Warning: Permanently added '10.128.10.4' (ECDSA) to the list of known hosts. 2021/12/19 05:56:54 fuzzer started 2021/12/19 05:56:54 dialing manager at 10.128.0.163:36017 [ 24.784946][ T24] audit: type=1400 audit(1639893419.194:74): avc: denied { mounton } for pid=1806 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.785831][ T1806] cgroup: Unknown subsys name 'net' [ 24.807659][ T24] audit: type=1400 audit(1639893419.194:75): avc: denied { mount } for pid=1806 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.835011][ T24] audit: type=1400 audit(1639893419.234:76): avc: denied { unmount } for pid=1806 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.854932][ T1806] cgroup: Unknown subsys name 'devices' [ 24.860613][ T1806] cgroup: Unknown subsys name 'blkio' [ 24.978697][ T1806] cgroup: Unknown subsys name 'hugetlb' [ 24.984354][ T1806] cgroup: Unknown subsys name 'rlimit' 2021/12/19 05:56:59 syscalls: 2717 2021/12/19 05:56:59 code coverage: enabled 2021/12/19 05:56:59 comparison tracing: enabled 2021/12/19 05:56:59 extra coverage: enabled 2021/12/19 05:56:59 delay kcov mmap: mmap returned an invalid pointer 2021/12/19 05:56:59 setuid sandbox: enabled 2021/12/19 05:56:59 namespace sandbox: enabled 2021/12/19 05:56:59 Android sandbox: enabled 2021/12/19 05:56:59 fault injection: enabled 2021/12/19 05:56:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/12/19 05:56:59 net packet injection: enabled 2021/12/19 05:56:59 net device setup: enabled 2021/12/19 05:56:59 concurrency sanitizer: enabled 2021/12/19 05:56:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/12/19 05:56:59 USB emulation: /dev/raw-gadget does not exist 2021/12/19 05:56:59 hci packet injection: /dev/vhci does not exist 2021/12/19 05:56:59 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/12/19 05:56:59 802.15.4 emulation: enabled [ 25.078559][ T24] audit: type=1400 audit(1639893419.494:77): avc: denied { mounton } for pid=1806 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.103343][ T24] audit: type=1400 audit(1639893419.494:78): avc: denied { mount } for pid=1806 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.127020][ T24] audit: type=1400 audit(1639893419.494:79): avc: denied { create } for pid=1806 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.147593][ T24] audit: type=1400 audit(1639893419.494:80): avc: denied { write } for pid=1806 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.167930][ T24] audit: type=1400 audit(1639893419.494:81): avc: denied { read } for pid=1806 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2021/12/19 05:57:01 suppressing KCSAN reports in functions: '__xa_clear_mark' 'ext4_fill_raw_inode' '__lru_add_drain_all' 'ext4_mb_good_group' 'shmem_mknod' 'step_into' 'ext4_ext_rm_leaf' 'get_cpu_idle_time_us' 'pcpu_alloc' 'shmem_file_read_iter' '__dentry_kill' 'ext4_free_inodes_count' 'exit_mm' 'prandom_seed' 'do_sys_poll' 'ext4_fc_commit' 'detach_buf_split' 'ext4_writepages' 'do_select' 'do_mpage_readpage' 'generic_write_end' 'blk_mq_sched_dispatch_requests' 'kcm_rfree' 2021/12/19 05:57:01 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/19 05:57:01 fetching corpus: 49, signal 10348/14229 (executing program) 2021/12/19 05:57:01 fetching corpus: 99, signal 15998/21723 (executing program) 2021/12/19 05:57:01 fetching corpus: 149, signal 22065/29530 (executing program) 2021/12/19 05:57:01 fetching corpus: 199, signal 26214/35446 (executing program) 2021/12/19 05:57:01 fetching corpus: 249, signal 32498/43355 (executing program) 2021/12/19 05:57:01 fetching corpus: 299, signal 35932/48468 (executing program) 2021/12/19 05:57:01 fetching corpus: 349, signal 38488/52665 (executing program) 2021/12/19 05:57:01 fetching corpus: 399, signal 40165/55995 (executing program) 2021/12/19 05:57:01 fetching corpus: 449, signal 43247/60660 (executing program) 2021/12/19 05:57:01 fetching corpus: 499, signal 45101/64148 (executing program) 2021/12/19 05:57:01 fetching corpus: 549, signal 49954/70381 (executing program) 2021/12/19 05:57:01 fetching corpus: 599, signal 52448/74367 (executing program) 2021/12/19 05:57:01 fetching corpus: 649, signal 54995/78390 (executing program) 2021/12/19 05:57:01 fetching corpus: 699, signal 57137/81998 (executing program) 2021/12/19 05:57:01 fetching corpus: 749, signal 61438/87539 (executing program) 2021/12/19 05:57:01 fetching corpus: 799, signal 63113/90705 (executing program) 2021/12/19 05:57:01 fetching corpus: 849, signal 64289/93359 (executing program) 2021/12/19 05:57:01 fetching corpus: 899, signal 66751/97163 (executing program) 2021/12/19 05:57:01 fetching corpus: 949, signal 68097/99973 (executing program) 2021/12/19 05:57:01 fetching corpus: 999, signal 70336/103524 (executing program) 2021/12/19 05:57:02 fetching corpus: 1049, signal 71656/106272 (executing program) 2021/12/19 05:57:02 fetching corpus: 1099, signal 72973/108978 (executing program) 2021/12/19 05:57:02 fetching corpus: 1149, signal 74372/111763 (executing program) 2021/12/19 05:57:02 fetching corpus: 1199, signal 75241/114081 (executing program) 2021/12/19 05:57:02 fetching corpus: 1249, signal 76526/116724 (executing program) 2021/12/19 05:57:02 fetching corpus: 1299, signal 78041/119579 (executing program) 2021/12/19 05:57:02 fetching corpus: 1349, signal 79468/122281 (executing program) 2021/12/19 05:57:02 fetching corpus: 1399, signal 80522/124682 (executing program) 2021/12/19 05:57:02 fetching corpus: 1449, signal 81669/127108 (executing program) 2021/12/19 05:57:02 fetching corpus: 1499, signal 82507/129322 (executing program) 2021/12/19 05:57:02 fetching corpus: 1549, signal 83262/131441 (executing program) 2021/12/19 05:57:02 fetching corpus: 1599, signal 85541/134779 (executing program) 2021/12/19 05:57:02 fetching corpus: 1649, signal 87127/137536 (executing program) 2021/12/19 05:57:02 fetching corpus: 1699, signal 88740/140261 (executing program) 2021/12/19 05:57:02 fetching corpus: 1749, signal 89453/142291 (executing program) 2021/12/19 05:57:02 fetching corpus: 1799, signal 90302/144417 (executing program) 2021/12/19 05:57:02 fetching corpus: 1849, signal 90887/146354 (executing program) 2021/12/19 05:57:02 fetching corpus: 1899, signal 92127/148749 (executing program) 2021/12/19 05:57:02 fetching corpus: 1949, signal 93188/150991 (executing program) 2021/12/19 05:57:02 fetching corpus: 1999, signal 94396/153392 (executing program) 2021/12/19 05:57:02 fetching corpus: 2049, signal 95547/155703 (executing program) 2021/12/19 05:57:03 fetching corpus: 2099, signal 96345/157776 (executing program) 2021/12/19 05:57:03 fetching corpus: 2149, signal 97252/159881 (executing program) 2021/12/19 05:57:03 fetching corpus: 2199, signal 98180/162010 (executing program) 2021/12/19 05:57:03 fetching corpus: 2249, signal 99115/164069 (executing program) 2021/12/19 05:57:03 fetching corpus: 2299, signal 100409/166398 (executing program) 2021/12/19 05:57:03 fetching corpus: 2349, signal 101373/168441 (executing program) 2021/12/19 05:57:03 fetching corpus: 2399, signal 102448/170625 (executing program) 2021/12/19 05:57:03 fetching corpus: 2449, signal 103565/172803 (executing program) 2021/12/19 05:57:03 fetching corpus: 2499, signal 104620/174875 (executing program) 2021/12/19 05:57:03 fetching corpus: 2549, signal 105186/176664 (executing program) 2021/12/19 05:57:03 fetching corpus: 2599, signal 106016/178599 (executing program) 2021/12/19 05:57:03 fetching corpus: 2649, signal 106719/180463 (executing program) 2021/12/19 05:57:03 fetching corpus: 2699, signal 107991/182678 (executing program) 2021/12/19 05:57:03 fetching corpus: 2749, signal 109375/185025 (executing program) 2021/12/19 05:57:03 fetching corpus: 2799, signal 110286/186991 (executing program) 2021/12/19 05:57:03 fetching corpus: 2849, signal 111086/188857 (executing program) 2021/12/19 05:57:03 fetching corpus: 2899, signal 112106/190833 (executing program) 2021/12/19 05:57:03 fetching corpus: 2949, signal 112973/192726 (executing program) 2021/12/19 05:57:03 fetching corpus: 2999, signal 113854/194555 (executing program) 2021/12/19 05:57:03 fetching corpus: 3049, signal 114497/196272 (executing program) 2021/12/19 05:57:03 fetching corpus: 3099, signal 115287/198070 (executing program) 2021/12/19 05:57:04 fetching corpus: 3149, signal 115765/199659 (executing program) 2021/12/19 05:57:04 fetching corpus: 3199, signal 116565/201498 (executing program) 2021/12/19 05:57:04 fetching corpus: 3249, signal 117435/203339 (executing program) 2021/12/19 05:57:04 fetching corpus: 3299, signal 118173/205061 (executing program) 2021/12/19 05:57:04 fetching corpus: 3349, signal 118907/206762 (executing program) 2021/12/19 05:57:04 fetching corpus: 3399, signal 119916/208608 (executing program) 2021/12/19 05:57:04 fetching corpus: 3449, signal 120726/210370 (executing program) 2021/12/19 05:57:04 fetching corpus: 3499, signal 121512/212098 (executing program) 2021/12/19 05:57:04 fetching corpus: 3549, signal 122195/213754 (executing program) 2021/12/19 05:57:04 fetching corpus: 3599, signal 122935/215480 (executing program) 2021/12/19 05:57:04 fetching corpus: 3649, signal 123649/217149 (executing program) 2021/12/19 05:57:04 fetching corpus: 3699, signal 124418/218847 (executing program) 2021/12/19 05:57:04 fetching corpus: 3749, signal 125254/220584 (executing program) 2021/12/19 05:57:04 fetching corpus: 3799, signal 125752/222119 (executing program) 2021/12/19 05:57:04 fetching corpus: 3849, signal 126512/223754 (executing program) 2021/12/19 05:57:04 fetching corpus: 3899, signal 127051/225251 (executing program) 2021/12/19 05:57:04 fetching corpus: 3949, signal 128129/227096 (executing program) 2021/12/19 05:57:04 fetching corpus: 3999, signal 129033/228841 (executing program) 2021/12/19 05:57:04 fetching corpus: 4049, signal 129563/230343 (executing program) 2021/12/19 05:57:04 fetching corpus: 4099, signal 130035/231806 (executing program) 2021/12/19 05:57:04 fetching corpus: 4149, signal 130436/233226 (executing program) 2021/12/19 05:57:04 fetching corpus: 4199, signal 131038/234714 (executing program) 2021/12/19 05:57:05 fetching corpus: 4249, signal 131784/236265 (executing program) 2021/12/19 05:57:05 fetching corpus: 4299, signal 132671/237849 (executing program) 2021/12/19 