400 audit(1652084287.436:77): avc: denied { mounton } for pid=1807 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.922774][ T24] audit: type=1400 audit(1652084287.446:78): avc: denied { mount } for pid=1807 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.946059][ T24] audit: type=1400 audit(1652084287.446:79): avc: denied { create } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.966622][ T24] audit: type=1400 audit(1652084287.446:80): avc: denied { write } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/05/09 08:18:07 syscalls: 2727 2022/05/09 08:18:07 code coverage: enabled 2022/05/09 08:18:07 comparison tracing: enabled 2022/05/09 08:18:07 extra coverage: enabled 2022/05/09 08:18:07 delay kcov mmap: enabled 2022/05/09 08:18:07 setuid sandbox: enabled 2022/05/09 08:18:07 namespace sandbox: enabled 2022/05/09 08:18:07 Android sandbox: enabled 2022/05/09 08:18:07 fault injection: enabled 2022/05/09 08:18:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/05/09 08:18:07 net packet injection: enabled 2022/05/09 08:18:07 net device setup: enabled 2022/05/09 08:18:07 concurrency sanitizer: enabled 2022/05/09 08:18:07 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/05/09 08:18:07 USB emulation: /dev/raw-gadget does not exist 2022/05/09 08:18:07 hci packet injection: /dev/vhci does not exist 2022/05/09 08:18:07 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2022/05/09 08:18:07 802.15.4 emulation: enabled [ 22.986996][ T24] audit: type=1400 audit(1652084287.446:81): avc: denied { read } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/05/09 08:18:08 suppressing KCSAN reports in functions: 'blk_mq_sched_dispatch_requests' 'do_select' '__xa_clear_mark' 'xas_clear_mark' 'ext4_fill_raw_inode' 'do_sys_poll' 'ext4_free_inodes_count' 'generic_write_end' 'exit_mm' 'jbd2_journal_dirty_metadata' 2022/05/09 08:18:08 fetching corpus: 0, signal 0/2000 (executing program) 2022/05/09 08:18:08 fetching corpus: 50, signal 19927/23462 (executing program) 2022/05/09 08:18:08 fetching corpus: 100, signal 26808/31901 (executing program) 2022/05/09 08:18:08 fetching corpus: 150, signal 32006/38589 (executing program) 2022/05/09 08:18:08 fetching corpus: 200, signal 37307/45238 (executing program) 2022/05/09 08:18:09 fetching corpus: 250, signal 41450/50608 (executing program) 2022/05/09 08:18:09 fetching corpus: 300, signal 44743/55197 (executing program) 2022/05/09 08:18:09 fetching corpus: 348, signal 46982/58731 (executing program) 2022/05/09 08:18:09 fetching corpus: 397, signal 49059/62105 (executing program) 2022/05/09 08:18:09 fetching corpus: 447, signal 51949/66112 (executing program) 2022/05/09 08:18:09 fetching corpus: 497, signal 54783/70013 (executing program) 2022/05/09 08:18:09 fetching corpus: 547, signal 56904/73197 (executing program) 2022/05/09 08:18:10 fetching corpus: 597, signal 59100/76459 (executing program) 2022/05/09 08:18:10 fetching corpus: 647, signal 60762/79173 (executing program) 2022/05/09 08:18:10 fetching corpus: 697, signal 63439/82766 (executing program) 2022/05/09 08:18:10 fetching corpus: 747, signal 65421/85689 (executing program) 2022/05/09 08:18:10 fetching corpus: 797, signal 67047/88307 (executing program) 2022/05/09 08:18:10 fetching corpus: 846, signal 68693/90874 (executing program) 2022/05/09 08:18:10 fetching corpus: 895, signal 70265/93336 (executing program) 2022/05/09 08:18:11 fetching corpus: 945, signal 74728/97997 (executing program) 2022/05/09 08:18:11 fetching corpus: 992, signal 75958/100097 (executing program) 2022/05/09 08:18:11 fetching corpus: 1042, signal 77187/102164 (executing program) 2022/05/09 08:18:11 fetching corpus: 1092, signal 78867/104539 (executing program) 2022/05/09 08:18:11 fetching corpus: 1141, signal 80084/106554 (executing program) 2022/05/09 08:18:11 fetching corpus: 1190, signal 81624/108755 (executing program) 2022/05/09 08:18:11 fetching corpus: 1236, signal 83625/111263 (executing program) 2022/05/09 08:18:11 fetching corpus: 1286, signal 84906/113195 (executing program) 2022/05/09 08:18:11 fetching corpus: 1336, signal 86670/115431 (executing program) 2022/05/09 08:18:12 fetching corpus: 1386, signal 88105/117448 (executing program) 2022/05/09 08:18:12 fetching corpus: 1435, signal 90078/119747 (executing program) 2022/05/09 08:18:12 fetching corpus: 1483, signal 91223/121472 (executing program) 2022/05/09 08:18:12 fetching corpus: 1533, signal 92799/123457 (executing program) 2022/05/09 08:18:12 fetching corpus: 1583, signal 93999/125183 (executing program) 2022/05/09 08:18:12 fetching corpus: 1632, signal 94948/126751 (executing program) 2022/05/09 08:18:12 fetching corpus: 1682, signal 95756/128149 (executing program) 2022/05/09 08:18:12 fetching corpus: 1732, signal 97363/130038 (executing program) 2022/05/09 08:18:12 fetching corpus: 1782, signal 98516/131648 (executing program) 2022/05/09 08:18:13 fetching corpus: 1832, signal 99884/133327 (executing program) 2022/05/09 08:18:13 fetching corpus: 1882, signal 100980/134773 (executing program) 2022/05/09 08:18:13 fetching corpus: 1930, signal 101763/136065 (executing program) 2022/05/09 08:18:13 fetching corpus: 1979, signal 102954/137623 (executing program) 2022/05/09 08:18:13 fetching corpus: 2028, signal 104023/139062 (executing program) 2022/05/09 08:18:13 fetching corpus: 2078, signal 105563/140690 (executing program) 2022/05/09 08:18:14 fetching corpus: 2128, signal 107408/142498 (executing program) 2022/05/09 08:18:14 fetching corpus: 2178, signal 108206/143687 (executing program) 2022/05/09 08:18:14 fetching corpus: 2227, signal 109124/144965 (executing program) 2022/05/09 08:18:14 fetching corpus: 2277, signal 110155/146249 (executing program) 2022/05/09 08:18:14 fetching corpus: 2324, signal 111381/147646 (executing program) 2022/05/09 08:18:14 fetching corpus: 2374, signal 112238/148803 (executing program) 2022/05/09 08:18:14 fetching corpus: 2424, signal 112984/149904 (executing program) 2022/05/09 08:18:14 fetching corpus: 2473, signal 113924/151030 (executing program) 2022/05/09 08:18:15 fetching corpus: 2523, signal 115152/152223 (executing program) 2022/05/09 08:18:15 fetching corpus: 2572, signal 115897/153223 (executing program) 2022/05/09 08:18:15 fetching corpus: 2622, signal 117046/154362 (executing program) 2022/05/09 08:18:15 fetching corpus: 2672, signal 117702/155328 (executing program) 2022/05/09 08:18:15 fetching corpus: 2722, signal 118403/156242 (executing program) 2022/05/09 08:18:15 fetching corpus: 2772, signal 119329/157230 (executing program) 2022/05/09 08:18:15 fetching corpus: 2821, signal 120273/158281 (executing program) 2022/05/09 08:18:15 fetching corpus: 2870, signal 120876/159179 (executing program) 2022/05/09 08:18:16 fetching corpus: 2919, signal 121709/160074 (executing program) 2022/05/09 08:18:16 fetching corpus: 2969, signal 122293/160903 (executing program) 2022/05/09 08:18:16 fetching corpus: 3019, signal 123105/161769 (executing program) 2022/05/09 08:18:16 fetching corpus: 3069, signal 124326/162717 (executing program) 2022/05/09 08:18:16 fetching corpus: 3119, signal 124969/163490 (executing program) 2022/05/09 08:18:16 fetching corpus: 3168, signal 125744/164298 (executing program) 2022/05/09 08:18:16 fetching corpus: 3218, signal 126777/165167 (executing program) 2022/05/09 08:18:16 fetching corpus: 3268, signal 128063/166056 (executing program) 2022/05/09 08:18:17 fetching corpus: 3318, signal 128792/166791 (executing program) 2022/05/09 08:18:17 fetching corpus: 3368, signal 129368/167466 (executing program) 2022/05/09 08:18:17 fetching corpus: 3418, signal 130354/168263 (executing program) 2022/05/09 08:18:17 fetching corpus: 3468, signal 130831/168896 (executing program) 2022/05/09 08:18:17 fetching corpus: 3518, signal 131511/169561 (executing program) 2022/05/09 08:18:17 fetching corpus: 3568, signal 132870/170303 (executing program) 2022/05/09 08:18:17 fetching corpus: 3617, signal 133311/170880 (executing program) 2022/05/09 08:18:18 fetching corpus: 3666, signal 134137/171498 (executing program) 2022/05/09 08:18:18 fetching corpus: 3711, signal 135230/172139 (executing program) 2022/05/09 08:18:18 fetching corpus: 3760, signal 135626/172676 (executing program) 2022/05/09 08:18:18 fetching corpus: 3809, signal 136372/173225 (executing program) 2022/05/09 08:18:18 fetching corpus: 3859, signal 137034/173749 (executing program) 2022/05/09 08:18:18 fetching corpus: 3909, signal 138763/174366 (executing program) 2022/05/09 08:18:18 fetching corpus: 3959, signal 139630/174895 (executing program) 2022/05/09 08:18:18 fetching corpus: 4007, signal 140221/175354 (executing program) 2022/05/09 08:18:19 fetching corpus: 4057, signal 141131/175852 (executing program) 2022/05/09 08:18:19 fetching corpus: 4107, signal 141591/176267 (executing program) 2022/05/09 08:18:19 fetching corpus: 4157, signal 142248/176732 (executing program) 2022/05/09 08:18:19 fetching corpus: 4207, signal 142814/177134 (executing program) 2022/05/09 08:18:19 fetching corpus: 4257, signal 143562/177589 (executing program) 2022/05/09 08:18:19 fetching corpus: 4306, signal 144091/177983 (executing program) 2022/05/09 08:18:19 fetching corpus: 4356, signal 145131/178375 (executing program) 2022/05/09 08:18:19 fetching corpus: 4406, signal 145724/178456 (executing program) 2022/05/09 08:18:20 fetching corpus: 4456, signal 146322/178477 (executing program) 2022/05/09 08:18:20 fetching corpus: 4503, signal 146832/178477 (executing program) 2022/05/09 08:18:20 fetching corpus: 4552, signal 147237/178481 (executing program) 2022/05/09 08:18:20 fetching corpus: 4602, signal 147747/178481 (executing program) 2022/05/09 08:18:20 fetching corpus: 4652, signal 148195/178481 (executing program) 2022/05/09 08:18:20 fetching corpus: 4702, signal 148893/178495 (executing program) 2022/05/09 08:18:20 fetching corpus: 4750, signal 149477/178500 (executing program) 2022/05/09 08:18:20 fetching corpus: 4800, signal 149866/178502 (executing program) 2022/05/09 08:18:21 fetching corpus: 4848, signal 150214/178522 (executing program) 2022/05/09 08:18:21 fetching corpus: 4895, signal 150724/178525 (executing program) 2022/05/09 08:18:21 fetching corpus: 4945, signal 151243/178525 (executing program) 2022/05/09 08:18:21 fetching corpus: 4995, signal 151668/178526 (executing program) 2022/05/09 08:18:21 fetching corpus: 5045, signal 152106/178551 (executing program) 2022/05/09 08:18:21 fetching corpus: 5094, signal 152417/178564 (executing program) 2022/05/09 08:18:21 fetching corpus: 5144, signal 153026/178564 (executing program) 2022/05/09 08:18:21 fetching corpus: 5194, signal 153551/178564 (executing program) 2022/05/09 08:18:22 fetching corpus: 5244, signal 154276/178578 (executing program) 2022/05/09 08:18:22 fetching corpus: 5294, signal 154717/178578 (executing program) 2022/05/09 08:18:22 fetching corpus: 5344, signal 155079/178578 (executing program) 2022/05/09 08:18:22 fetching corpus: 5394, signal 155565/178580 (executing program) 2022/05/09 08:18:22 fetching corpus: 5443, signal 156183/178592 (executing program) 2022/05/09 08:18:22 fetching corpus: 5492, signal 156627/178610 (executing program) 2022/05/09 08:18:22 fetching corpus: 5542, signal 157067/178610 (executing program) 2022/05/09 08:18:22 fetching corpus: 5590, signal 157331/178613 (executing program) 2022/05/09 08:18:23 fetching corpus: 5640, signal 158071/178622 (executing program) 2022/05/09 08:18:23 fetching corpus: 5690, signal 158369/178649 (executing program) 2022/05/09 08:18:23 fetching corpus: 5740, signal 158863/178649 (executing program) 2022/05/09 08:18:23 fetching corpus: 5790, signal 159262/178649 (executing program) 2022/05/09 08:18:23 fetching corpus: 5840, signal 159875/178649 (executing program) 2022/05/09 08:18:23 fetching corpus: 5890, signal 160408/178649 (executing program) 2022/05/09 08:18:23 fetching corpus: 5938, signal 161011/178663 (executing program) 2022/05/09 08:18:23 fetching corpus: 5988, signal 161402/178663 (executing program) 2022/05/09 08:18:23 fetching corpus: 6038, signal 161903/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6088, signal 162312/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6138, signal 162787/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6188, signal 163276/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6238, signal 163571/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6287, signal 163889/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6337, signal 164295/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6387, signal 164818/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6437, signal 165246/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6487, signal 165721/178663 (executing program) 2022/05/09 08:18:24 fetching corpus: 6537, signal 166176/178663 (executing program) 2022/05/09 08:18:25 fetching corpus: 6587, signal 167283/178663 (executing program) 2022/05/09 08:18:25 fetching corpus: 6637, signal 167555/178663 (executing program) 2022/05/09 08:18:25 fetching corpus: 6687, signal 168144/178663 (executing program) 2022/05/09 08:18:25 fetching corpus: 6737, signal 168679/178679 (executing program) 2022/05/09 08:18:25 fetching corpus: 6787, signal 169084/178679 (executing program) 2022/05/09 08:18:25 fetching corpus: 6837, signal 169700/178679 (executing program) 2022/05/09 08:18:25 fetching corpus: 6887, signal 170169/178679 (executing program) 2022/05/09 08:18:25 fetching corpus: 6937, signal 170572/178683 (executing program) 2022/05/09 08:18:25 fetching corpus: 6987, signal 171025/178683 (executing program) 2022/05/09 08:18:26 fetching corpus: 7037, signal 171477/178683 (executing program) 2022/05/09 08:18:26 fetching corpus: 7086, signal 171811/178756 (executing program) 2022/05/09 08:18:26 fetching corpus: 7136, signal 172208/178756 (executing program) 2022/05/09 08:18:26 fetching corpus: 7186, signal 172492/178766 (executing program) 2022/05/09 08:18:26 fetching corpus: 7236, signal 172837/178766 (executing program) 2022/05/09 08:18:26 fetching corpus: 7285, signal 173144/178793 (executing program) 2022/05/09 08:18:26 fetching corpus: 7334, signal 173431/178811 (executing program) 2022/05/09 08:18:26 fetching corpus: 7384, signal 173816/178811 (executing program) 2022/05/09 08:18:26 fetching corpus: 7434, signal 174564/178816 (executing program) 2022/05/09 08:18:26 fetching corpus: 7484, signal 174856/178819 (executing program) 2022/05/09 08:18:27 fetching corpus: 7534, signal 175242/178819 (executing program) 2022/05/09 08:18:27 fetching corpus: 7584, signal 175657/178819 (executing program) 2022/05/09 08:18:27 fetching corpus: 7589, signal 175670/178825 (executing program) 2022/05/09 08:18:27 fetching corpus: 7589, signal 175670/178825 (executing program) 2022/05/09 08:18:28 starting 6 fuzzer processes 08:18:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x18, 0x52, 0xb21, 0x0, 0x0, {0xa}, [@nested={0x4}]}, 0x18}}, 0x0) 08:18:28 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x1c) 08:18:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 08:18:28 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@flushpolicy={0x38, 0x12, 0x4e326d0846e0c13d, 0x0, 0x0, "", [@address_filter={0x28, 0x1a, {@in6=@loopback, @in=@empty}}]}, 0x38}, 0x8}, 0x0) 08:18:28 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 08:18:28 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@private2, @local, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) [ 44.412017][ T24] audit: type=1400 audit(1652084308.946:82): avc: denied { execmem } for pid=1815 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 44.459203][ T24] audit: type=1400 audit(1652084308.996:83): avc: denied { read } for pid=1821 comm="syz-executor.2" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 44.480761][ T24] audit: type=1400 audit(1652084308.996:84): avc: denied { open } for pid=1821 comm="syz-executor.2" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 44.504541][ T24] audit: type=1400 audit(1652084308.996:85): avc: denied { mounton } for pid=1821 comm="syz-executor.2" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 44.526107][ T24] audit: type=1400 audit(1652084308.996:86): avc: denied { module_request } for pid=1821 comm="syz-executor.2" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 44.651867][ T24] audit: type=1400 audit(1652084309.016:87): avc: denied { sys_module } for pid=1823 comm="syz-executor.1" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 44.770396][ T1823] chnl_net:caif_netlink_parms(): no params data found [ 44.787573][ T1824] chnl_net:caif_netlink_parms(): no params data found [ 44.882665][ T1824] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.889851][ T1824] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.897451][ T1824] device bridge_slave_0 entered promiscuous mode [ 44.909411][ T1821] chnl_net:caif_netlink_parms(): no params data found [ 44.927619][ T1824] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.934883][ T1824] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.942454][ T1824] device bridge_slave_1 entered promiscuous mode [ 44.966923][ T1823] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.974122][ T1823] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.981975][ T1823] device bridge_slave_0 entered promiscuous mode [ 44.997772][ T1824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.011893][ T1823] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.020395][ T1823] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.027808][ T1823] device bridge_slave_1 entered promiscuous mode [ 45.049483][ T1824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.079816][ T1849] chnl_net:caif_netlink_parms(): no params data found [ 45.099863][ T1824] team0: Port device team_slave_0 added [ 45.106630][ T1823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.119196][ T1823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.147550][ T1824] team0: Port device team_slave_1 added [ 45.176117][ T1821] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.183207][ T1821] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.190833][ T1821] device bridge_slave_0 entered promiscuous mode [ 45.203500][ T1835] chnl_net:caif_netlink_parms(): no params data found [ 45.212504][ T1823] team0: Port device team_slave_0 added [ 45.220213][ T1821] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.227358][ T1821] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.234792][ T1821] device bridge_slave_1 entered promiscuous mode [ 45.251521][ T1824] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.258587][ T1824] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.284725][ T1824] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.298578][ T1823] team0: Port device team_slave_1 added [ 45.305503][ T1837] chnl_net:caif_netlink_parms(): no params data found [ 45.320676][ T1824] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.327663][ T1824] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.353705][ T1824] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.380384][ T1821] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.392175][ T1821] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.409438][ T1823] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.416484][ T1823] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.442568][ T1823] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.476860][ T1823] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.484019][ T1823] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.509923][ T1823] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.520922][ T1849] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.527969][ T1849] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.535375][ T1849] device bridge_slave_0 entered promiscuous mode [ 45.549684][ T1821] team0: Port device team_slave_0 added [ 45.557136][ T1824] device hsr_slave_0 entered promiscuous mode [ 45.563760][ T1824] device hsr_slave_1 entered promiscuous mode [ 45.572704][ T1849] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.579804][ T1849] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.587486][ T1849] device bridge_slave_1 entered promiscuous mode [ 45.596177][ T1821] team0: Port device team_slave_1 added [ 45.644404][ T1835] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.651611][ T1835] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.659299][ T1835] device bridge_slave_0 entered promiscuous mode [ 45.679898][ T1823] device hsr_slave_0 entered promiscuous mode [ 45.686329][ T1823] device hsr_slave_1 entered promiscuous mode [ 45.693590][ T1823] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.701226][ T1823] Cannot create hsr debugfs directory [ 45.708220][ T1849] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.718422][ T1849] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.727947][ T1835] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.734958][ T1835] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.742708][ T1835] device bridge_slave_1 entered promiscuous mode [ 45.749444][ T1821] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.756460][ T1821] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.782335][ T1821] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.795127][ T1837] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.802403][ T1837] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.809863][ T1837] device bridge_slave_0 entered promiscuous mode [ 45.816898][ T1837] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.823967][ T1837] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.831460][ T1837] device bridge_slave_1 entered promiscuous mode [ 45.853514][ T1821] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.860492][ T1821] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.886628][ T1821] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.910260][ T1849] team0: Port device team_slave_0 added [ 45.920683][ T1835] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.939392][ T1835] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.953808][ T1837] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.963654][ T1849] team0: Port device team_slave_1 added [ 45.980348][ T1837] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 46.003667][ T1821] device hsr_slave_0 entered promiscuous mode [ 46.010367][ T1821] device hsr_slave_1 entered promiscuous mode [ 46.017389][ T1821] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.024922][ T1821] Cannot create hsr debugfs directory [ 46.031000][ T1835] team0: Port device team_slave_0 added [ 46.049420][ T1835] team0: Port device team_slave_1 added [ 46.059158][ T1849] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.066107][ T1849] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.092183][ T1849] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 46.104240][ T1849] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 46.111411][ T1849] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.137438][ T1849] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.156934][ T1837] team0: Port device team_slave_0 added [ 46.181030][ T1837] team0: Port device team_slave_1 added [ 46.194506][ T1849] device hsr_slave_0 entered promiscuous mode [ 46.201018][ T1849] device hsr_slave_1 entered promiscuous mode [ 46.207571][ T1849] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.215282][ T1849] Cannot create hsr debugfs directory [ 46.221126][ T1835] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.228086][ T1835] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.253956][ T1835] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 46.278346][ T1835] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 46.285284][ T1835] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.311280][ T1835] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.329904][ T1837] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.336879][ T1837] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.363239][ T1837] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 46.386560][ T1837] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 46.393521][ T1837] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.419388][ T1837] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.434261][ T1824] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 46.449101][ T1835] device hsr_slave_0 entered promiscuous mode [ 46.455582][ T1835] device hsr_slave_1 entered promiscuous mode [ 46.462109][ T1835] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.469748][ T1835] Cannot create hsr debugfs directory [ 46.491647][ T1824] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 46.500759][ T1824] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 46.510069][ T1824] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 46.518916][ T1823] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 46.548629][ T1823] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 46.558195][ T1823] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 46.578675][ T1821] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 46.589377][ T1823] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 46.599990][ T1837] device hsr_slave_0 entered promiscuous mode [ 46.606422][ T1837] device hsr_slave_1 entered promiscuous mode [ 46.612930][ T1837] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.620531][ T1837] Cannot create hsr debugfs directory [ 46.632866][ T1821] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 46.641524][ T1821] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 46.650369][ T1821] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 46.719103][ T1824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.751081][ T1824] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.758730][ T1849] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 46.769769][ T1849] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 46.781990][ T1823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.797125][ T24] audit: type=1400 audit(1652084311.336:88): avc: denied { remove_name } for pid=1421 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 46.819645][ T24] audit: type=1400 audit(1652084311.336:89): avc: denied { rename } for pid=1421 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 46.843861][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.851527][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.862692][ T1849] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 46.871499][ T1849] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 46.896926][ T1823] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.904315][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.913369][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.921862][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.928975][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.936579][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.945253][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.953714][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.960749][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.968706][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.977436][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.985022][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.992775][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 47.002122][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.019495][ T1835] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 47.030357][ T1835] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 47.043620][ T1821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.053444][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.062105][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.070414][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.077502][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.085294][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.093849][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.102237][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.110680][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.119308][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.127749][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.136044][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.143078][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.151032][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.158944][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.178336][ T1835] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 47.187079][ T1835] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 47.199258][ T1821] 8021q: adding VLAN 0 to HW filter on device team0 [ 47.213706][ T1823] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 47.224129][ T1823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 47.245043][ T1824] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 47.255556][ T1824] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 47.268153][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.275913][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.283816][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 47.292751][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 47.301820][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.310339][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.319068][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.327795][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.336240][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.344724][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.353359][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.361655][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.369914][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.378041][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.386223][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.394422][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.402690][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.410224][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 47.418706][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.426813][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.434317][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.441937][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.450385][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.458741][ T1915] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.465761][ T1915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.475477][ T1823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.483724][ T1915] ================================================================== [ 47.488236][ T1837] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 47.491800][ T1915] BUG: KCSAN: data-race in prandom_seed / prandom_u32 [ 47.505176][ T1915] [ 47.507478][ T1915] read to 0xffff888237d28860 of 8 bytes by task 1835 on cpu 0: [ 47.514993][ T1915] prandom_seed+0x103/0x270 [ 47.519480][ T1915] __inet_insert_ifa+0x3a6/0x600 [ 47.524396][ T1915] inetdev_event+0x8c0/0xa80 [ 47.528963][ T1915] raw_notifier_call_chain+0x53/0xb0 [ 47.534231][ T1915] __dev_notify_flags+0x1d6/0x3a0 [ 47.539244][ T1915] dev_change_flags+0xa2/0xc0 [ 47.544075][ T1915] do_setlink+0x7f9/0x2120 [ 47.548475][ T1915] rtnl_newlink+0x1116/0x1580 [ 47.553129][ T1915] rtnetlink_rcv_msg+0x74f/0x7e0 [ 47.558049][ T1915] netlink_rcv_skb+0x13e/0x240 [ 47.562885][ T1915] rtnetlink_rcv+0x18/0x20 [ 47.567462][ T1915] netlink_unicast+0x58a/0x660 [ 47.572209][ T1915] netlink_sendmsg+0x661/0x750 [ 47.576952][ T1915] __sys_sendto+0x21e/0x2c0 [ 47.581429][ T1915] __x64_sys_sendto+0x74/0x90 [ 47.586085][ T1915] do_syscall_64+0x2b/0x70 [ 47.590482][ T1915] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 47.596360][ T1915] [ 47.598663][ T1915] write to 0xffff888237d28860 of 8 bytes by task 1915 on cpu 1: [ 47.606353][ T1915] prandom_u32+0x13e/0x190 [ 47.610834][ T1915] mld_ifc_work+0x6dd/0x800 [ 47.615313][ T1915] process_one_work+0x3d3/0x720 [ 47.620229][ T1915] worker_thread+0x618/0xa70 [ 47.625357][ T1915] kthread+0x1a9/0x1e0 [ 47.629410][ T1915] ret_from_fork+0x1f/0x30 [ 47.633895][ T1915] [ 47.636211][ T1915] value changed: 0xc288de719088f4a2 -> 0xae728647759de83b [ 47.643549][ T1915] [ 47.645856][ T1915] Reported by Kernel Concurrency Sanitizer on: [ 47.651984][ T1915] CPU: 1 PID: 1915 Comm: kworker/1:3 Not tainted 5.18.0-rc6-syzkaller #0 [ 47.660555][ T1915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.670683][ T1915] Workqueue: mld mld_ifc_work [ 47.675343][ T1915] ================================================================== [ 47.686852][ T1837] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 47.695184][ T1837] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 47.708413][ T1849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.720526][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.734730][ T1824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.743191][ T1837] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 47.759711][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.771521][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 47.779233][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.787948][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.796207][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.803268][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.814698][ T1849] 8021q: adding VLAN 0 to HW filter on device team0 [ 47.834123][ T1821] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 47.844686][ T1821] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 47.856578][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 47.865379][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.873104][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.880690][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 47.889498][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.897823][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.906352][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.914889][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.923531][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.931937][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.940244][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.948657][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.957052][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.964720][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.006761][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.015469][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.024161][ T1921] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.031234][ T1921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.039253][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.047805][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.055914][ T1921] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.062964][ T1921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.070502][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.079358][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.088004][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 48.096198][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 48.104676][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 48.113048][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.121721][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 48.130187][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.138647][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 48.146119][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 48.158653][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 48.166450][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.174374][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.182585][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.190757][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.198987][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.212513][ T1837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.223389][ T1821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.234656][ T1835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.245340][ T1849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.262201][ T1835] 8021q: adding VLAN 0 to HW filter on device team0 [ 48.272948][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.281178][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.289120][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.296791][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.306335][ T1837] 8021q: adding VLAN 0 to HW filter on device team0 [ 48.327329][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.335887][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.344593][ T1880] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.351801][ T1880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.359792][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.368373][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.376811][ T1880] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.383974][ T1880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.391825][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 48.399894][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.412508][ T1849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.427018][ T1823] device veth0_vlan entered promiscuous mode [ 48.436068][ T1823] device veth1_vlan entered promiscuous mode [ 48.455452][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 48.463440][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.472414][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.480266][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 48.488331][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 48.495673][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 48.503300][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.511948][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.520411][ T1921] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.527440][ T1921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.535224][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.543856][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.552124][ T1921] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.559242][ T1921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.567153][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.575894][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.584574][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 48.592952][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 48.601508][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 48.609970][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.618510][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.627326][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.636012][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 48.644355][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 48.652913][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 48.661288][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.673605][ T1835] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 48.684004][ T1835] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.701877][ T1837] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 48.712274][ T1837] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.727080][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 48.735139][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 48.751346][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.759536][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.767487][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 48.775933][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.784540][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.792758][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.801223][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.809462][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.817554][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.825798][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.834236][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.842481][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.858588][ T1835] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.868260][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.875889][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.883546][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 48.891035][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 48.898683][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 48.907323][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.924554][ T1824] device veth0_vlan entered promiscuous mode [ 48.944571][ T1823] device veth0_macvtap entered promiscuous mode [ 48.955174][ T1837] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.964043][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 48.972234][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 48.980962][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.989596][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 48.997849][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.006088][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 49.013474][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 49.023705][ T1824] device veth1_vlan entered promiscuous mode [ 49.037969][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.045878][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.062651][ T1823] device veth1_macvtap entered promiscuous mode [ 49.082800][ T1824] device veth0_macvtap entered promiscuous mode [ 49.102361][ T1821] device veth0_vlan entered promiscuous mode [ 49.111597][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 49.127301][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.135669][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.144469][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.153124][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 