[ 19.035868][ T27] audit: type=1400 audit(1707049617.022:81): avc: denied { read } for pid=2756 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.40' (ED25519) to the list of known hosts. 2024/02/04 12:27:01 fuzzer started 2024/02/04 12:27:01 dialing manager at 10.128.0.163:30015 2024/02/04 12:27:01 checking machine... 2024/02/04 12:27:01 checking revisions... [ 23.586591][ T27] audit: type=1400 audit(1707049621.572:82): avc: denied { node_bind } for pid=3065 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.607151][ T27] audit: type=1400 audit(1707049621.572:83): avc: denied { name_bind } for pid=3065 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 2024/02/04 12:27:01 testing simple program... [ 23.711848][ T27] audit: type=1400 audit(1707049621.692:84): avc: denied { getattr } for pid=3065 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 23.735426][ T27] audit: type=1400 audit(1707049621.702:85): avc: denied { read } for pid=3065 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 23.735679][ T3074] cgroup: Unknown subsys name 'net' [ 23.756390][ T27] audit: type=1400 audit(1707049621.702:86): avc: denied { open } for pid=3065 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 23.785149][ T27] audit: type=1400 audit(1707049621.712:87): avc: denied { mounton } for pid=3074 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.807842][ T27] audit: type=1400 audit(1707049621.712:88): avc: denied { mount } for pid=3074 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.830134][ T27] audit: type=1400 audit(1707049621.742:89): avc: denied { unmount } for pid=3074 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.997062][ T3074] cgroup: Unknown subsys name 'rlimit' [ 24.087075][ T27] audit: type=1400 audit(1707049622.072:90): avc: denied { mounton } for pid=3074 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.113203][ T27] audit: type=1400 audit(1707049622.072:91): avc: denied { mount } for pid=3074 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 24.143232][ T3075] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.189435][ T3074] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.376107][ T3078] chnl_net:caif_netlink_parms(): no params data found [ 24.411114][ T3078] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.418243][ T3078] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.425448][ T3078] bridge_slave_0: entered allmulticast mode [ 24.431865][ T3078] bridge_slave_0: entered promiscuous mode [ 24.438514][ T3078] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.445626][ T3078] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.452896][ T3078] bridge_slave_1: entered allmulticast mode [ 24.459251][ T3078] bridge_slave_1: entered promiscuous mode [ 24.476117][ T3078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.486164][ T3078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.505394][ T3078] team0: Port device team_slave_0 added [ 24.511860][ T3078] team0: Port device team_slave_1 added [ 24.527156][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.534118][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.560037][ T3078] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.571215][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.578189][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.604695][ T3078] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.630529][ T3078] hsr_slave_0: entered promiscuous mode [ 24.636734][ T3078] hsr_slave_1: entered promiscuous mode [ 24.702997][ T3078] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 24.711565][ T3078] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 24.720061][ T3078] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 24.728774][ T3078] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 24.743241][ T3078] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.750341][ T3078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.757640][ T3078] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.764674][ T3078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.796396][ T3078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.807706][ T909] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.815856][ T909] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.827965][ T3078] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.838471][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.845668][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.855819][ T909] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.863059][ T909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.927075][ T3078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 24.994144][ T3078] veth0_vlan: entered promiscuous mode [ 25.002188][ T3078] veth1_vlan: entered promiscuous mode [ 25.017539][ T3078] veth0_macvtap: entered promiscuous mode [ 25.024984][ T3078] veth1_macvtap: entered promiscuous mode [ 25.037232][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.048928][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.058210][ T3078] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.067002][ T3078] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.075714][ T3078] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.084557][ T3078] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 2024/02/04 12:27:03 building call list... executing program [ 27.821836][ T3071] can: request_module (can-proto-0) failed. [ 27.835323][ T3071] can: request_module (can-proto-0) failed. [ 27.848808][ T3071] can: request_module (can-proto-0) failed. [ 28.036565][ T3071] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 28.166790][ T3071] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 28.745472][ T3078] syz-executor.0 (3078) used greatest stack depth: 10568 bytes left [ 28.757669][ T38] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.958592][ T38] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.018663][ T38] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.079016][ T38] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.150820][ T27] kauditd_printk_skb: 76 callbacks suppressed [ 31.150837][ T27] audit: type=1400 audit(1707049629.132:168): avc: denied { search } for pid=2812 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.180400][ T27] audit: type=1400 audit(1707049629.152:169): avc: denied { read } for pid=2812 comm="dhcpcd" name="n25" dev="tmpfs" ino=400 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.202203][ T27] audit: type=1400 audit(1707049629.152:170): avc: denied { open } for pid=2812 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=400 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.225047][ T27] audit: type=1400 audit(1707049629.152:171): avc: denied { getattr } for pid=2812 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=400 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.248569][ T27] audit: type=1400 audit(1707049629.172:172): avc: denied { read } for pid=3176 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.271506][ T27] audit: type=1400 audit(1707049629.172:173): avc: denied { open } for pid=3176 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.296421][ T27] audit: type=1400 audit(1707049629.172:174): avc: denied { getattr } for pid=3176 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.321567][ T27] audit: type=1400 audit(1707049629.232:175): avc: denied { write } for pid=3175 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=341 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.344487][ T27] audit: type=1400 audit(1707049629.232:176): avc: denied { add_name } for pid=3175 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.366853][ T27] audit: type=1400 audit(1707049629.232:177): avc: denied { create } for pid=3175 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.777309][ T38] hsr_slave_0: left promiscuous mode [ 31.783076][ T38] hsr_slave_1: left promiscuous mode [ 31.789089][ T38] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 31.796512][ T38] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 31.804313][ T38] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 31.811857][ T38] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 31.820004][ T38] bridge_slave_1: left allmulticast mode [ 31.825757][ T38] bridge_slave_1: left promiscuous mode [ 31.831459][ T38] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.839184][ T38] bridge_slave_0: left allmulticast mode [ 31.844819][ T38] bridge_slave_0: left promiscuous mode [ 31.850480][ T38] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.859902][ T38] veth1_macvtap: left promiscuous mode [ 31.865404][ T38] veth0_macvtap: left promiscuous mode [ 31.871078][ T38] veth1_vlan: left promiscuous mode [ 31.876356][ T38] veth0_vlan: left promiscuous mode [ 31.960410][ T38] team0 (unregistering): Port device team_slave_1 removed [ 31.969968][ T38] team0 (unregistering): Port device team_slave_0 removed [ 31.979545][ T38] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 31.990235][ T38] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 32.019062][ T38] bond0 (unregistering): Released all slaves [ 38.492237][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 38.492251][ T27] audit: type=1400 audit(1707049636.472:182): avc: denied { remove_name } for pid=2756 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.520945][ T27] audit: type=1400 audit(1707049636.472:183): avc: denied { rename } for pid=2756 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.543328][ T27] audit: type=1400 audit(1707049636.472:184): avc: denied { create } for pid=2756 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 2024/02/04 12:27:59 syscalls: 2890 2024/02/04 12:27:59 code coverage: enabled 2024/02/04 12:27:59 comparison tracing: enabled 2024/02/04 12:27:59 extra coverage: enabled 2024/02/04 12:27:59 delay kcov mmap: enabled 2024/02/04 12:27:59 setuid sandbox: enabled 2024/02/04 12:27:59 namespace sandbox: enabled 2024/02/04 12:27:59 Android sandbox: enabled 2024/02/04 12:27:59 fault injection: enabled 2024/02/04 12:27:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/02/04 12:27:59 net packet injection: enabled 2024/02/04 12:27:59 net device setup: enabled 2024/02/04 12:27:59 concurrency sanitizer: enabled 2024/02/04 12:27:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/02/04 12:27:59 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/02/04 12:27:59 USB emulation: /dev/raw-gadget does not exist 2024/02/04 12:27:59 hci packet injection: /dev/vhci does not exist 2024/02/04 12:27:59 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/02/04 12:27:59 802.15.4 emulation: enabled 2024/02/04 12:27:59 swap file: enabled 2024/02/04 12:27:59 fetching corpus: 0, signal 0/0 (executing program) 2024/02/04 12:27:59 fetching corpus: 0, signal 0/0 (executing program) 2024/02/04 12:28:01 starting 5 fuzzer processes [ 83.406346][ T27] audit: type=1400 audit(1707049681.342:185): avc: denied { read } for pid=3435 comm="syz-executor.4" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.427978][ T27] audit: type=1400 audit(1707049681.352:186): avc: denied { open } for pid=3435 comm="syz-executor.4" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.451564][ T27] audit: type=1400 audit(1707049681.352:187): avc: denied { mounton } for pid=3435 comm="syz-executor.4" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 83.797704][ T3435] chnl_net:caif_netlink_parms(): no params data found [ 83.844915][ T3445] chnl_net:caif_netlink_parms(): no params data found [ 83.877676][ T3444] chnl_net:caif_netlink_parms(): no params data found [ 83.917587][ T3435] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.924674][ T3435] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.931971][ T3435] bridge_slave_0: entered allmulticast mode [ 83.938526][ T3435] bridge_slave_0: entered promiscuous mode [ 83.968520][ T3435] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.975740][ T3435] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.983427][ T3435] bridge_slave_1: entered allmulticast mode [ 83.989975][ T3435] bridge_slave_1: entered promiscuous mode [ 84.011863][ T3444] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.018967][ T3444] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.026303][ T3444] bridge_slave_0: entered allmulticast mode [ 84.032679][ T3444] bridge_slave_0: entered promiscuous mode [ 84.045561][ T3435] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.064229][ T3445] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.071393][ T3445] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.078554][ T3445] bridge_slave_0: entered allmulticast mode [ 84.084982][ T3445] bridge_slave_0: entered promiscuous mode [ 84.098647][ T3444] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.105801][ T3444] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.112915][ T3444] bridge_slave_1: entered allmulticast mode [ 84.119371][ T3444] bridge_slave_1: entered promiscuous mode [ 84.131178][ T3435] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.145001][ T3445] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.152191][ T3445] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.159469][ T3445] bridge_slave_1: entered allmulticast mode [ 84.165839][ T3445] bridge_slave_1: entered promiscuous mode [ 84.187295][ T3444] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.209162][ T3435] team0: Port device team_slave_0 added [ 84.223196][ T3445] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.233208][ T3444] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.248756][ T3435] team0: Port device team_slave_1 added [ 84.260568][ T3445] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.280264][ T3444] team0: Port device team_slave_0 added [ 84.292916][ T3460] chnl_net:caif_netlink_parms(): no params data found [ 84.302905][ T3466] chnl_net:caif_netlink_parms(): no params data found [ 84.317043][ T3445] team0: Port device team_slave_0 added [ 84.323368][ T3444] team0: Port device team_slave_1 added [ 84.329439][ T3435] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 84.336404][ T3435] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.362367][ T3435] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 84.373494][ T3435] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 84.380546][ T3435] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.406478][ T3435] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 84.431670][ T3445] team0: Port device team_slave_1 added [ 84.464978][ T3444] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 84.471985][ T3444] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.497977][ T3444] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 84.509208][ T3444] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 84.516175][ T3444] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.542159][ T3444] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 84.566245][ T3445] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 84.573297][ T3445] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.599319][ T3445] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 84.610592][ T3445] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 84.617568][ T3445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.643528][ T3445] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 84.680071][ T3435] hsr_slave_0: entered promiscuous mode [ 84.686259][ T3435] hsr_slave_1: entered promiscuous mode [ 84.713036][ T3460] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.720146][ T3460] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.727637][ T3460] bridge_slave_0: entered allmulticast mode [ 84.734116][ T3460] bridge_slave_0: entered promiscuous mode [ 84.756271][ T3466] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.763363][ T3466] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.770512][ T3466] bridge_slave_0: entered allmulticast mode [ 84.776993][ T3466] bridge_slave_0: entered promiscuous mode [ 84.783606][ T3460] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.790723][ T3460] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.798395][ T3460] bridge_slave_1: entered allmulticast mode [ 84.804782][ T3460] bridge_slave_1: entered promiscuous mode [ 84.825672][ T3466] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.832744][ T3466] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.839872][ T3466] bridge_slave_1: entered allmulticast mode [ 84.846311][ T3466] bridge_slave_1: entered promiscuous mode [ 84.876243][ T3460] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.887511][ T3445] hsr_slave_0: entered promiscuous mode [ 84.893439][ T3445] hsr_slave_1: entered promiscuous mode [ 84.899264][ T3445] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 84.906866][ T3445] Cannot create hsr debugfs directory [ 84.914323][ T3444] hsr_slave_0: entered promiscuous mode [ 84.920353][ T3444] hsr_slave_1: entered promiscuous mode [ 84.926227][ T3444] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 84.933765][ T3444] Cannot create hsr debugfs directory [ 84.945726][ T3466] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.958665][ T3460] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.974586][ T3466] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.005203][ T3460] team0: Port device team_slave_0 added [ 85.017225][ T3466] team0: Port device team_slave_0 added [ 85.025870][ T3466] team0: Port device team_slave_1 added [ 85.032292][ T3460] team0: Port device team_slave_1 added [ 85.069686][ T3460] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 85.076704][ T3460] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.102791][ T3460] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.113978][ T3460] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.120967][ T3460] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.146988][ T3460] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.167325][ T3466] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 85.174347][ T3466] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.200340][ T3466] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.212570][ T3466] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.219569][ T3466] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.245582][ T3466] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.288252][ T3466] hsr_slave_0: entered promiscuous mode [ 85.294253][ T3466] hsr_slave_1: entered promiscuous mode [ 85.300309][ T3466] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 85.307991][ T3466] Cannot create hsr debugfs directory [ 85.352009][ T3460] hsr_slave_0: entered promiscuous mode [ 85.357985][ T3460] hsr_slave_1: entered promiscuous mode [ 85.363919][ T3460] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 85.371726][ T3460] Cannot create hsr debugfs directory [ 85.394524][ T3435] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 85.403551][ T3435] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 85.450342][ T3435] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 85.471800][ T3435] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 85.589066][ T3435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.634717][ T3435] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.656113][ T3093] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.663206][ T3093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.677878][ T3093] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.684972][ T3093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.731942][ T3435] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 85.742503][ T3435] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 85.810722][ T3444] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.827164][ T3435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.837014][ T3444] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 85.849714][ T3444] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 85.861749][ T3445] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 85.870984][ T3445] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 85.889376][ T3444] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.899070][ T3445] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 85.918717][ T3445] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 85.936249][ T3460] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 85.966110][ T3460] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 85.976779][ T3460] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 85.985290][ T3466] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 85.998824][ T3460] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 86.008151][ T3466] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 86.019267][ T3466] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 86.051006][ T3466] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 86.113477][ T3460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.131199][ T3444] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.159852][ T3444] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.182351][ T3566] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.189462][ T3566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.202655][ T3460] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.223753][ T3445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.232251][ T3566] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.239354][ T3566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.274775][ T3444] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 86.285408][ T3444] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.299864][ T3566] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.307043][ T3566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.317655][ T3566] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.324803][ T3566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.351581][ T3435] veth0_vlan: entered promiscuous mode [ 86.368368][ T3460] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 86.378854][ T3460] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.409470][ T3435] veth1_vlan: entered promiscuous mode [ 86.424190][ T3435] veth0_macvtap: entered promiscuous mode [ 86.433686][ T3435] veth1_macvtap: entered promiscuous mode [ 86.442337][ T3445] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.462102][ T2738] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.469398][ T2738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.480363][ T2738] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.487572][ T2738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.502684][ T3466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.533952][ T3445] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 86.544397][ T3445] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.570916][ T3435] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 86.581035][ T3435] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 86.604578][ T3444] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.613396][ T3466] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.625533][ T3460] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.634912][ T3435] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.643858][ T3435] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.652774][ T3435] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.661586][ T3435] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.686082][ T3566] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.693190][ T3566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.745743][ T3566] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.752841][ T3566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.781601][ T3445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.794666][ T3466] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 86.805219][ T3466] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 12:28:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) [ 86.897968][ T3444] veth0_vlan: entered promiscuous mode [ 86.926845][ T3444] veth1_vlan: entered promiscuous mode 12:28:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) [ 86.950406][ T3460] veth0_vlan: entered promiscuous mode [ 86.980951][ T3444] veth0_macvtap: entered promiscuous mode [ 86.995039][ T3444] veth1_macvtap: entered promiscuous mode [ 87.006733][ T3466] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 87.030022][ T3460] veth1_vlan: entered promiscuous mode [ 87.048759][ T3444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 87.059266][ T3444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.071190][ T3444] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 87.090388][ T3444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 12:28:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) [ 87.101032][ T3444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.121127][ T3444] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 87.138556][ T3444] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.147511][ T3444] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.156454][ T3444] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.165274][ T3444] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.176837][ T3445] veth0_vlan: entered promiscuous mode 12:28:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) [ 87.197877][ T3460] veth0_macvtap: entered promiscuous mode [ 87.210647][ T3460] veth1_macvtap: entered promiscuous mode [ 87.222953][ T3445] veth1_vlan: entered promiscuous mode [ 87.243734][ T3460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 87.254336][ T3460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.264290][ T3460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 87.274916][ T3460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.289707][ T3460] batman_adv: batadv0: Interface activated: batadv_slave_0 12:28:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) [ 87.309004][ T3460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 87.319637][ T3460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.329732][ T3460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 87.340222][ T3460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:28:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) [ 87.353032][ T3460] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 87.370278][ T3460] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.379066][ T3460] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.387900][ T3460] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.396699][ T3460] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 12:28:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) [ 87.403714][ T27] audit: type=1400 audit(1707049685.372:188): avc: denied { read } for pid=3729 comm="syz-executor.0" name="usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 87.429177][ T27] audit: type=1400 audit(1707049685.372:189): avc: denied { open } for pid=3729 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 87.431073][ T3445] veth0_macvtap: entered promiscuous mode 12:28:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) [ 87.500543][ T3466] veth0_vlan: entered promiscuous mode [ 87.511589][ T3445] veth1_macvtap: entered promiscuous mode [ 87.527203][ T3466] veth1_vlan: entered promiscuous mode [ 87.537146][ T3445] ================================================================== [ 87.545274][ T3445] BUG: KCSAN: data-race in pcpu_alloc / pcpu_balance_workfn [ 87.552596][ T3445] [ 87.554927][ T3445] read-write to 0xffffffff8712631c of 4 bytes by task 3609 on cpu 1: [ 87.563005][ T3445] pcpu_balance_workfn+0x94e/0xa50 [ 87.568311][ T3445] process_scheduled_works+0x5b8/0xa40 [ 87.573788][ T3445] worker_thread+0x525/0x730 [ 87.578389][ T3445] kthread+0x1d7/0x210 [ 87.582473][ T3445] ret_from_fork+0x48/0x60 [ 87.586905][ T3445] ret_from_fork_asm+0x11/0x20 [ 87.591699][ T3445] [ 87.594028][ T3445] read to 0xffffffff8712631c of 4 bytes by task 3445 on cpu 0: [ 87.601572][ T3445] pcpu_alloc+0x9be/0x10c0 [ 87.605994][ T3445] __alloc_percpu_gfp+0x26/0x30 [ 87.610861][ T3445] fib6_nh_init+0x60b/0x15c0 [ 87.615478][ T3445] ip6_route_info_create+0x7cb/0xb90 [ 87.620792][ T3445] ip6_route_add+0x26/0x100 [ 87.625320][ T3445] addrconf_permanent_addr+0x43b/0x5a0 [ 87.630786][ T3445] addrconf_notify+0x681/0x950 [ 87.635556][ T3445] raw_notifier_call_chain+0x6b/0x1c0 [ 87.640944][ T3445] call_netdevice_notifiers_info+0xae/0x100 [ 87.646850][ T3445] __dev_notify_flags+0xff/0x1a0 [ 87.651794][ T3445] dev_change_flags+0xab/0xd0 [ 87.656476][ T3445] do_setlink+0x839/0x2440 [ 87.660898][ T3445] rtnl_newlink+0x1191/0x1670 [ 87.665578][ T3445] rtnetlink_rcv_msg+0x80a/0x8c0 [ 87.670526][ T3445] netlink_rcv_skb+0x126/0x220 [ 87.675309][ T3445] rtnetlink_rcv+0x1c/0x20 [ 87.679747][ T3445] netlink_unicast+0x589/0x660 [ 87.684530][ T3445] netlink_sendmsg+0x66e/0x770 [ 87.689314][ T3445] __sys_sendto+0x22b/0x2f0 [ 87.693838][ T3445] __x64_sys_sendto+0x78/0x90 [ 87.698532][ T3445] do_syscall_64+0xcd/0x1d0 [ 87.703192][ T3445] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 87.709188][ T3445] [ 87.711513][ T3445] value changed: 0x00000001 -> 0x00000004 [ 87.717229][ T3445] [ 87.719552][ T3445] Reported by Kernel Concurrency Sanitizer on: [ 87.726187][ T3445] CPU: 0 PID: 3445 Comm: syz-executor.1 Not tainted 6.8.0-rc2-syzkaller-00476-g3a0e92207940 #0 [ 87.736703][ T3445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 87.746860][ T3445] ================================================================== 12:28:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) 12:28:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) 12:28:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) 12:28:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) [ 87.802605][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 87.813162][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.823095][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 87.833667][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.843581][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 87.854046][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.869614][ T3445] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 87.892713][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 12:28:05 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) 12:28:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) [ 87.903184][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.913077][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 87.923758][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.926407][ T3106] hid-generic 0000:0000:0000.0001: item fetching failed at offset 0/1 [ 87.933597][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 87.944182][ T27] audit: type=1400 audit(1707049685.912:190): avc: denied { write } for pid=3758 comm="syz-executor.2" name="uhid" dev="devtmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 87.952164][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.980206][ T3106] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 [ 87.991402][ T3445] batman_adv: batadv0: Interface activated: batadv_slave_1 12:28:06 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) 12:28:06 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) [ 88.009174][ T3466] veth0_macvtap: entered promiscuous mode 12:28:06 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) 12:28:06 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) [ 88.052628][ T3445] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.061535][ T3445] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.071082][ T3445] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.079925][ T3445] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 12:28:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) 12:28:06 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) 12:28:06 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) 12:28:06 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) [ 88.106633][ T3466] veth1_macvtap: entered promiscuous mode 12:28:06 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) [ 88.185738][ T3466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 88.196267][ T3466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.206118][ T3466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 88.216590][ T3466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:28:06 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) 12:28:06 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) [ 88.226511][ T3466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 88.237044][ T3466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.247002][ T3466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 88.257554][ T3466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:28:06 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) [ 88.280281][ T3466] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 88.288546][ T3106] hid-generic 0000:0000:0000.0002: item fetching failed at offset 0/1 [ 88.303521][ T3106] hid-generic: probe of 0000:0000:0000.0002 failed with error -22 12:28:06 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) [ 88.328225][ T3466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 88.338787][ T3466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.348627][ T3466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 88.359080][ T3466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:28:06 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x20000007b, 0x0) r2 = dup3(r0, r1, 0x0) preadv(r2, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)=""/177, 0xb1}], 0x2, 0x0, 0x0) [ 88.368991][ T3466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 88.379481][ T3466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.389346][ T3466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 88.399791][ T3466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.439056][ T27] audit: type=1400 audit(1707049686.412:191): avc: denied { mounton } for pid=3798 comm="syz-executor.1" path="/root/syzkaller-testdir3440929520/syzkaller.CF8WcB/0/file0" dev="sda1" ino=1955 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 88.454502][ T3466] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 88.466041][ T27] audit: type=1400 audit(1707049686.412:192): avc: denied { mount } for pid=3798 comm="syz-executor.1" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 88.466067][ T27] audit: type=1400 audit(1707049686.412:193): avc: denied { watch } for pid=3798 comm="syz-executor.1" path="/root/syzkaller-testdir3440929520/syzkaller.CF8WcB/0/file0" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1 [ 88.475938][ T3466] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.530443][ T3466] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 12:28:06 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) [ 88.539225][ T3466] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.547975][ T3466] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 12:28:06 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) [ 88.573084][ T27] audit: type=1400 audit(1707049686.552:194): avc: denied { unmount } for pid=3445 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 12:28:06 