05:57:05 fetching corpus: 4349, signal 133010/239199 (executing program) 2021/12/19 05:57:05 fetching corpus: 4399, signal 134048/240899 (executing program) 2021/12/19 05:57:05 fetching corpus: 4449, signal 134920/242460 (executing program) 2021/12/19 05:57:05 fetching corpus: 4499, signal 135327/243868 (executing program) 2021/12/19 05:57:05 fetching corpus: 4549, signal 135784/245303 (executing program) 2021/12/19 05:57:05 fetching corpus: 4599, signal 136454/246742 (executing program) 2021/12/19 05:57:05 fetching corpus: 4649, signal 137092/248221 (executing program) 2021/12/19 05:57:05 fetching corpus: 4699, signal 137509/249559 (executing program) 2021/12/19 05:57:05 fetching corpus: 4749, signal 137977/250938 (executing program) 2021/12/19 05:57:05 fetching corpus: 4799, signal 139248/252668 (executing program) 2021/12/19 05:57:05 fetching corpus: 4849, signal 139814/254100 (executing program) 2021/12/19 05:57:05 fetching corpus: 4899, signal 140649/255634 (executing program) 2021/12/19 05:57:05 fetching corpus: 4949, signal 140971/256941 (executing program) 2021/12/19 05:57:05 fetching corpus: 4999, signal 141371/258284 (executing program) 2021/12/19 05:57:05 fetching corpus: 5049, signal 142040/259716 (executing program) 2021/12/19 05:57:05 fetching corpus: 5099, signal 142811/261171 (executing program) 2021/12/19 05:57:05 fetching corpus: 5149, signal 143230/262452 (executing program) 2021/12/19 05:57:05 fetching corpus: 5199, signal 143714/263771 (executing program) 2021/12/19 05:57:05 fetching corpus: 5249, signal 144412/265209 (executing program) 2021/12/19 05:57:05 fetching corpus: 5299, signal 144981/266539 (executing program) 2021/12/19 05:57:06 fetching corpus: 5349, signal 145563/267918 (executing program) 2021/12/19 05:57:06 fetching corpus: 5399, signal 146085/269225 (executing program) 2021/12/19 05:57:06 fetching corpus: 5449, signal 146732/270561 (executing program) 2021/12/19 05:57:06 fetching corpus: 5499, signal 147522/272002 (executing program) 2021/12/19 05:57:06 fetching corpus: 5549, signal 148129/273321 (executing program) 2021/12/19 05:57:06 fetching corpus: 5599, signal 148759/274666 (executing program) 2021/12/19 05:57:06 fetching corpus: 5649, signal 149605/276039 (executing program) 2021/12/19 05:57:06 fetching corpus: 5699, signal 150240/277377 (executing program) 2021/12/19 05:57:06 fetching corpus: 5749, signal 150556/278595 (executing program) 2021/12/19 05:57:06 fetching corpus: 5799, signal 150910/279786 (executing program) 2021/12/19 05:57:06 fetching corpus: 5849, signal 151498/281095 (executing program) 2021/12/19 05:57:06 fetching corpus: 5899, signal 151961/282342 (executing program) 2021/12/19 05:57:06 fetching corpus: 5949, signal 152420/283571 (executing program) 2021/12/19 05:57:06 fetching corpus: 5999, signal 152760/284733 (executing program) 2021/12/19 05:57:06 fetching corpus: 6049, signal 153438/286021 (executing program) 2021/12/19 05:57:06 fetching corpus: 6099, signal 153723/287156 (executing program) 2021/12/19 05:57:06 fetching corpus: 6149, signal 154205/288424 (executing program) 2021/12/19 05:57:06 fetching corpus: 6199, signal 154502/289626 (executing program) 2021/12/19 05:57:06 fetching corpus: 6249, signal 154887/290799 (executing program) 2021/12/19 05:57:06 fetching corpus: 6299, signal 155208/291904 (executing program) 2021/12/19 05:57:06 fetching corpus: 6349, signal 155571/293096 (executing program) 2021/12/19 05:57:06 fetching corpus: 6399, signal 156318/294386 (executing program) 2021/12/19 05:57:07 fetching corpus: 6449, signal 156647/295535 (executing program) 2021/12/19 05:57:07 fetching corpus: 6499, signal 157190/296714 (executing program) 2021/12/19 05:57:07 fetching corpus: 6549, signal 157634/297849 (executing program) 2021/12/19 05:57:07 fetching corpus: 6599, signal 158109/298975 (executing program) 2021/12/19 05:57:07 fetching corpus: 6649, signal 158530/300155 (executing program) 2021/12/19 05:57:07 fetching corpus: 6699, signal 159226/301371 (executing program) 2021/12/19 05:57:07 fetching corpus: 6749, signal 159810/302546 (executing program) 2021/12/19 05:57:07 fetching corpus: 6799, signal 160329/303690 (executing program) 2021/12/19 05:57:07 fetching corpus: 6849, signal 160871/304863 (executing program) 2021/12/19 05:57:07 fetching corpus: 6899, signal 161412/305996 (executing program) 2021/12/19 05:57:07 fetching corpus: 6949, signal 162259/307181 (executing program) 2021/12/19 05:57:07 fetching corpus: 6999, signal 163228/308345 (executing program) 2021/12/19 05:57:07 fetching corpus: 7049, signal 163621/309457 (executing program) 2021/12/19 05:57:07 fetching corpus: 7099, signal 164670/310641 (executing program) 2021/12/19 05:57:07 fetching corpus: 7149, signal 165257/311738 (executing program) 2021/12/19 05:57:07 fetching corpus: 7199, signal 165721/312859 (executing program) 2021/12/19 05:57:07 fetching corpus: 7249, signal 166072/313955 (executing program) 2021/12/19 05:57:07 fetching corpus: 7299, signal 166448/314977 (executing program) 2021/12/19 05:57:07 fetching corpus: 7349, signal 166818/316064 (executing program) 2021/12/19 05:57:07 fetching corpus: 7399, signal 167167/317130 (executing program) 2021/12/19 05:57:07 fetching corpus: 7449, signal 167460/318176 (executing program) 2021/12/19 05:57:07 fetching corpus: 7499, signal 167937/319229 (executing program) 2021/12/19 05:57:08 fetching corpus: 7549, signal 168296/320297 (executing program) 2021/12/19 05:57:08 fetching corpus: 7598, signal 168768/321339 (executing program) 2021/12/19 05:57:08 fetching corpus: 7648, signal 169355/322403 (executing program) 2021/12/19 05:57:08 fetching corpus: 7698, signal 169736/323418 (executing program) 2021/12/19 05:57:08 fetching corpus: 7748, signal 170399/324420 (executing program) 2021/12/19 05:57:08 fetching corpus: 7798, signal 170763/325460 (executing program) 2021/12/19 05:57:08 fetching corpus: 7848, signal 171188/326478 (executing program) 2021/12/19 05:57:08 fetching corpus: 7898, signal 171634/327519 (executing program) 2021/12/19 05:57:08 fetching corpus: 7948, signal 172080/328533 (executing program) 2021/12/19 05:57:08 fetching corpus: 7998, signal 172441/329542 (executing program) 2021/12/19 05:57:08 fetching corpus: 8048, signal 172735/330551 (executing program) 2021/12/19 05:57:08 fetching corpus: 8098, signal 173072/331537 (executing program) 2021/12/19 05:57:08 fetching corpus: 8148, signal 173358/332504 (executing program) 2021/12/19 05:57:08 fetching corpus: 8198, signal 174139/333496 (executing program) 2021/12/19 05:57:08 fetching corpus: 8248, signal 174586/334439 (executing program) 2021/12/19 05:57:08 fetching corpus: 8298, signal 175355/335387 (executing program) 2021/12/19 05:57:08 fetching corpus: 8348, signal 175699/336380 (executing program) 2021/12/19 05:57:08 fetching corpus: 8398, signal 175951/336732 (executing program) 2021/12/19 05:57:08 fetching corpus: 8448, signal 176304/336735 (executing program) 2021/12/19 05:57:08 fetching corpus: 8498, signal 176592/336740 (executing program) 2021/12/19 05:57:08 fetching corpus: 8548, signal 177019/336746 (executing program) 2021/12/19 05:57:08 fetching corpus: 8596, signal 177415/336746 (executing program) 2021/12/19 05:57:08 fetching corpus: 8646, signal 177836/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 8696, signal 178173/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 8746, signal 178559/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 8796, signal 178974/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 8846, signal 179313/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 8896, signal 179711/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 8946, signal 180184/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 8996, signal 180773/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 9046, signal 181156/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 9096, signal 181492/336746 (executing program) 2021/12/19 05:57:09 fetching corpus: 9146, signal 181993/336747 (executing program) 2021/12/19 05:57:09 fetching corpus: 9196, signal 182198/336747 (executing program) 2021/12/19 05:57:09 fetching corpus: 9246, signal 182477/336747 (executing program) 2021/12/19 05:57:09 fetching corpus: 9296, signal 182844/336747 (executing program) 2021/12/19 05:57:09 fetching corpus: 9346, signal 183147/336747 (executing program) 2021/12/19 05:57:09 fetching corpus: 9396, signal 183430/336747 (executing program) 2021/12/19 05:57:09 fetching corpus: 9446, signal 183769/336747 (executing program) 2021/12/19 05:57:09 fetching corpus: 9496, signal 184162/336747 (executing program) 2021/12/19 05:57:09 fetching corpus: 9546, signal 184445/336750 (executing program) 2021/12/19 05:57:09 fetching corpus: 9596, signal 185075/336753 (executing program) 2021/12/19 05:57:09 fetching corpus: 9646, signal 185355/336761 (executing program) 2021/12/19 05:57:09 fetching corpus: 9696, signal 185899/336761 (executing program) 2021/12/19 05:57:09 fetching corpus: 9746, signal 186157/336761 (executing program) 2021/12/19 05:57:09 fetching corpus: 9796, signal 186518/336761 (executing program) 2021/12/19 05:57:09 fetching corpus: 9846, signal 186787/336761 (executing program) 2021/12/19 05:57:09 fetching corpus: 9895, signal 187146/336761 (executing program) 2021/12/19 05:57:10 fetching corpus: 9945, signal 187563/336761 (executing program) 2021/12/19 05:57:10 fetching corpus: 9995, signal 188043/336761 (executing program) 2021/12/19 05:57:10 fetching corpus: 10045, signal 188391/336761 (executing program) 2021/12/19 05:57:10 fetching corpus: 10095, signal 188643/336769 (executing program) 2021/12/19 05:57:10 fetching corpus: 10145, signal 188896/336769 (executing program) 2021/12/19 05:57:10 fetching corpus: 10195, signal 189457/336769 (executing program) 2021/12/19 05:57:10 fetching corpus: 10245, signal 189909/336769 (executing program) 2021/12/19 05:57:10 fetching corpus: 10295, signal 190354/336769 (executing program) 2021/12/19 05:57:10 fetching corpus: 10345, signal 190642/336769 (executing program) 2021/12/19 05:57:10 fetching corpus: 10395, signal 190884/336769 (executing program) 2021/12/19 05:57:10 fetching corpus: 10445, signal 191373/336770 (executing program) 2021/12/19 05:57:10 fetching