49.161350][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.172098][ T1824] device veth1_macvtap entered promiscuous mode [ 49.183735][ T1821] device veth1_vlan entered promiscuous mode [ 49.194303][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 49.207349][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 49.215357][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.223562][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.231517][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 49.239629][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.248110][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.261020][ T1824] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.268517][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.277194][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.288802][ T1823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.299275][ T1823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.310718][ T1823] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.326501][ T1821] device veth0_macvtap entered promiscuous mode [ 49.334883][ T1824] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.343208][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 49.352545][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.361178][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.369880][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 49.378582][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.387005][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.395666][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.411421][ T1821] device veth1_macvtap entered promiscuous mode [ 49.419835][ T1824] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.428620][ T1824] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.437321][ T1824] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.446887][ T1824] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.457181][ T1823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.467773][ T1823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.478782][ T1823] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.486113][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 49.494906][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 49.502919][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.512470][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.523036][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.531797][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.549735][ T1823] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.558862][ T1823] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.567714][ T1823] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.576414][ T1823] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.592747][ T1821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.603352][ T1821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.613195][ T1821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.623677][ T1821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.635283][ T1821] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.645019][ T1835] device veth0_vlan entered promiscuous mode [ 49.658618][ T1849] device veth0_vlan entered promiscuous mode [ 49.668606][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.669226][ T24] audit: type=1400 audit(1652084314.206:90): avc: denied { mounton } for pid=1824 comm="syz-executor.4" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 49.677397][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.708775][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 49.718534][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.727158][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 49.735455][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.745410][ T1821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.756026][ T1821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.765823][ T1821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.776387][ T1821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.788020][ T1821] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.797863][ T1835] device veth1_vlan entered promiscuous mode [ 49.808972][ T1849] device veth1_vlan entered promiscuous mode [ 49.818835][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.822012][ T24] audit: type=1400 audit(1652084314.356:91): avc: denied { read write } for pid=1824 comm="syz-executor.4" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 08:18:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@var={0x2, 0x0, 0x0, 0xe, 0x2}, @union]}, {0x0, [0x0, 0x61, 0x2e, 0x30]}}, &(0x7f00000002c0)=""/210, 0x3a, 0xd2, 0x1}, 0x20) [ 49.831240][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.850690][ T24] audit: type=1400 audit(1652084314.356:92): avc: denied { open } for pid=1824 comm="syz-executor.4" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 49.864889][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 49.881975][ T24] audit: type=1400 audit(1652084314.356:93): avc: denied { ioctl } for pid=1824 comm="syz-executor.4" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 49.897329][ T24] audit: type=1400 audit(1652084314.426:94): avc: denied { bpf } for pid=2010 comm="syz-executor.4" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 49.922819][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 08:18:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@var={0x2, 0x0, 0x0, 0xe, 0x2}, @union]}, {0x0, [0x0, 0x61, 0x2e, 0x30]}}, &(0x7f00000002c0)=""/210, 0x3a, 0xd2, 0x1}, 0x20) 08:18:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@var={0x2, 0x0, 0x0, 0xe, 0x2}, @union]}, {0x0, [0x0, 0x61, 0x2e, 0x30]}}, &(0x7f00000002c0)=""/210, 0x3a, 0xd2, 0x1}, 0x20) 08:18:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@var={0x2, 0x0, 0x0, 0xe, 0x2}, @union]}, {0x0, [0x0, 0x61, 0x2e, 0x30]}}, &(0x7f00000002c0)=""/210, 0x3a, 0xd2, 0x1}, 0x20) 08:18:34 executing program 4: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r1, 0x5, 0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x0, 0x0) io_setup(0x1, &(0x7f0000000180)) [ 49.948904][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.961257][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 49.974333][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 49.982938][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.991942][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.005056][ T1821] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.013787][ T1821] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.022501][ T1821] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.031260][ T1821] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.055310][ T1849] device veth0_macvtap entered promiscuous mode [ 50.070975][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 50.079775][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.094094][ T1835] device veth0_macvtap entered promiscuous mode [ 50.105086][ T24] audit: type=1400 audit(1652084314.636:95): avc: denied { create } for pid=2021 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 50.117689][ T1849] device veth1_macvtap entered promiscuous mode [ 50.137019][ T1837] device veth0_vlan entered promiscuous mode [ 50.144456][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 08:18:34 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@flushpolicy={0x38, 0x12, 0x4e326d0846e0c13d, 0x0, 0x0, "", [@address_filter={0x28, 0x1a, {@in6=@loopback, @in=@empty}}]}, 0x38}, 0x8}, 0x0) [ 50.145258][ T24] audit: type=1400 audit(1652084314.656:96): avc: denied { write } for pid=2021 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 50.158604][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 50.172334][ T24] audit: type=1400 audit(1652084314.656:97): avc: denied { nlmsg_read } for pid=2021 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 50.201597][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 50.210151][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.218930][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 50.227544][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.237297][ T1835] device veth1_macvtap entered promiscuous mode [ 50.256062][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.266563][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.276440][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.286887][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.296860][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.307291][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.319530][ T1835] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 50.330063][ T1837] device veth1_vlan entered promiscuous mode [ 50.336990][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 50.342526][ T24] audit: type=1400 audit(1652084314.876:98): avc: denied { create } for pid=2027 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 50.345160][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 50.372952][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.380806][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.382546][ T24] audit: type=1400 audit(1652084314.896:99): avc: denied { shutdown } for pid=2027 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 50.388635][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 50.415887][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 50.424402][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.437619][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 50.448098][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.457905][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 50.468445][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.478362][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 50.488794][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.499799][ T1835] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 50.513808][ T1837] device veth0_macvtap entered promiscuous mode [ 50.524633][ T1849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.536381][ T1849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.546251][ T1849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.556678][ T1849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.566612][ T1849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.577040][ T1849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.587042][ T1849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.597477][ T1849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.608776][ T1849] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 50.616112][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 50.624403][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 50.633081][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.641740][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 50.650196][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.658460][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 50.667326][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.676636][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 50.686391][ T1835] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.695340][ T1835] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.704120][ T1835] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.712824][ T1835] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.724606][ T1837] device veth1_macvtap entered promiscuous mode [ 50.737645][ T1849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 50.748200][ T1849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.758149][ T1849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 50.768593][ T1849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.778595][ T1849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 50.789102][ T1849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.798905][ T1849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 50.809389][ T1849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.820523][ T1849] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 50.836037][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 50.844054][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 50.852598][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.870848][ T1849] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.879826][ T1849] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.888630][ T1849] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.897330][ T1849] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.912150][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.922693][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.932483][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.942952][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.952843][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.963262][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.973221][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 50.983883][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.993752][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 51.004290][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.015824][ T1837] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 51.045652][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 51.054346][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.065227][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 51.075969][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.085810][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 51.096219][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.106024][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 51.116444][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.126255][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 08:18:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x18, 0x52, 0xb21, 0x0, 0x0, {0xa}, [@nested={0x4}]}, 0x18}}, 0x0) 08:18:35 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@flushpolicy={0x38, 0x12, 0x4e326d0846e0c13d, 0x0, 0x0, "", [@address_filter={0x28, 0x1a, {@in6=@loopback, @in=@empty}}]}, 0x38}, 0x8}, 0x0) [ 51.136888][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.146704][ T1837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 51.157426][ T1837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.168433][ T1837] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 51.178056][ T1837] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.186792][ T1837] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.195550][ T1837] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.204312][ T1837] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.214532][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 51.223418][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 08:18:35 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x1c) 08:18:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 08:18:35 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@flushpolicy={0x38, 0x12, 0x4e326d0846e0c13d, 0x0, 0x0, "", [@address_filter={0x28, 0x1a, {@in6=@loopback, @in=@empty}}]}, 0x38}, 0x8}, 0x0) 08:18:35 executing program 4: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r1, 0x5, 0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x0, 0x0) io_setup(0x1, &(0x7f0000000180)) 08:18:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x18, 0x52, 0xb21, 0x0, 0x0, {0xa}, [@nested={0x4}]}, 0x18}}, 0x0) 08:18:35 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x1c) 08:18:35 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 08:18:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 08:18:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x18, 0x52, 0xb21, 0x0, 0x0, {0xa}, [@nested={0x4}]}, 0x18}}, 0x0) 08:18:35 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 08:18:35 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x1c) 08:18:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 08:18:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 08:18:35 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x24, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, "00006371ae9b1c01"}}}}}, 0x0) 08:18:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 08:18:36 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x24, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, "00006371ae9b1c01"}}}}}, 0x0) 08:18:36 executing program 4: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r1, 0x5, 0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x0, 0x0) io_setup(0x1, &(0x7f0000000180)) 08:18:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 08:18:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b709000001000000950000000000000075cdc4b5fb0c65752a3ad5000000000000000063910000000000000000000000001573342f17cee1e060307f7ebd3093cbe196db769d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) 08:18:36 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 08:18:36 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 08:18:36 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x24, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, "00006371ae9b1c01"}}}}}, 0x0) 08:18:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b709000001000000950000000000000075cdc4b5fb0c65752a3ad5000000000000000063910000000000000000000000001573342f17cee1e060307f7ebd3093cbe196db769d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) 08:18:36 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x24, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, "00006371ae9b1c01"}}}}}, 0x0) 08:18:36 executing program 5: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000300), 0x0, 0x802) 08:18:36 executing program 0: io_setup(0x0, 0xfffffffffffffffc) 08:18:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b709000001000000950000000000000075cdc4b5fb0c65752a3ad5000000000000000063910000000000000000000000001573342f17cee1e060307f7ebd3093cbe196db769d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) 08:18:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) [ 52.399800][ T2078] syz-executor.1 (2078) used greatest stack depth: 11520 bytes left [ 52.440791][ T2103] loop5: detected capacity change from 0 to 262160 08:18:38 executing program 4: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r1, 0x5, 0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x0, 0x0) io_setup(0x1, &(0x7f0000000180)) 08:18:38 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 08:18:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b709000001000000950000000000000075cdc4b5fb0c65752a3ad5000000000000000063910000000000000000000000001573342f17cee1e060307f7ebd3093cbe196db769d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) 08:18:38 executing program 0: io_setup(0x0, 0xfffffffffffffffc) 08:18:38 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 08:18:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 08:18:38 executing program 0: io_setup(0x0, 0xfffffffffffffffc) 08:18:38 executing program 0: io_setup(0x0, 0xfffffffffffffffc) 08:18:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 08:18:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) [ 53.497410][ T2114] loop5: detected capacity change from 0 to 262160 [ 53.533890][ T2121] loop2: detected capacity change from 0 to 262160 08:18:38 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x4c, 0x14, 0x601, 0x0, 0x0, {0x2c}}, 0x4c}}, 0x0) 08:18:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) [ 53.561724][ T2126] loop3: detected capacity change from 0 to 262160 08:18:39 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x4c, 0x14, 0x601, 0x0, 0x0, {0x2c}}, 0x4c}}, 0x0) 08:18:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 08:18:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 08:18:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) 08:18:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 08:18:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) 08:18:39 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x4c, 0x14, 0x601, 0x0, 0x0, {0x2c}}, 0x4c}}, 0x0) [ 54.521828][ T2141] loop5: detected capacity change from 0 to 262160 [ 54.522593][ T2140] loop3: detected capacity change from 0 to 262160 [ 54.537102][ T2142] loop2: detected capacity change from 0 to 262160 08:18:39 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x4c, 0x14, 0x601, 0x0, 0x0, {0x2c}}, 0x4c}}, 0x0) 08:18:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) 08:18:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) 08:18:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 08:18:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) 08:18:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 08:18:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) 08:18:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) 08:18:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) [ 54.693916][ T2162] loop5: detected capacity change from 0 to 262160 [ 54.707906][ T2164] loop2: detected capacity change from 0 to 262160 