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b2"}}, 0x119) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\n\x00\x00\x00', 0x4}, {&(0x7f0000000400)="eaae46f2", 0x4}], 0x2) 12:28:06 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:06 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) [ 88.736120][ T3095] hid-generic 0000:0000:0000.0003: item fetching failed at offset 0/1 [ 88.744481][ T3095] hid-generic: probe of 0000:0000:0000.0003 failed with error -22 12:28:06 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) [ 88.779153][ T3851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:28:06 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) [ 88.827761][ T3851] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 12:28:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:06 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:06 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:06 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) [ 88.954511][ T3872] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 88.973178][ T3883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 88.992257][ T3883] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 12:28:07 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) [ 89.003101][ T3887] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 89.015866][ T3872] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 89.039880][ T3887] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:28:07 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) [ 89.065120][ T3894] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 89.076050][ T3894] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 12:28:07 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:07 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000021c0)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x50}}, 0x0) 12:28:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) 12:28:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) 12:28:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) 12:28:07 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'bond0\x00', @ifru_names='dummy0\x00'}) 12:28:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/73, 0x78) getdents64(r1, 0x0, 0x0) 12:28:07 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'bond0\x00', @ifru_names='dummy0\x00'}) 12:28:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) 12:28:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) 12:28:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) [ 89.537601][ T3979] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 89.570360][ T3983] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 12:28:07 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'bond0\x00', @ifru_names='dummy0\x00'}) 12:28:07 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'bond0\x00', @ifru_names='dummy0\x00'}) 12:28:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) 12:28:07 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'bond0\x00', @ifru_names='dummy0\x00'}) 12:28:07 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'bond0\x00', @ifru_names='dummy0\x00'}) [ 89.659309][ T4000] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 89.672256][ T4002] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 12:28:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) 12:28:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait2(r1, &(0x7f0000002c80)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000004}) 12:28:07 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:07 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'bond0\x00', @ifru_names='dummy0\x00'}) [ 89.724225][ T4009] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 89.735201][ T4012] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 12:28:07 executing program 1: syz_emit_ethernet(0x46, &(0x7f00000020c0)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "430093", 0x10, 0x21, 0x0, @dev, @mcast2, {[], @ndisc_ra}}}}}, 0x0) 12:28:07 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x10000, 0xca2e}, 0x48) [ 89.794161][ T27] audit: type=1400 audit(1707049687.772:195): avc: denied { write } for pid=4020 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 89.831366][ T4027] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 12:28:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf4240}, [@ldst={0x4, 0x0, 0x1}]}, &(0x7f0000000340)='GPL\x00'}, 0x90) 12:28:07 executing program 1: syz_emit_ethernet(0x46, &(0x7f00000020c0)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "430093", 0x10, 0x21, 0x0, @dev, @mcast2, {[], @ndisc_ra}}}}}, 0x0) [ 89.866503][ T27] audit: type=1400 audit(1707049687.802:196): avc: denied { read } for pid=4020 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 12:28:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x10000, 0xca2e}, 0x48) [ 89.922748][ T27] audit: type=1400 audit(1707049687.852:197): avc: denied { prog_load } for pid=4036 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.942208][ T27] audit: type=1400 audit(1707049687.852:198): avc: denied { bpf } for pid=4036 comm="syz-executor.2" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 12:28:07 executing program 1: syz_emit_ethernet(0x46, &(0x7f00000020c0)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "430093", 0x10, 0x21, 0x0, @dev, @mcast2, {[], @ndisc_ra}}}}}, 0x0) 12:28:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf4240}, [@ldst={0x4, 0x0, 0x1}]}, &(0x7f0000000340)='GPL\x00'}, 0x90) 12:28:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 1: syz_emit_ethernet(0x46, &(0x7f00000020c0)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "430093", 0x10, 0x21, 0x0, @dev, @mcast2, {[], @ndisc_ra}}}}}, 0x0) [ 89.963112][ T27] audit: type=1400 audit(1707049687.852:199): avc: denied { perfmon } for pid=4036 comm="syz-executor.2" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.984299][ T27] audit: type=1400 audit(1707049687.872:200): avc: denied { map_create } for pid=4039 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 12:28:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x10000, 0xca2e}, 0x48) 12:28:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf4240}, [@ldst={0x4, 0x0, 0x1}]}, &(0x7f0000000340)='GPL\x00'}, 0x90) 12:28:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf4240}, [@ldst={0x4, 0x0, 0x1}]}, &(0x7f0000000340)='GPL\x00'}, 0x90) 12:28:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x10000, 0xca2e}, 0x48) 12:28:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 1: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:08 executing program 1: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:08 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000002f9b0000000000000000b50000000f004083c5000000a0000a4095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000003ac0)=[{0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 12:28:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:08 executing program 1: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:08 