corpus: 10495, signal 191689/336770 (executing program) 2021/12/19 05:57:10 fetching corpus: 10545, signal 192040/336770 (executing program) 2021/12/19 05:57:10 fetching corpus: 10595, signal 192427/336771 (executing program) 2021/12/19 05:57:10 fetching corpus: 10645, signal 192725/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 10695, signal 192936/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 10745, signal 193428/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 10795, signal 193698/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 10845, signal 194150/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 10895, signal 194415/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 10945, signal 194789/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 10995, signal 195067/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 11045, signal 195348/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 11095, signal 195608/336784 (executing program) 2021/12/19 05:57:10 fetching corpus: 11145, signal 195939/336784 (executing program) 2021/12/19 05:57:11 fetching corpus: 11195, signal 196364/336784 (executing program) 2021/12/19 05:57:11 fetching corpus: 11245, signal 196651/336784 (executing program) 2021/12/19 05:57:11 fetching corpus: 11295, signal 197058/336784 (executing program) 2021/12/19 05:57:11 fetching corpus: 11345, signal 197250/336784 (executing program) 2021/12/19 05:57:11 fetching corpus: 11395, signal 197544/336784 (executing program) 2021/12/19 05:57:11 fetching corpus: 11445, signal 197825/336785 (executing program) 2021/12/19 05:57:11 fetching corpus: 11495, signal 198105/336785 (executing program) 2021/12/19 05:57:11 fetching corpus: 11545, signal 198624/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 11595, signal 198903/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 11645, signal 199151/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 11695, signal 199477/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 11745, signal 199954/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 11795, signal 200205/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 11845, signal 200428/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 11895, signal 200720/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 11945, signal 200984/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 11994, signal 201274/336788 (executing program) 2021/12/19 05:57:11 fetching corpus: 12044, signal 201552/336791 (executing program) 2021/12/19 05:57:11 fetching corpus: 12094, signal 201823/336791 (executing program) 2021/12/19 05:57:11 fetching corpus: 12144, signal 202418/336791 (executing program) 2021/12/19 05:57:11 fetching corpus: 12194, signal 202711/336791 (executing program) 2021/12/19 05:57:11 fetching corpus: 12244, signal 203072/336791 (executing program) 2021/12/19 05:57:11 fetching corpus: 12294, signal 203313/336791 (executing program) 2021/12/19 05:57:11 fetching corpus: 12344, signal 203621/336791 (executing program) 2021/12/19 05:57:11 fetching corpus: 12394, signal 203860/336791 (executing program) 2021/12/19 05:57:12 fetching corpus: 12444, signal 204151/336791 (executing program) 2021/12/19 05:57:12 fetching corpus: 12494, signal 204404/336791 (executing program) 2021/12/19 05:57:12 fetching corpus: 12544, signal 204839/336791 (executing program) 2021/12/19 05:57:12 fetching corpus: 12594, signal 205068/336791 (executing program) 2021/12/19 05:57:12 fetching corpus: 12644, signal 205432/336791 (executing program) 2021/12/19 05:57:12 fetching corpus: 12693, signal 205622/336799 (executing program) 2021/12/19 05:57:12 fetching corpus: 12743, signal 205925/336799 (executing program) 2021/12/19 05:57:12 fetching corpus: 12793, signal 206144/336799 (executing program) 2021/12/19 05:57:12 fetching corpus: 12843, signal 206387/336799 (executing program) 2021/12/19 05:57:12 fetching corpus: 12893, signal 206663/336799 (executing program) 2021/12/19 05:57:12 fetching corpus: 12943, signal 206903/336799 (executing program) 2021/12/19 05:57:12 fetching corpus: 12993, signal 207418/336803 (executing program) 2021/12/19 05:57:12 fetching corpus: 13043, signal 207857/336803 (executing program) 2021/12/19 05:57:12 fetching corpus: 13093, signal 208278/336803 (executing program) 2021/12/19 05:57:12 fetching corpus: 13143, signal 208531/336803 (executing program) 2021/12/19 05:57:12 fetching corpus: 13193, signal 208796/336803 (executing program) 2021/12/19 05:57:12 fetching corpus: 13243, signal 209053/336807 (executing program) 2021/12/19 05:57:12 fetching corpus: 13293, signal 209260/336807 (executing program) 2021/12/19 05:57:12 fetching corpus: 13343, signal 209463/336807 (executing program) 2021/12/19 05:57:12 fetching corpus: 13393, signal 209724/336807 (executing program) 2021/12/19 05:57:12 fetching corpus: 13443, signal 210214/336807 (executing program) 2021/12/19 05:57:12 fetching corpus: 13493, signal 210451/336807 (executing program) 2021/12/19 05:57:12 fetching corpus: 13543, signal 210799/336807 (executing program) 2021/12/19 05:57:12 fetching corpus: 13593, signal 211361/336807 (executing program) 2021/12/19 05:57:13 fetching corpus: 13643, signal 211607/336807 (executing program) 2021/12/19 05:57:13 fetching corpus: 13693, signal 211981/336807 (executing program) 2021/12/19 05:57:13 fetching corpus: 13743, signal 212353/336807 (executing program) 2021/12/19 05:57:13 fetching corpus: 13793, signal 212794/336815 (executing program) 2021/12/19 05:57:13 fetching corpus: 13843, signal 213174/336815 (executing program) 2021/12/19 05:57:13 fetching corpus: 13893, signal 213455/336815 (executing program) 2021/12/19 05:57:13 fetching corpus: 13943, signal 213682/336815 (executing program) 2021/12/19 05:57:13 fetching corpus: 13993, signal 213921/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14043, signal 214458/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14093, signal 214748/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14143, signal 214974/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14193, signal 215279/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14243, signal 215542/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14293, signal 215786/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14343, signal 216100/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14393, signal 216349/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14443, signal 216724/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14493, signal 216956/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14543, signal 217241/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14593, signal 217463/336817 (executing program) 2021/12/19 05:57:13 fetching corpus: 14643, signal 217851/336821 (executing program) 2021/12/19 05:57:13 fetching corpus: 14692, signal 218188/336821 (executing program) 2021/12/19 05:57:14 fetching corpus: 14742, signal 218473/336821 (executing program) 2021/12/19 05:57:14 fetching corpus: 14792, signal 218779/336821 (executing program) 2021/12/19 05:57:14 fetching corpus: 14842, signal 219060/336821 (executing program) 2021/12/19 05:57:14 fetching corpus: 14892, signal 219371/336829 (executing program) 2021/12/19 05:57:14 fetching corpus: 14941, signal 219556/336836 (executing program) 2021/12/19 05:57:14 fetching corpus: 14991, signal 219775/336836 (executing program) 2021/12/19 05:57:14 fetching corpus: 15041, signal 219974/336850 (executing program) 2021/12/19 05:57:14 fetching corpus: 15091, signal 220170/336855 (executing program) 2021/12/19 05:57:14 fetching corpus: 15141, signal 220469/336855 (executing program) 2021/12/19 05:57:14 fetching corpus: 15191, signal 220719/336855 (executing program) 2021/12/19 05:57:14 fetching corpus: 15241, signal 220973/336855 (executing program) 2021/12/19 05:57:14 fetching corpus: 15291, signal 221258/336855 (executing program) 2021/12/19 05:57:14 fetching corpus: 15341, signal 221433/336855 (executing program) 2021/12/19 05:57:14 fetching corpus: 15391, signal 221636/336855 (executing program) 2021/12/19 05:57:14 fetching corpus: 15441, signal 221924/336855 (executing program) 2021/12/19 05:57:14 fetching corpus: 15491, signal 222086/336858 (executing program) 2021/12/19 05:57:14 fetching corpus: 15541, signal 222276/336858 (executing program) 2021/12/19 05:57:14 fetching corpus: 15591, signal 222602/336865 (executing program) 2021/12/19 05:57:14 fetching corpus: 15640, signal 222857/336865 (executing program) 2021/12/19 05:57:14 fetching corpus: 15690, signal 223187/336865 (executing program) 2021/12/19 05:57:14 fetching corpus: 15740, signal 223413/336865 (executing program) 2021/12/19 05:57:14 fetching corpus: 15790, signal 223708/336865 (executing program) 2021/12/19 05:57:14 fetching corpus: 15840, signal 223903/336865 (executing program) 2021/12/19 05:57:14 fetching corpus: 15890, signal 224072/336869 (executing program) 2021/12/19 05:57:14 fetching corpus: 15940, signal 224267/336876 (executing program) 2021/12/19 05:57:14 fetching corpus: 15990, signal 224537/336876 (executing program) 2021/12/19 05:57:15 fetching corpus: 16040, signal 224828/336877 (executing program) 2021/12/19 05:57:15 fetching corpus: 16090, signal 225026/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16140, signal 225251/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16190, signal 225502/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16240, signal 225978/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16290, signal 226173/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16340, signal 226335/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16390, signal 226555/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16440, signal 226775/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16490, signal 226968/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16540, signal 227240/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16590, signal 227588/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16640, signal 227818/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16690, signal 228009/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16740, signal 228296/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16790, signal 