08:18:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYBLOB="9107f7b5772bc66d49b87c8509004a242a11ff1d7656295add287dfc7468ff73cb2e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x141042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 08:18:39 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x5, 0x0, 0x0, {0x77359400}, {0x0, 0xea60}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "56e8fee21dea01c2"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x5, 0x514, 0x0, {0x77359400}, {}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "56e8fee21dea01c2"}}, 0x48}}, 0x0) 08:18:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 08:18:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x5, 0xa9fc, 0x8, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240), 0xb, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/114, &(0x7f0000000cc0), &(0x7f0000001cc0), 0x1, r0}, 0x38) 08:18:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$inet_tcp(0x2, 0x1, 0x0) 08:18:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x92}, [@ldst={0x2, 0x0, 0x3}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x21) [ 54.814154][ T24] kauditd_printk_skb: 24 callbacks suppressed [ 54.814168][ T24] audit: type=1400 audit(1652084319.346:124): avc: denied { create } for pid=2170 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 08:18:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 08:18:39 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x5, 0x0, 0x0, {0x77359400}, {0x0, 0xea60}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "56e8fee21dea01c2"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x5, 0x514, 0x0, {0x77359400}, {}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "56e8fee21dea01c2"}}, 0x48}}, 0x0) [ 54.853618][ T24] audit: type=1400 audit(1652084319.386:125): avc: denied { connect } for pid=2170 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 54.877361][ T24] audit: type=1400 audit(1652084319.396:126): avc: denied { create } for pid=2173 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 08:18:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 08:18:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x68, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x4c, 0x14, {0x9effffff, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 08:18:39 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x5, 0x0, 0x0, {0x77359400}, {0x0, 0xea60}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "56e8fee21dea01c2"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x5, 0x514, 0x0, {0x77359400}, {}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "56e8fee21dea01c2"}}, 0x48}}, 0x0) 08:18:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) [ 54.898289][ T24] audit: type=1400 audit(1652084319.396:127): avc: denied { write } for pid=2173 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 54.919114][ T24] audit: type=1400 audit(1652084319.396:128): avc: denied { write } for pid=2170 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 54.939992][ T2180] loop3: detected capacity change from 0 to 262160 08:18:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x68, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x4c, 0x14, {0x9effffff, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 08:18:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x92}, [@ldst={0x2, 0x0, 0x3}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x21) 08:18:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$inet_tcp(0x2, 0x1, 0x0) 08:18:39 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x5, 0x0, 0x0, {0x77359400}, {0x0, 0xea60}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "56e8fee21dea01c2"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x5, 0x514, 0x0, {0x77359400}, {}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "56e8fee21dea01c2"}}, 0x48}}, 0x0) 08:18:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1e, 0x0, 0x1054, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000001340)}, 0x20) 08:18:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x92}, [@ldst={0x2, 0x0, 0x3}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x21) 08:18:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005070200"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xd1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f000000b880)=@delchain={0x24, 0x66, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x2, 0xffff}}}, 0x24}}, 0x0) 08:18:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x68, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x4c, 0x14, {0x9effffff, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 08:18:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$inet_tcp(0x2, 0x1, 0x0) 08:18:39 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001440)={0x6, 0x4, &(0x7f0000001200)=@framed={{}, [@jmp]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:18:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1e, 0x0, 0x1054, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000001340)}, 0x20) 08:18:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x92}, [@ldst={0x2, 0x0, 0x3}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x21) 08:18:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x68, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x4c, 0x14, {0x9effffff, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 08:18:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1e, 0x0, 0x1054, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000001340)}, 0x20) 08:18:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$inet_tcp(0x2, 0x1, 0x0) 08:18:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0xbf22}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) 08:18:39 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a080200000100000101", 0x21, 0xe000}], 0x0, &(0x7f0000000280)=ANY=[]) getdents(r0, 0x0, 0x0) 08:18:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005070200"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xd1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f000000b880)=@delchain={0x24, 0x66, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x2, 0xffff}}}, 0x24}}, 0x0) [ 55.078053][ T2206] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 55.102321][ T24] audit: type=1400 audit(1652084319.636:129): avc: denied { prog_run } for pid=2208 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 08:18:39 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x7db4a73d, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={0x0, &(0x7f0000001980)=""/96, 0x0, 0x60}, 0x20) 08:18:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1e, 0x0, 0x1054, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000001340)}, 0x20) 08:18:39 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000080)={0x0, &(0x7f0000000100)=""/139, 0x0, 0x8b}, 0x20) 08:18:39 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x7db4a73d, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={0x0, &(0x7f0000001980)=""/96, 0x0, 0x60}, 0x20) 08:18:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0xbf22}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) [ 55.172926][ T2227] loop1: detected capacity change from 0 to 224 [ 55.181346][ T2228] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:18:39 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000080)={0x0, &(0x7f0000000100)=""/139, 0x0, 0x8b}, 0x20) 08:18:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) 08:18:39 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a080200000100000101", 0x21, 0xe000}], 0x0, &(0x7f0000000280)=ANY=[]) getdents(r0, 0x0, 0x0) 08:18:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0xbf22}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) [ 55.213648][ T24] audit: type=1400 audit(1652084319.746:130): avc: denied { mount } for pid=2225 comm="syz-executor.1" name="/" dev="loop1" ino=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 55.252546][ T2242] MPTCP: kernel_bind error, err=-99 08:18:39 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000080)={0x0, &(0x7f0000000100)=""/139, 0x0, 0x8b}, 0x20) 08:18:39 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x7db4a73d, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={0x0, &(0x7f0000001980)=""/96, 0x0, 0x60}, 0x20) 08:18:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005070200"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xd1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f000000b880)=@delchain={0x24, 0x66, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x2, 0xffff}}}, 0x24}}, 0x0) 08:18:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0xbf22}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) [ 55.252859][ T2242] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2242 comm=syz-executor.4 [ 55.276289][ T24] audit: type=1400 audit(1652084319.746:131): avc: denied { unmount } for pid=1823 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 55.297031][ T2247] loop1: detected capacity change from 0 to 224 08:18:39 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000080)={0x0, &(0x7f0000000100)=""/139, 0x0, 0x8b}, 0x20) 08:18:39 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x7db4a73d, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={0x0, &(0x7f0000001980)=""/96, 0x0, 0x60}, 0x20) 08:18:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) 08:18:39 executing program 2: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) [ 55.322192][ T24] audit: type=1400 audit(1652084319.846:132): avc: denied { open } for pid=2241 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 55.341787][ T24] audit: type=1400 audit(1652084319.846:133): avc: denied { kernel } for pid=2241 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 08:18:39 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a080200000100000101", 0x21, 0xe000}], 0x0, &(0x7f0000000280)=ANY=[]) getdents(r0, 0x0, 0x0) 08:18:39 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) 08:18:39 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) [ 55.376254][ T2255] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 55.382931][ T2261] MPTCP: kernel_bind error, err=-99 [ 55.386169][ T2259] MPTCP: kernel_bind error, err=-99 [ 55.396553][ T2261] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2261 comm=syz-executor.2 08:18:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005070200"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xd1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f000000b880)=@delchain={0x24, 0x66, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x2, 