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:08 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:08 executing program 1: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:08 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:08 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:09 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:09 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:09 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:09 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:09 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:10 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:10 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:10 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:10 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:10 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={0x0}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x2}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:28:11 executing program 4: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 4: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 0: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 2: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 4: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 0: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 2: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 0: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 3: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:11 executing program 2: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x2000000, &(0x7f00000001c0)=ANY=[], 0x1, 0x52e, &(0x7f0000000540)="$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") 12:28:11 executing program 3: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x20008805) close_range(r1, 0xffffffffffffffff, 0x0) 12:28:11 executing program 3: r0 = socket(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x14d35e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) getsockopt$nfc_llcp(r0, 0x114, 0x2713, 0x0, 0x20000000) 12:28:11 executing program 1: r0 = memfd_secret(0x0) fsetxattr(r0, &(0x7f0000001580)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 12:28:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x17, 0x0, 0x0}) 12:28:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x4c0, 0xffffffff, 0x1a0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f0, 0x3f0, 0x3f0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}, {{@ipv6={@mcast2, @mcast2, [], [], 'caif0\x00', 'ip6erspan0\x00'}, 0x0, 0x208, 0x250, 0x0, {}, [@common=@mh={{0x28}, {"dfa0"}}, @common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@loopback, @private2, @loopback, @mcast2, @mcast2, @remote, @local, @private1, @mcast2, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00', @dev]}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'geneve0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) [ 93.453831][ T4292] loop0: detected capacity change from 0 to 512 [ 93.492979][ T4292] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 93.533846][ T4292] EXT4-fs error (device loop0): ext4_ext_check_inode:520: inode #15: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 24833, max 4(4), depth 0(0) [ 93.558223][ T27] kauditd_printk_skb: 3 callbacks suppressed 12:28:11 executing program 1: r0 = memfd_secret(0x0) fsetxattr(r0, &(0x7f0000001580)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 12:28:11 executing program 3: r0 = memfd_secret(0x0) fsetxattr(r0, &(0x7f0000001580)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 12:28:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x17, 0x0, 0x0}) [ 93.558237][ T27] audit: type=1400 audit(1707049691.542:204): avc: denied { read } for pid=4304 comm="syz-executor.2" name="event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 93.569742][ T4306] x_tables: duplicate underflow at hook 2 [ 93.589462][ T4292] EXT4-fs error (device loop0): ext4_orphan_get:1399: comm syz-executor.0: couldn't read orphan inode 15 (err -117) [ 93.626001][ T27] audit: type=1400 audit(1707049691.572:205): avc: denied { open } for pid=4304 comm="syz-executor.2" path="/dev/input/event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 93.630907][ T4292] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 12:28:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x4c0, 0xffffffff, 0x1a0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f0, 0x3f0, 0x3f0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}, {{@ipv6={@mcast2, @mcast2, [], [], 'caif0\x00', 'ip6erspan0\x00'}, 0x0, 0x208, 0x250, 0x0, {}, [@common=@mh={{0x28}, {"dfa0"}}, @common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@loopback, @private2, @loopback, @mcast2, @mcast2, @remote, @local, @private1, @mcast2, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00', @dev]}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'geneve0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 12:28:11 executing program 3: r0 = memfd_secret(0x0) fsetxattr(r0, &(0x7f0000001580)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 12:28:11 executing program 1: r0 = memfd_secret(0x0) fsetxattr(r0, &(0x7f0000001580)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 12:28:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x17, 0x0, 0x0}) [ 93.650407][ T27] audit: type=1400 audit(1707049691.572:206): avc: denied { ioctl } for pid=4304 comm="syz-executor.2" path="/dev/input/event0" dev="devtmpfs" ino=217 ioctlcmd=0x4593 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 93.696551][ T4292] ext2 filesystem being mounted at /root/syzkaller-testdir3345499050/syzkaller.KrqA7y/38/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 93.705953][ T4317] x_tables: duplicate underflow at hook 2 12:28:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x4c0, 0xffffffff, 0x1a0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f0, 0x3f0, 0x3f0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}, {{@ipv6={@mcast2, @mcast2, [], [], 'caif0\x00', 'ip6erspan0\x00'}, 0x0, 0x208, 0x250, 0x0, {}, [@common=@mh={{0x28}, {"dfa0"}}, @common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@loopback, @private2, @loopback, @mcast2, @mcast2, @remote, @local, @private1, @mcast2, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00', @dev]}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'geneve0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 12:28:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x17, 0x0, 0x0}) 12:28:11 executing program 1: r0 = memfd_secret(0x0) fsetxattr(r0, &(0x7f0000001580)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 12:28:11 executing program 3: r0 = memfd_secret(0x0) fsetxattr(r0, &(0x7f0000001580)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 12:28:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x2000000, &(0x7f00000001c0)=ANY=[], 0x1, 0x52e, &(0x7f0000000540)="$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") [ 93.712614][ T27] audit: type=1400 audit(1707049691.682:207): avc: denied { mount } for pid=4289 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 