228528/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16840, signal 228804/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16890, signal 229034/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16940, signal 229288/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 16990, signal 229467/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 17040, signal 229718/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 17090, signal 230002/336881 (executing program) 2021/12/19 05:57:15 fetching corpus: 17140, signal 230362/336883 (executing program) 2021/12/19 05:57:15 fetching corpus: 17190, signal 230572/336884 (executing program) 2021/12/19 05:57:16 fetching corpus: 17240, signal 230801/336886 (executing program) 2021/12/19 05:57:16 fetching corpus: 17290, signal 231006/336890 (executing program) 2021/12/19 05:57:16 fetching corpus: 17340, signal 231260/336890 (executing program) 2021/12/19 05:57:16 fetching corpus: 17390, signal 231391/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17440, signal 231764/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17490, signal 231936/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17540, signal 232147/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17590, signal 232391/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17640, signal 232576/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17690, signal 232856/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17740, signal 233036/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17790, signal 233224/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17840, signal 233474/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17890, signal 233753/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17940, signal 233934/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 17990, signal 234291/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 18040, signal 234571/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 18090, signal 234828/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 18140, signal 235067/336896 (executing program) 2021/12/19 05:57:16 fetching corpus: 18190, signal 235383/336906 (executing program) 2021/12/19 05:57:16 fetching corpus: 18240, signal 235571/336906 (executing program) 2021/12/19 05:57:16 fetching corpus: 18290, signal 235796/336906 (executing program) 2021/12/19 05:57:16 fetching corpus: 18340, signal 236179/336906 (executing program) 2021/12/19 05:57:16 fetching corpus: 18390, signal 236501/336906 (executing program) 2021/12/19 05:57:16 fetching corpus: 18440, signal 236727/336916 (executing program) 2021/12/19 05:57:16 fetching corpus: 18490, signal 236918/336916 (executing program) 2021/12/19 05:57:17 fetching corpus: 18540, signal 237110/336920 (executing program) 2021/12/19 05:57:17 fetching corpus: 18590, signal 237319/336920 (executing program) 2021/12/19 05:57:17 fetching corpus: 18640, signal 237552/336920 (executing program) 2021/12/19 05:57:17 fetching corpus: 18690, signal 237798/336920 (executing program) 2021/12/19 05:57:17 fetching corpus: 18740, signal 237956/336921 (executing program) 2021/12/19 05:57:17 fetching corpus: 18790, signal 238239/336921 (executing program) 2021/12/19 05:57:17 fetching corpus: 18840, signal 238467/336921 (executing program) 2021/12/19 05:57:17 fetching corpus: 18890, signal 238684/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 18940, signal 238890/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 18990, signal 239078/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19040, signal 239279/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19090, signal 239452/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19140, signal 239675/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19190, signal 239935/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19240, signal 240174/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19290, signal 240464/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19340, signal 240730/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19390, signal 240883/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19440, signal 241150/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19490, signal 241315/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19540, signal 241551/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19590, signal 241808/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19640, signal 242045/336924 (executing program) 2021/12/19 05:57:17 fetching corpus: 19690, signal 242230/336928 (executing program) 2021/12/19 05:57:17 fetching corpus: 19740, signal 242400/336937 (executing program) 2021/12/19 05:57:17 fetching corpus: 19790, signal 242672/336937 (executing program) 2021/12/19 05:57:17 fetching corpus: 19840, signal 242898/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 19890, signal 243257/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 19940, signal 243460/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 19990, signal 243782/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20040, signal 243889/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20090, signal 244063/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20140, signal 244339/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20190, signal 244589/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20240, signal 244804/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20290, signal 245083/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20340, signal 245270/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20390, signal 245401/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20440, signal 245672/336937 (executing program) 2021/12/19 05:57:18 fetching corpus: 20490, signal 245899/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20540, signal 246146/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20590, signal 246363/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20640, signal 246548/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20690, signal 246748/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20740, signal 246968/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20790, signal 247145/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20840, signal 247479/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20890, signal 247677/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20940, signal 247840/336948 (executing program) 2021/12/19 05:57:18 fetching corpus: 20990, signal 248028/336948 (executing program) 2021/12/19 05:57:19 fetching corpus: 21040, signal 248240/336948 (executing program) 2021/12/19 05:57:19 fetching corpus: 21090, signal 248414/336952 (executing program) 2021/12/19 05:57:19 fetching corpus: 21140, signal 248574/336953 (executing program) 2021/12/19 05:57:19 fetching corpus: 21190, signal 248724/336953 (executing program) 2021/12/19 05:57:19 fetching corpus: 21240, signal 248989/336953 (executing program) 2021/12/19 05:57:19 fetching corpus: 21290, signal 249202/336953 (executing program) 2021/12/19 05:57:19 fetching corpus: 21340, signal 249471/336953 (executing program) 2021/12/19 05:57:19 fetching corpus: 21390, signal 249702/336953 (executing program) 2021/12/19 05:57:19 fetching corpus: 21440, signal 249897/336953 (executing program) 2021/12/19 05:57:19 fetching corpus: 21490, signal 250129/336954 (executing program) 2021/12/19 05:57:19 fetching corpus: 21540, signal 250642/336954 (executing program) 2021/12/19 05:57:19 fetching corpus: 21590, signal 250834/336954 (executing program) 2021/12/19 05:57:19 fetching corpus: 21640, signal 251049/336955 (executing program) 2021/12/19 05:57:19 fetching corpus: 21690, signal 251344/336955 (executing program) 2021/12/19 05:57:19 fetching corpus: 21740, signal 251506/336955 (executing program) 2021/12/19 05:57:19 fetching corpus: 21790, signal 251752/336955 (executing program) 2021/12/19 05:57:19 fetching corpus: 21840, signal 251963/336955 (executing program) 2021/12/19 05:57:19 fetching corpus: 21890, signal 252209/336959 (executing program) 2021/12/19 05:57:19 fetching corpus: 21940, signal 252397/336959 (executing program) 2021/12/19 05:57:19 fetching corpus: 21990, signal 252757/336959 (executing program) 2021/12/19 05:57:19 fetching corpus: 22040, signal 252950/336959 (executing program) 2021/12/19 05:57:19 fetching corpus: 22090, signal 253113/336959 (executing program) 2021/12/19 05:57:19 fetching corpus: 22140, signal 253386/336959 (executing program) 2021/12/19 05:57:19 fetching corpus: 22190, signal 253612/336959 (executing program) 2021/12/19 05:57:19 fetching corpus: 22240, signal 253749/336959 (executing program) 2021/12/19 05:57:19 fetching corpus: 22290, signal 254119/336959 (executing program) 2021/12/19 05:57:19 fetching corpus: 22340, signal 254239/336959 (executing program) 2021/12/19 05:57:20 fetching corpus: 22390, signal 254566/336959 (executing program) 2021/12/19 05:57:20 fetching corpus: 22440, signal 254736/336959 (executing program) 2021/12/19 05:57:20 fetching corpus: 22490, signal 254928/336959 (executing program) 2021/12/19 05:57:20 fetching corpus: 22540, signal 255112/336959 (executing program) 2021/12/19 05:57:20 fetching corpus: 22590, signal 255247/336975 (executing program) 2021/12/19 05:57:20 fetching corpus: 22640, signal 255399/336975 (executing program) 2021/12/19 05:57:20 fetching corpus: 22690, signal 255539/336976 (executing program) 2021/12/19 05:57:20 fetching corpus: 22740, signal 255719/336976 (executing program) 2021/12/19 05:57:20 fetching corpus: 22790, signal 255860/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 22840, signal 256071/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 22890, signal 256252/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 22940, signal 256443/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 22990, signal 256588/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 23040, signal 256739/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 23090, signal 256894/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 23140, signal 257089/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 23190, signal 257277/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 23240, signal 