0xffff}}}, 0x24}}, 0x0) 08:18:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) [ 55.422079][ T2259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2259 comm=syz-executor.4 [ 55.444572][ T2265] MPTCP: kernel_bind error, err=-99 [ 55.445663][ T2265] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2265 comm=syz-executor.5 [ 55.450018][ T2269] loop1: detected capacity change from 0 to 224 08:18:40 executing program 2: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) [ 55.457380][ T2267] MPTCP: kernel_bind error, err=-99 [ 55.484681][ T2272] MPTCP: kernel_bind error, err=-99 [ 55.486509][ T2272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2272 comm=syz-executor.4 [ 55.500429][ T2273] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:18:40 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a080200000100000101", 0x21, 0xe000}], 0x0, &(0x7f0000000280)=ANY=[]) getdents(r0, 0x0, 0x0) 08:18:40 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) 08:18:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x7c774aac) writev(r0, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 08:18:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) [ 55.528998][ T2267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2267 comm=syz-executor.0 [ 55.554888][ T2276] MPTCP: kernel_bind error, err=-99 [ 55.555295][ T2276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2276 comm=syz-executor.2 08:18:40 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) [ 55.557926][ T2277] MPTCP: kernel_bind error, err=-99 [ 55.584512][ T2280] loop1: detected capacity change from 0 to 224 [ 55.597063][ T2282] MPTCP: kernel_bind error, err=-99 [ 55.597948][ T2282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2282 comm=syz-executor.4 [ 55.628132][ T2285] MPTCP: kernel_bind error, err=-99 08:18:40 executing program 2: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) 08:18:40 executing program 1: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x4000000) 08:18:40 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b4ce875f2e3ff5f163ee301b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="a000000024008b0d00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000800010068746200740002001800020003000000b0000000050000000000000000000000180002000300000005000000ff0f00000000000000000000180002000300000007000000418b0000000000000000000008000500030000001800020003cf9392fa00000001010000"], 0xa0}}, 0x0) [ 55.629700][ T2285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2285 comm=syz-executor.0 [ 55.664735][ T2277] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2277 comm=syz-executor.5 08:18:40 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b4ce875f2e3ff5f163ee301b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="a000000024008b0d00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000800010068746200740002001800020003000000b0000000050000000000000000000000180002000300000005000000ff0f00000000000000000000180002000300000007000000418b0000000000000000000008000500030000001800020003cf9392fa00000001010000"], 0xa0}}, 0x0) 08:18:40 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) 08:18:40 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000040)={0x0, 0x2040000, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty=0x700}]}]}, 0x38}}, 0x0) r2 = getpid() pidfd_open(r2, 0x0) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000000000000140003006970766c616e31000000000000000000240012800b0001006970766c616eeff0b76289e2ed23272900001400"], 0x58}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='cpu\t\t~6\n&\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') pidfd_send_signal(r5, 0x1, &(0x7f0000000340)={0xe, 0x0, 0x3}, 0x0) 08:18:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=@ipv6_delrule={0x30, 0x18, 0x1, 0x0, 0x0, {0xa, 0x2}, [@FRA_DST={0x14, 0x1, @mcast1}]}, 0x30}}, 0x0) [ 55.674236][ T2287] MPTCP: kernel_bind error, err=-99 [ 55.698386][ T2290] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 55.718323][ T2284] syz-executor.0 (2284) used greatest stack depth: 11384 bytes left 08:18:40 executing program 1: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x4000000) 08:18:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=@ipv6_delrule={0x30, 0x18, 0x1, 0x0, 0x0, {0xa, 0x2}, [@FRA_DST={0x14, 0x1, @mcast1}]}, 0x30}}, 0x0) [ 55.779023][ T2301] MPTCP: kernel_bind error, err=-99 [ 55.780283][ T2299] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 08:18:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x7c774aac) writev(r0, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 08:18:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x78, 0x9, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x3c, 0x11, 0x0, 0x1, @bitwise={{0xc}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_XOR={0x4}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_BITWISE_MASK={0xc, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "f1"}]}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x4}]}}}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 08:18:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=@ipv6_delrule={0x30, 0x18, 0x1, 0x0, 0x0, {0xa, 0x2}, [@FRA_DST={0x14, 0x1, @mcast1}]}, 0x30}}, 0x0) 08:18:40 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b4ce875f2e3ff5f163ee301b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="a000000024008b0d00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000800010068746200740002001800020003000000b0000000050000000000000000000000180002000300000005000000ff0f00000000000000000000180002000300000007000000418b0000000000000000000008000500030000001800020003cf9392fa00000001010000"], 0xa0}}, 0x0) 08:18:40 executing program 1: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x4000000) 08:18:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x2, 0x0, 0x10}]}}, &(0x7f0000000100)=""/147, 0x26, 0x93, 0x1}, 0x20) 08:18:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x2, 0x0, 0x10}]}}, &(0x7f0000000100)=""/147, 0x26, 0x93, 0x1}, 0x20) 08:18:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=@ipv6_delrule={0x30, 0x18, 0x1, 0x0, 0x0, {0xa, 0x2}, [@FRA_DST={0x14, 0x1, @mcast1}]}, 0x30}}, 0x0) 08:18:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x2, 0x0, 0x10}]}}, &(0x7f0000000100)=""/147, 0x26, 0x93, 0x1}, 0x20) 08:18:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x7c774aac) writev(r0, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 08:18:40 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b4ce875f2e3ff5f163ee301b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="a000000024008b0d00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000800010068746200740002001800020003000000b0000000050000000000000000000000180002000300000005000000ff0f00000000000000000000180002000300000007000000418b0000000000000000000008000500030000001800020003cf9392fa00000001010000"], 0xa0}}, 0x0) 08:18:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x78, 0x9, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x3c, 0x11, 0x0, 0x1, @bitwise={{0xc}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_XOR={0x4}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_BITWISE_MASK={0xc, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "f1"}]}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x4}]}}}]}], {0x14, 0x10}}, 0xc0}}, 0x0) [ 55.796023][ T2302] MPTCP: kernel_bind error, err=-99 [ 55.973158][ T2317] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 56.019716][ T2325] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 08:18:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x7c774aac) writev(r0, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 08:18:40 executing program 1: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x4000000) 08:18:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x50}}, 0x0) 08:18:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x78, 0x9, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x3c, 0x11, 0x0, 0x1, @bitwise={{0xc}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_XOR={0x4}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_BITWISE_MASK={0xc, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "f1"}]}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x4}]}}}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 08:18:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x2, 0x0, 0x10}]}}, &(0x7f0000000100)=""/147, 0x26, 0x93, 0x1}, 0x20) 08:18:40 executing program 5: socket$phonet_pipe(0xa, 0x5, 0x2) 08:18:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x78, 0x9, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x3c, 0x11, 0x0, 0x1, @bitwise={{0xc}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_XOR={0x4}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_BITWISE_MASK={0xc, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "f1"}]}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x4}]}}}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 08:18:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x7c774aac) writev(r0, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 08:18:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'TPROXY\x00', 0x6}, &(0x7f0000000080)=0x1e) 08:18:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'TPROXY\x00', 0x6}, &(0x7f0000000080)=0x1e) 08:18:40 executing program 5: socket$phonet_pipe(0xa, 0x5, 0x2) 08:18:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'TPROXY\x00', 0x6}, &(0x7f0000000080)=0x1e) [ 56.494282][ C1] hrtimer: interrupt took 35943 ns 08:18:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x7c774aac) writev(r0, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 08:18:41 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x31, 0x0, 0x0) 08:18:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x50}}, 0x0) 08:18:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'TPROXY\x00', 0x6}, &(0x7f0000000080)=0x1e) 08:18:41 executing program 5: socket$phonet_pipe(0xa, 0x5, 0x2) 08:18:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x7c774aac) writev(r0, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 08:18:41 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x31, 0x0, 0x0) 08:18:41 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x31, 0x0, 0x0) 08:18:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x50}}, 0x0) 08:18:41 executing program 5: socket$phonet_pipe(0xa, 0x5, 0x2) 08:18:41 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x31, 0x0, 0x0) 08:18:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x33}, 0x0, @in=@loopback