12:28:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x17, 0x0, 0x0}) 12:28:11 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0xbde7f04f5ac347d0}}) 12:28:11 executing program 1: r0 = syz_io_uring_setup(0x5e2a, &(0x7f0000000080)={0x0, 0x0, 0x30c0}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xb, 0x0, 0x0) [ 93.769942][ T3444] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 93.779388][ T27] audit: type=1400 audit(1707049691.752:208): avc: denied { unmount } for pid=3444 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 93.813844][ T4328] x_tables: duplicate underflow at hook 2 12:28:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x4c0, 0xffffffff, 0x1a0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f0, 0x3f0, 0x3f0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}, {{@ipv6={@mcast2, @mcast2, [], [], 'caif0\x00', 'ip6erspan0\x00'}, 0x0, 0x208, 0x250, 0x0, {}, [@common=@mh={{0x28}, {"dfa0"}}, @common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@loopback, @private2, @loopback, @mcast2, @mcast2, @remote, @local, @private1, @mcast2, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00', @dev]}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'geneve0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 12:28:11 executing program 1: r0 = syz_io_uring_setup(0x5e2a, &(0x7f0000000080)={0x0, 0x0, 0x30c0}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xb, 0x0, 0x0) 12:28:11 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0xbde7f04f5ac347d0}}) 12:28:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x17, 0x0, 0x0}) [ 93.833594][ T27] audit: type=1400 audit(1707049691.812:209): avc: denied { map } for pid=4331 comm="syz-executor.1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 93.858081][ T27] audit: type=1400 audit(1707049691.812:210): avc: denied { read write } for pid=4331 comm="syz-executor.1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 12:28:11 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0xbde7f04f5ac347d0}}) 12:28:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x17, 0x0, 0x0}) 12:28:11 executing program 1: r0 = syz_io_uring_setup(0x5e2a, &(0x7f0000000080)={0x0, 0x0, 0x30c0}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xb, 0x0, 0x0) 12:28:11 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0xbde7f04f5ac347d0}}) [ 93.899925][ T4337] x_tables: duplicate underflow at hook 2 [ 93.922615][ T4341] loop0: detected capacity change from 0 to 512 12:28:11 executing program 1: r0 = syz_io_uring_setup(0x5e2a, &(0x7f0000000080)={0x0, 0x0, 0x30c0}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xb, 0x0, 0x0) 12:28:11 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0xbde7f04f5ac347d0}}) 12:28:11 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0xbde7f04f5ac347d0}}) [ 93.957310][ T4341] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 12:28:12 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0xbde7f04f5ac347d0}}) 12:28:12 executing program 2: r0 = syz_io_uring_setup(0x5e2a, &(0x7f0000000080)={0x0, 0x0, 0x30c0}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xb, 0x0, 0x0) 12:28:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x78}}, 0x0) 12:28:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000300), 0x6) [ 94.000387][ T4341] EXT4-fs error (device loop0): ext4_ext_check_inode:520: inode #15: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 24833, max 4(4), depth 0(0) [ 94.032681][ T4341] EXT4-fs error (device loop0): ext4_orphan_get:1399: comm syz-executor.0: couldn't read orphan inode 15 (err -117) 12:28:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x78}}, 0x0) 12:28:12 executing program 2: r0 = syz_io_uring_setup(0x5e2a, &(0x7f0000000080)={0x0, 0x0, 0x30c0}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xb, 0x0, 0x0) [ 94.068935][ T27] audit: type=1400 audit(1707049692.042:211): avc: denied { write } for pid=4364 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 12:28:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x78}}, 0x0) 12:28:12 executing program 2: r0 = syz_io_uring_setup(0x5e2a, &(0x7f0000000080)={0x0, 0x0, 0x30c0}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xb, 0x0, 0x0) [ 94.119206][ T27] audit: type=1400 audit(1707049692.092:212): avc: denied { setopt } for pid=4370 comm="syz-executor.4" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 94.139869][ T27] audit: type=1400 audit(1707049692.092:213): avc: denied { connect } for pid=4370 comm="syz-executor.4" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 12:28:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000300), 0x6) 12:28:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x78}}, 0x0) 12:28:12 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000300), 0x6) 12:28:12 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000300), 0x6) 12:28:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000300), 0x6) 12:28:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) [ 94.141953][ T4341] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 94.187896][ T4341] ext2 filesystem being mounted at /root/syzkaller-testdir3345499050/syzkaller.KrqA7y/39/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:28:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000300), 0x6) 12:28:12 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000300), 0x6) 12:28:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x2000000, &(0x7f00000001c0)=ANY=[], 0x1, 0x52e, &(0x7f0000000540)="$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") 12:28:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) [ 94.268283][ T3444] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:28:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x78}}, 0x0) 12:28:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:28:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x78}}, 0x0) 12:28:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) [ 94.355317][ T4406] loop0: detected capacity change from 0 to 512 [ 94.367834][ T4406] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 94.378091][ T4406] EXT4-fs error (device loop0): ext4_ext_check_inode:520: inode #15: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 24833, max 4(4), depth 0(0) 12:28:12 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=@mangle={'mangle\x00', 0xc, 0x6, 0x8a8, 0xd0, 0x0, 0x6b8, 0x1b0, 0xd0, 0x7d8, 0x7d8, 0x7d8, 0x7d8, 0x7d8, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0, 0x0, {0x7a00000000000000}}, @HL={0x28}}, {{@ipv6={@dev, @loopback, [], [], 'pimreg0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@uncond, 0x0, 0x1e0, 0x208, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @local, @private1, @local, @dev, @private2, @private1, @mcast2, @dev, @private2, @private1, @loopback, @loopback]}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x2d8, 0x300, 0x0, {}, [@common=@unspec=@bpf0={{0x230}}]}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@eui64={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x908) 12:28:12 executing program 2: r0 = socket$nl_netfi