257557/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 23290, signal 257745/336980 (executing program) 2021/12/19 05:57:20 fetching corpus: 23340, signal 257958/336981 (executing program) 2021/12/19 05:57:20 fetching corpus: 23390, signal 258180/336981 (executing program) 2021/12/19 05:57:20 fetching corpus: 23440, signal 258356/336981 (executing program) 2021/12/19 05:57:20 fetching corpus: 23490, signal 258524/336981 (executing program) 2021/12/19 05:57:20 fetching corpus: 23540, signal 258694/336981 (executing program) 2021/12/19 05:57:21 fetching corpus: 23590, signal 258889/336981 (executing program) 2021/12/19 05:57:21 fetching corpus: 23639, signal 259124/336981 (executing program) 2021/12/19 05:57:21 fetching corpus: 23689, signal 259275/336981 (executing program) 2021/12/19 05:57:21 fetching corpus: 23739, signal 259542/336987 (executing program) 2021/12/19 05:57:21 fetching corpus: 23789, signal 259767/337001 (executing program) 2021/12/19 05:57:21 fetching corpus: 23839, signal 259937/337001 (executing program) 2021/12/19 05:57:21 fetching corpus: 23889, signal 260085/337001 (executing program) 2021/12/19 05:57:21 fetching corpus: 23939, signal 260259/337003 (executing program) 2021/12/19 05:57:21 fetching corpus: 23989, signal 260419/337003 (executing program) 2021/12/19 05:57:21 fetching corpus: 24039, signal 260572/337003 (executing program) 2021/12/19 05:57:21 fetching corpus: 24089, signal 260792/337003 (executing program) 2021/12/19 05:57:21 fetching corpus: 24139, signal 261070/337003 (executing program) 2021/12/19 05:57:21 fetching corpus: 24189, signal 261310/337003 (executing program) 2021/12/19 05:57:21 fetching corpus: 24239, signal 261473/337009 (executing program) 2021/12/19 05:57:21 fetching corpus: 24289, signal 261645/337009 (executing program) 2021/12/19 05:57:21 fetching corpus: 24339, signal 261809/337009 (executing program) 2021/12/19 05:57:21 fetching corpus: 24389, signal 261974/337009 (executing program) 2021/12/19 05:57:21 fetching corpus: 24439, signal 262232/337009 (executing program) 2021/12/19 05:57:21 fetching corpus: 24489, signal 262442/337009 (executing program) 2021/12/19 05:57:21 fetching corpus: 24539, signal 262591/337010 (executing program) 2021/12/19 05:57:21 fetching corpus: 24589, signal 262771/337010 (executing program) 2021/12/19 05:57:21 fetching corpus: 24639, signal 262991/337010 (executing program) 2021/12/19 05:57:21 fetching corpus: 24689, signal 263178/337010 (executing program) 2021/12/19 05:57:21 fetching corpus: 24739, signal 263338/337010 (executing program) 2021/12/19 05:57:22 fetching corpus: 24789, signal 263515/337010 (executing program) 2021/12/19 05:57:22 fetching corpus: 24839, signal 263800/337022 (executing program) 2021/12/19 05:57:22 fetching corpus: 24889, signal 263992/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 24939, signal 264213/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 24989, signal 264399/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 25039, signal 264538/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 25089, signal 264774/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 25139, signal 264911/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 25189, signal 265124/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 25239, signal 265264/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 25289, signal 265476/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 25339, signal 265693/337024 (executing program) 2021/12/19 05:57:22 fetching corpus: 25389, signal 265936/337025 (executing program) 2021/12/19 05:57:22 fetching corpus: 25439, signal 266099/337025 (executing program) 2021/12/19 05:57:22 fetching corpus: 25489, signal 266259/337025 (executing program) 2021/12/19 05:57:22 fetching corpus: 25539, signal 266433/337025 (executing program) 2021/12/19 05:57:22 fetching corpus: 25589, signal 266622/337025 (executing program) 2021/12/19 05:57:22 fetching corpus: 25639, signal 266807/337025 (executing program) 2021/12/19 05:57:22 fetching corpus: 25689, signal 267111/337025 (executing program) 2021/12/19 05:57:22 fetching corpus: 25739, signal 267828/337030 (executing program) 2021/12/19 05:57:22 fetching corpus: 25789, signal 268039/337030 (executing program) 2021/12/19 05:57:22 fetching corpus: 25839, signal 268194/337030 (executing program) 2021/12/19 05:57:22 fetching corpus: 25889, signal 268465/337030 (executing program) 2021/12/19 05:57:23 fetching corpus: 25939, signal 268606/337030 (executing program) 2021/12/19 05:57:23 fetching corpus: 25989, signal 268829/337030 (executing program) 2021/12/19 05:57:23 fetching corpus: 26039, signal 268966/337032 (executing program) 2021/12/19 05:57:23 fetching corpus: 26089, signal 269121/337033 (executing program) 2021/12/19 05:57:23 fetching corpus: 26139, signal 269343/337033 (executing program) 2021/12/19 05:57:23 fetching corpus: 26189, signal 269508/337033 (executing program) 2021/12/19 05:57:23 fetching corpus: 26239, signal 269774/337036 (executing program) 2021/12/19 05:57:23 fetching corpus: 26289, signal 269956/337053 (executing program) 2021/12/19 05:57:23 fetching corpus: 26339, signal 270114/337053 (executing program) 2021/12/19 05:57:23 fetching corpus: 26389, signal 270297/337053 (executing program) 2021/12/19 05:57:23 fetching corpus: 26438, signal 270415/337053 (executing program) 2021/12/19 05:57:23 fetching corpus: 26488, signal 270588/337053 (executing program) 2021/12/19 05:57:23 fetching corpus: 26538, signal 270736/337053 (executing program) 2021/12/19 05:57:23 fetching corpus: 26588, signal 270904/337055 (executing program) 2021/12/19 05:57:23 fetching corpus: 26638, signal 271350/337055 (executing program) 2021/12/19 05:57:23 fetching corpus: 26688, signal 271534/337055 (executing program) 2021/12/19 05:57:23 fetching corpus: 26738, signal 271705/337061 (executing program) 2021/12/19 05:57:23 fetching corpus: 26787, signal 271873/337061 (executing program) 2021/12/19 05:57:23 fetching corpus: 26837, signal 272063/337061 (executing program) 2021/12/19 05:57:23 fetching corpus: 26887, signal 272220/337062 (executing program) 2021/12/19 05:57:23 fetching corpus: 26937, signal 272363/337062 (executing program) 2021/12/19 05:57:23 fetching corpus: 26987, signal 272565/337073 (executing program) 2021/12/19 05:57:23 fetching corpus: 27037, signal 272732/337073 (executing program) 2021/12/19 05:57:24 fetching corpus: 27087, signal 272989/337076 (executing program) 2021/12/19 05:57:24 fetching corpus: 27137, signal 273163/337076 (executing program) 2021/12/19 05:57:24 fetching corpus: 27187, signal 273362/337076 (executing program) 2021/12/19 05:57:24 fetching corpus: 27237, signal 273625/337088 (executing program) 2021/12/19 05:57:24 fetching corpus: 27287, signal 273768/337088 (executing program) 2021/12/19 05:57:24 fetching corpus: 27337, signal 273915/337088 (executing program) 2021/12/19 05:57:24 fetching corpus: 27387, signal 274077/337089 (executing program) 2021/12/19 05:57:24 fetching corpus: 27437, signal 274248/337092 (executing program) 2021/12/19 05:57:24 fetching corpus: 27487, signal 274374/337092 (executing program) 2021/12/19 05:57:24 fetching corpus: 27537, signal 274499/337092 (executing program) 2021/12/19 05:57:24 fetching corpus: 27587, signal 274649/337092 (executing program) 2021/12/19 05:57:24 fetching corpus: 27637, signal 274802/337093 (executing program) 2021/12/19 05:57:24 fetching corpus: 27686, signal 274940/337099 (executing program) 2021/12/19 05:57:24 fetching corpus: 27736, signal 275125/337099 (executing program) 2021/12/19 05:57:24 fetching corpus: 27786, signal 275460/337099 (executing program) 2021/12/19 05:57:24 fetching corpus: 27836, signal 275583/337100 (executing program) 2021/12/19 05:57:24 fetching corpus: 27886, signal 275720/337100 (executing program) 2021/12/19 05:57:24 fetching corpus: 27936, signal 275885/337100 (executing program) 2021/12/19 05:57:24 fetching corpus: 27986, signal 276031/337100 (executing program) 2021/12/19 05:57:24 fetching corpus: 28036, signal 276164/337100 (executing program) 2021/12/19 05:57:24 fetching corpus: 28086, signal 276346/337100 (executing program) 2021/12/19 05:57:24 fetching corpus: 28136, signal 276482/337100 (executing program) 2021/12/19 05:57:24 fetching corpus: 28186, signal 276664/337103 (executing program) 2021/12/19 05:57:24 fetching corpus: 28236, signal 276914/337103 (executing program) 2021/12/19 05:57:24 fetching corpus: 28286, signal 277059/337108 (executing program) 2021/12/19 05:57:25 fetching corpus: 28336, signal 277253/337108 (executing program) 2021/12/19 05:57:25 fetching corpus: 28386, signal 277437/337108 (executing program) 2021/12/19 05:57:25 fetching corpus: 28436, signal 277570/337114 (executing program) 2021/12/19 05:57:25 fetching corpus: 28486, signal 277696/337114 (executing program) 2021/12/19 05:57:25 fetching corpus: 28536, signal 277789/337114 (executing program) 2021/12/19 05:57:25 fetching corpus: 28586, signal 277932/337115 (executing program) 2021/12/19 05:57:25 fetching corpus: 28636, signal 278139/337134 (executing program) 2021/12/19 05:57:25 fetching corpus: 28686, signal 278287/337134 (executing program) 2021/12/19 05:57:25 fetching corpus: 28736, signal 278435/337138 (executing program) 2021/12/19 05:57:25 fetching corpus: 28786, signal 278659/337138 (executing program) 2021/12/19 05:57:25 fetching corpus: 28835, signal 278853/337138 (executing program) 2021/12/19 05:57:25 fetching corpus: 28885, signal 278998/337138 (executing program) 2021/12/19 05:57:25 fetching corpus: 28935, signal 279150/337138 (executing program) 2021/12/19 05:57:25 fetching corpus: 28985, signal 279377/337138 (executing program) 2021/12/19 05:57:25 fetching corpus: 29035, signal 279581/337139 (executing program) 2021/12/19 05:57:25 fetching corpus: 29085, signal 279739/337141 (executing program) 2021/12/19 05:57:25 fetching corpus: 29135, signal 279893/337144 (executing program) 2021/12/19 05:57:25 fetching corpus: 29185, signal 280029/337144 (executing program) 2021/12/19 05:57:25 fetching corpus: 29235, signal 280193/337144 (executing program) 2021/12/19 05:57:25 fetching corpus: 29285, signal 280348/337144 (executing program) 2021/12/19 05:57:25 fetching corpus: 29335, signal 280451/337144 (executing program) 2021/12/19 05:57:25 fetching corpus: 29385, signal 280620/337144 (executing program) 2021/12/19 05:57:25 fetching corpus: 29435, signal 280766/337144 (executing program) 2021/12/19 05:57:25 fetching corpus: 29485, signal 280902/337144 (executing program) 2021/12/19 05:57:25 fetching corpus: 29535, signal 281041/337153 (executing program) 2021/12/19 05:57:25 fetching corpus: 29585, signal 281234/337153 (executing program) 2021/12/19 05:57:26 fetching corpus: 29635, signal 281385/337153 (executing program) 2021/12/19 05:57:26 fetching corpus: 29685, signal 281564/337153 (executing program) 2021/12/19 05:57:26 fetching corpus: 29735, signal 281870/337153 (executing program) 2021/12/19 05:57:26 fetching corpus: 29785, signal 282017/337153 (executing program) 2021/12/19 05:57:26 fetching corpus: 29835, signal 282237/337153 (executing program) 2021/12/19 05:57:26 fetching corpus: 29885, signal 282379/337154 (executing program) 2021/12/19 05:57:26 fetching corpus: 29935, signal 282499/337158 (executing program) 2021/12/19 05:57:26 fetching corpus: 29985, signal 282639/337166 (executing program) 2021/12/19 05:57:26 fetching corpus: 30035, signal 282749/337166 (executing program) 2021/12/19 05:57:26 fetching corpus: 30085, signal 282972/337166 (executing program) 2021/12/19 05:57:26 fetching corpus: 30135, signal 283121/337166 (executing program) 2021/12/19 05:57:26 fetching corpus: 30185, signal 283248/337166 (executing program) 2021/12/19 05:57:26 fetching corpus: 30235, signal 283409/337168 (executing program) 2021/12/19 05:57:26 fetching corpus: 30285, signal 283579/337168 (executing program) 2021/12/19 05:57:26 fetching corpus: 30335, signal 283810/337168 (executing program) 2021/12/19 05:57:26 fetching corpus: 30385, signal 284014/337168 (executing program) 2021/12/19 05:57:26 fetching corpus: 30435, signal 284181/337168 (executing program) 2021/12/19 05:57:26 fetching corpus: 30485, signal 284353/337168 (executing program) 2021/12/19 05:57:26 fetching corpus: 30535, signal 284535/337168 (executing program) 2021/12/19 05:57:26 fetching corpus: 30585, signal 284752/337168 (executing program) 2021/12/19 05:57:26 fetching corpus: 30635, signal 284940/337174 (executing program) 2021/12/19 05:57:26 fetching corpus: 30685, signal 285062/337174 (executing program) 2021/12/19 05:57:26 fetching corpus: 30735, signal 285187/337174 (executing program) 2021/12/19 05:57:26 fetching corpus: 30785, signal 285499/337174 (executing program) 2021/12/19 05:57:27 fetching corpus: 30835, signal 285692/337174 (executing program) 2021/12/19 05:57:27 fetching corpus: 30885, signal 285830/337174 (executing program) 2021/12/19 05:57:27 fetching corpus: 30935, signal 285986/337174 (executing program) 2021/12/19 05:57:27 fetching corpus: 30985, signal 286204/337174 (executing program) 2021/12/19 05:57:27 fetching corpus: 31035, signal 286360/337175 (executing program) 2021/12/19 05:57:27 fetching corpus: 31085, signal 286550/337175 (executing program) 2021/12/19 05:57:27 fetching corpus: 31135, signal 286693/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31184, signal 286848/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31234, signal 286970/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31284, signal 287204/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31334, signal 287408/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31384, signal 287577/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31434, signal 287714/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31484, signal 287871/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31534, signal 288011/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31584, signal 288234/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31634, signal 288409/337177 (executing program) 2021/12/19 05:57:27 fetching corpus: 31684, signal 288545/337181 (executing program) 2021/12/19 05:57:27 fetching corpus: 31734, signal 288756/337181 (executing program) 2021/12/19 05:57:27 fetching corpus: 31784, signal 288917/337181 (executing program) 2021/12/19 05:57:27 fetching corpus: 31834, signal 289042/337181 (executing program) 2021/12/19 05:57:27 fetching corpus: 31884, signal 289243/337181 (executing program) 2021/12/19 05:57:27 fetching corpus: 31934, signal 289535/337181 (executing program) 2021/12/19 05:57:27 fetching corpus: 31984, signal 289696/337181 (executing program) 2021/12/19 05:57:27 fetching corpus: 32034, signal 290010/337181 (executing program) 2021/12/19 05:57:28 fetching corpus: 32084, signal 290156/337183 (executing program) 2021/12/19 05:57:28 fetching corpus: 32134, signal 290303/337184 (executing program) 2021/12/19 05:57:28 fetching corpus: 32183, signal 290446/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32233, signal 290621/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32283, signal 290778/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32333, signal 290902/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32383, signal 291034/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32433, signal 291210/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32483, signal 291372/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32533, signal 291518/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32583, signal 291679/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32633, signal 291836/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32683, signal 292006/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32733, signal 292133/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32783, signal 292358/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32833, signal 292499/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32883, signal 292630/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32932, signal 292743/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 32981, signal 292882/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 33030, signal 292999/337188 (executing program) 2021/12/19 05:57:28 fetching corpus: 33079, signal 293150/337188 (executing program) 2021/12/19 05:57:29 fetching corpus: 33129, signal 293280/337188 (executing program) 2021/12/19 05:57:29 fetching corpus: 33179, signal 293407/337188 (executing program) 2021/12/19 05:57:29 fetching corpus: 33229, signal 293533/337188 (executing program) 2021/12/19 05:57:29 fetching corpus: 33279, signal 293692/337188 (executing program) 2021/12/19 05:57:29 fetching corpus: 33329, signal 293841/337188 (executing program) 2021/12/19 05:57:29 fetching corpus: 33379, signal 293970/337189 (executing program) 2021/12/19 05:57:29 fetching corpus: 33429, signal 294128/337189 (executing program) 2021/12/19 05:57:29 fetching corpus: 33479, signal 294273/337189 (executing program) 2021/12/19 05:57:29 fetching corpus: 33529, signal 294427/337191 (executing program) 2021/12/19 05:57:29 fetching corpus: 33579, signal 294608/337191 (executing program) 2021/12/19 05:57:29 fetching corpus: 33629, signal 294743/337191 (executing program) 2021/12/19 05:57:29 fetching corpus: 33679, signal 294874/337197 (executing program) 2021/12/19 05:57:29 fetching corpus: 33729, signal 295008/337197 (executing program) 2021/12/19 05:57:29 fetching corpus: 33779, signal 295184/337197 (executing program) 2021/12/19 05:57:29 fetching corpus: 33829, signal 295323/337197 (executing program) 2021/12/19 05:57:29 fetching corpus: 33879, signal 295470/337197 (executing program) 2021/12/19 05:57:29 fetching corpus: 33929, signal 295674/337197 (executing program) 2021/12/19 05:57:29 fetching corpus: 33979, signal 295852/337197 (executing program) 2021/12/19 05:57:29 fetching corpus: 34029, signal 296057/337197 (executing program) 2021/12/19 05:57:29 fetching corpus: 34079, signal 296235/337197 (executing program) 2021/12/19 05:57:29 fetching corpus: 34129, signal 296387/337201 (executing program) 2021/12/19 05:57:29 fetching corpus: 34179, signal 296541/337201 (executing program) 2021/12/19 05:57:29 fetching corpus: 34229, signal 296721/337201 (executing program) 2021/12/19 05:57:29 fetching corpus: 34279, signal 296902/337208 (executing program) 2021/12/19 05:57:29 fetching corpus: 34329, signal 297134/337208 (executing program) 2021/12/19 05:57:29 fetching corpus: 34379, signal 297277/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34429, signal 297404/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34479, signal 297545/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34529, signal 297671/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34579, signal 297806/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34629, signal 297935/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34679, signal 298180/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34729, signal 298385/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34779, signal 298491/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34829, signal 298621/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34879, signal 298741/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34929, signal 298882/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 34979, signal 299010/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35029, signal 299137/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35079, signal 299246/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35129, signal 299372/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35179, signal 299624/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35229, signal 299818/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35279, signal 299948/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35329, signal 300103/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35379, signal 300253/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35429, signal 300413/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35479, signal 300539/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35529, signal 300669/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35579, signal 300866/337208 (executing program) 2021/12/19 05:57:30 fetching corpus: 35629, signal 301127/337208 (executing program) 2021/12/19 05:57:31 fetching corpus: 35679, signal 301241/337208 (executing program) 2021/12/19 05:57:31 fetching corpus: 35729, signal 301407/337208 (executing program) 2021/12/19 05:57:31 fetching corpus: 35779, signal 301545/337217 (executing program) 2021/12/19 05:57:31 fetching corpus: 35829, signal 301685/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 35879, signal 301904/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 35929, signal 302122/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 35979, signal 302297/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36029, signal 302460/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36079, signal 302579/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36129, signal 302832/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36179, signal 302998/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36229, signal 303114/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36279, signal 303240/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36329, signal 303441/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36379, signal 303594/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36429, signal 303758/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36479, signal 303872/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36529, signal 304094/337222 (executing program) 2021/12/19 05:57:31 fetching corpus: 36579, signal 304209/337223 (executing program) 2021/12/19 05:57:31 fetching corpus: 36629, signal 304311/337223 (executing program) 2021/12/19 05:57:31 fetching corpus: 36679, signal 304499/337226 (executing program) 2021/12/19 05:57:31 fetching corpus: 36729, signal 304627/337226 (executing program) 2021/12/19 05:57:31 fetching corpus: 36779, signal 304754/337226 (executing program) 2021/12/19 05:57:32 fetching corpus: 36829, signal 304878/337226 (executing program) 2021/12/19 05:57:32 fetching corpus: 36879, signal 305090/337226 (executing program) 2021/12/19 05:57:32 fetching corpus: 36929, signal 305223/337226 (executing program) 2021/12/19 05:57:32 fetching corpus: 36979, signal 305425/337226 (executing program) 2021/12/19 05:57:32 fetching corpus: 37029, signal 305530/337230 (executing program) 2021/12/19 05:57:32 fetching corpus: 37079, signal 305645/337230 (executing program) 2021/12/19 05:57:32 fetching corpus: 37129, signal 305877/337230 (executing program) 2021/12/19 05:57:32 fetching corpus: 37179, signal 306019/337230 (executing program) 2021/12/19 05:57:32 fetching corpus: 37229, signal 306118/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37279, signal 306280/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37329, signal 306403/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37379, signal 306508/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37429, signal 306672/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37479, signal 306901/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37529, signal 307077/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37579, signal 307183/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37629, signal 307350/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37679, signal 307469/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37729, signal 307595/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37779, signal 307698/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37829, signal 307884/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37879, signal 308054/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37929, signal 308157/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 37979, signal 308286/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 38029, signal 308404/337243 (executing program) 2021/12/19 05:57:32 fetching corpus: 38079, signal 308552/337243 (executing program) 2021/12/19 05:57:33 fetching corpus: 38129, signal 308676/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38179, signal 308807/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38229, signal 308935/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38279, signal 309150/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38329, signal 309302/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38379, signal 309447/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38429, signal 309586/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38479, signal 309781/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38529, signal 309901/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38579, signal 310079/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38629, signal 310283/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38679, signal 310426/337249 (executing program) 2021/12/19 05:57:33 fetching corpus: 38729, signal 310573/337250 (executing program) 2021/12/19 05:57:33 fetching corpus: 38779, signal 310717/337250 (executing program) 2021/12/19 05:57:33 fetching corpus: 38829, signal 310825/337250 (executing program) 2021/12/19 05:57:33 fetching corpus: 38879, signal 310968/337250 (executing program) 2021/12/19 05:57:33 fetching corpus: 38929, signal 311130/337250 (executing program) 2021/12/19 05:57:33 fetching corpus: 38979, signal 311299/337250 (executing program) 2021/12/19 05:57:33 fetching corpus: 39029, signal 311409/337250 (executing program) 2021/12/19 05:57:33 fetching corpus: 39079, signal 311546/337250 (executing program) 2021/12/19 05:57:33 fetching corpus: 39129, signal 311717/337250 (executing program) 2021/12/19 05:57:33 fetching corpus: 39179, signal 311833/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39229, signal 312034/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39279, signal 312170/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39329, signal 312325/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39379, signal 312436/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39429, signal 312579/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39479, signal 312711/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39529, signal 312842/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39579, signal 313007/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39629, signal 313181/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39679, signal 313341/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39729, signal 313483/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39779, signal 313593/337250 (executing program) 2021/12/19 05:57:34 fetching corpus: 39829, signal 313772/337257 (executing program) 2021/12/19 05:57:34 fetching corpus: 39879, signal 313945/337257 (executing program) 2021/12/19 05:57:34 fetching corpus: 39928, signal 314067/337257 (executing program) 2021/12/19 05:57:34 fetching corpus: 39978, signal 314181/337257 (executing program) 2021/12/19 05:57:34 fetching corpus: 40028, signal 314353/337257 (executing program) 2021/12/19 05:57:34 fetching corpus: 40078, signal 314495/337257 (executing program) 2021/12/19 05:57:34 fetching corpus: 40128, signal 314625/337257 (executing program) 2021/12/19 05:57:34 fetching corpus: 40178, signal 314815/337257 (executing program) 2021/12/19 05:57:34 fetching corpus: 40228, signal 314932/337257 (executing program) 2021/12/19 05:57:34 fetching corpus: 40278, signal 315045/337257 (executing program) 2021/12/19 05:57:35 fetching corpus: 40328, signal 315158/337257 (executing program) 2021/12/19 05:57:35 fetching corpus: 40378, signal 315320/337257 (executing program) 2021/12/19 05:57:35 fetching corpus: 40428, signal 315449/337257 (executing program) 2021/12/19 05:57:35 fetching corpus: 40478, signal 315605/337257 (executing program) 2021/12/19 05:57:35 fetching corpus: 40528, signal 315752/337257 (executing program) 2021/12/19 05:57:35 fetching corpus: 40578, signal 315863/337259 (executing program) 2021/12/19 05:57:35 fetching corpus: 40628, signal 316004/337259 (executing program) 2021/12/19 05:57:35 fetching corpus: 40678, signal 316110/337267 (executing program) 2021/12/19 05:57:35 fetching corpus: 40728, signal 316231/337267 (executing program) 2021/12/19 05:57:35 fetching corpus: 40778, signal 316368/337267 (executing program) 2021/12/19 05:57:35 fetching corpus: 40828, signal 316487/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 40878, signal 316603/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 40928, signal 316721/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 40978, signal 316842/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41028, signal 316977/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41078, signal 317063/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41128, signal 317227/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41178, signal 317350/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41228, signal 317466/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41278, signal 317567/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41328, signal 317682/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41378, signal 317844/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41428, signal 318036/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41478, signal 318200/337268 (executing program) 2021/12/19 05:57:35 fetching corpus: 41528, signal 318311/337268 (executing program) 2021/12/19 05:57:36 fetching corpus: 41578, signal 318409/337268 (executing program) 2021/12/19 05:57:36 fetching corpus: 41628, signal 318532/337268 (executing program) 2021/12/19 05:57:36 fetching corpus: 41678, signal 318675/337268 (executing program) 2021/12/19 05:57:36 fetching corpus: 41728, signal 318841/337270 (executing program) 2021/12/19 05:57:36 fetching corpus: 41778, signal 319002/337270 (executing program) 2021/12/19 05:57:36 fetching corpus: 41828, signal 319097/337270 (executing program) 2021/12/19 05:57:36 fetching corpus: 41878, signal 319244/337270 (executing program) 2021/12/19 05:57:36 fetching corpus: 41928, signal 319355/337270 (executing program) 2021/12/19 05:57:36 fetching corpus: 41978, signal 319464/337274 (executing program) 2021/12/19 05:57:36 fetching corpus: 42028, signal 319645/337274 (executing program) 2021/12/19 05:57:36 fetching corpus: 42078, signal 319792/337274 (executing program) 2021/12/19 05:57:36 fetching corpus: 42128, signal 319895/337274 (executing program) 2021/12/19 05:57:36 fetching corpus: 42178, signal 320030/337274 (executing program) 2021/12/19 05:57:36 fetching corpus: 42228, signal 320209/337274 (executing program) 2021/12/19 05:57:36 fetching corpus: 42278, signal 320366/337274 (executing program) 2021/12/19 05:57:36 fetching corpus: 42328, signal 320502/337274 (executing program) 2021/12/19 05:57:36 fetching corpus: 42378, signal 320633/337274 (executing program) 2021/12/19 05:57:36 fetching corpus: 42428, signal 320775/337275 (executing program) 2021/12/19 05:57:36 fetching corpus: 42478, signal 320962/337275 (executing program) 2021/12/19 05:57:36 fetching corpus: 42528, signal 321078/337275 (executing program) 2021/12/19 05:57:36 fetching corpus: 42578, signal 321211/337275 (executing program) 2021/12/19 05:57:36 fetching corpus: 42628, signal 321331/337275 (executing program) 2021/12/19 05:57:36 fetching corpus: 42678, signal 321486/337275 (executing program) 2021/12/19 05:57:37 fetching corpus: 42728, signal 321626/337275 (executing program) 2021/12/19 05:57:37 fetching corpus: 42778, signal 321739/337275 (executing program) 2021/12/19 05:57:37 fetching corpus: 42828, signal 321924/337275 (executing program) 2021/12/19 05:57:37 fetching corpus: 42878, signal 322050/337283 (executing program) 2021/12/19 05:57:37 fetching corpus: 42928, signal 322147/337283 (executing program) 2021/12/19 05:57:37 fetching corpus: 42978, signal 322284/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43028, signal 322410/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43078, signal 322564/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43128, signal 322683/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43178, signal 322835/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43228, signal 322969/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43278, signal 323058/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43328, signal 323153/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43378, signal 323285/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43428, signal 323426/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43478, signal 323684/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43528, signal 323790/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43578, signal 323875/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43628, signal 323965/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43678, signal 324129/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43728, signal 324282/337286 (executing program) 2021/12/19 05:57:37 fetching corpus: 43778, signal 324387/337286 (executing program) 2021/12/19 05:57:38 fetching corpus: 43828, signal 324517/337288 (executing program) 2021/12/19 05:57:38 fetching corpus: 43878, signal 324635/337288 (executing program) 2021/12/19 05:57:38 fetching corpus: 43928, signal 324748/337288 (executing program) 2021/12/19 05:57:38 fetching corpus: 43978, signal 324895/337309 (executing program) 2021/12/19 05:57:38 fetching corpus: 44028, signal 325000/337309 (executing program) 2021/12/19 05:57:38 fetching corpus: 44078, signal 325107/337309 (executing program) 2021/12/19 05:57:38 fetching corpus: 44128, signal 325303/337310 (executing program) 2021/12/19 05:57:38 fetching corpus: 44178, signal 325424/337313 (executing program) 2021/12/19 05:57:38 fetching corpus: 44228, signal 325567/337313 (executing program) 2021/12/19 05:57:38 fetching corpus: 44278, signal 325664/337313 (executing program) 2021/12/19 05:57:38 fetching corpus: 44328, signal 325790/337313 (executing program) 2021/12/19 05:57:38 fetching corpus: 44378, signal 325905/337313 (executing program) 2021/12/19 05:57:38 fetching corpus: 44428, signal 326002/337313 (executing program) 2021/12/19 05:57:38 fetching corpus: 44478, signal 326151/337313 (executing program) 2021/12/19 05:57:38 fetching corpus: 44528, signal 326266/337314 (executing program) 2021/12/19 05:57:38 fetching corpus: 44578, signal 326375/337314 (executing program) 2021/12/19 05:57:38 fetching corpus: 44628, signal 326586/337314 (executing program) 2021/12/19 05:57:38 fetching corpus: 44678, signal 326801/337314 (executing program) 2021/12/19 05:57:38 fetching corpus: 44728, signal 326933/337314 (executing program) 2021/12/19 05:57:38 fetching corpus: 44778, signal 327043/337314 (executing program) 2021/12/19 05:57:38 fetching corpus: 44828, signal 327169/337314 (executing program) 2021/12/19 05:57:38 fetching corpus: 44878, signal 327302/337315 (executing program) 2021/12/19 05:57:38 fetching corpus: 44928, signal 327463/337315 (executing program) 2021/12/19 05:57:38 fetching corpus: 44978, signal 327573/337315 (executing program) 2021/12/19 05:57:38 fetching corpus: 45028, signal 327677/337315 (executing program) 2021/12/19 05:57:39 fetching corpus: 45077, signal 327810/337315 (executing program) 2021/12/19 05:57:39 fetching corpus: 45127, signal 327947/337315 (executing program) 2021/12/19 05:57:39 fetching corpus: 45177, signal 328117/337315 (executing program) 2021/12/19 05:57:39 fetching corpus: 45227, signal 328249/337315 (executing program) 2021/12/19 05:57:39 fetching corpus: 45277, signal 328366/337315 (executing program) 2021/12/19 05:57:39 fetching corpus: 45327, signal 328497/337319 (executing program) 2021/12/19 05:57:39 fetching corpus: 45377, signal 328617/337327 (executing program) 2021/12/19 05:57:39 fetching corpus: 45427, signal 328795/337327 (executing program) 2021/12/19 05:57:39 fetching corpus: 45477, signal 328949/337333 (executing program) 2021/12/19 05:57:39 fetching corpus: 45527, signal 329102/337333 (executing program) 2021/12/19 05:57:39 fetching corpus: 45577, signal 329203/337333 (executing program) 2021/12/19 05:57:39 fetching corpus: 45627, signal 329289/337333 (executing program) 2021/12/19 05:57:39 fetching corpus: 45677, signal 329381/337333 (executing program) 2021/12/19 05:57:39 fetching corpus: 45727, signal 329490/337333 (executing program) 2021/12/19 05:57:39 fetching corpus: 45777, signal 329598/337333 (executing program) 2021/12/19 05:57:39 fetching corpus: 45827, signal 329770/337333 (executing program) 2021/12/19 05:57:39 fetching corpus: 45877, signal 329876/337335 (executing program) 2021/12/19 05:57:39 fetching corpus: 45927, signal 330009/337344 (executing program) 2021/12/19 05:57:39 fetching corpus: 45977, signal 330144/337344 (executing program) 2021/12/19 05:57:39 fetching corpus: 46027, signal 330242/337344 (executing program) 2021/12/19 05:57:39 fetching corpus: 46077, signal 330357/337344 (executing program) 2021/12/19 05:57:39 fetching corpus: 46127, signal 330466/337344 (executing program) 2021/12/19 05:57:39 fetching corpus: 46177, signal 330596/337344 (executing program) 2021/12/19 05:57:39 fetching corpus: 46227, signal 330703/337344 (executing program) 2021/12/19 05:57:39 fetching corpus: 46277, signal 330791/337344 (executing program) 2021/12/19 05:57:39 fetching corpus: 46327, signal 330912/337344 (executing program) 2021/12/19 05:57:39 fetching corpus: 46377, signal 331024/337344 (executing program) 2021/12/19 05:57:40 fetching corpus: 46427, signal 331145/337344 (executing program) 2021/12/19 05:57:40 fetching corpus: 46477, signal 331240/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46527, signal 331341/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46577, signal 331477/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46627, signal 331574/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46677, signal 331728/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46727, signal 331865/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46777, signal 332008/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46827, signal 332114/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46877, signal 332313/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46927, signal 332397/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 46977, signal 332491/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 47027, signal 332628/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 47077, signal 332791/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 47127, signal 332923/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 47177, signal 333022/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 47227, signal 333142/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 47277, signal 333281/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 47327, signal 333401/337351 (executing program) 2021/12/19 05:57:40 fetching corpus: 47377, signal 333527/337351 (executing program) 2021/12/19 05:57:41 fetching corpus: 47427, signal 333687/337351 (executing program) 2021/12/19 05:57:41 fetching corpus: 47477, signal 333810/337351 (executing program) 2021/12/19 05:57:41 fetching corpus: 47527, signal 333920/337351 (executing program) 2021/12/19 05:57:41 fetching corpus: 47577, signal 334060/337351 (executing program) 2021/12/19 05:57:41 fetching corpus: 47627, signal 334183/337351 (executing program) 2021/12/19 05:57:41 fetching corpus: 47677, signal 334312/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 47727, signal 334452/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 47777, signal 334589/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 47827, signal 334686/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 47877, signal 334807/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 47927, signal 334920/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 47977, signal 335014/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 48027, signal 335175/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 48077, signal 335324/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 48127, signal 335430/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 48132, signal 335438/337358 (executing program) 2021/12/19 05:57:41 fetching corpus: 48132, signal 335438/337358 (executing program) 2021/12/19 05:57:43 starting 6 fuzzer processes 05:57:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000a00)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x30}}, 0x0) 05:57:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1}, {0x20}, {0x6, 0x0, 0x0, 0x7fff7ffa}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 05:57:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0xfe}}, 0x1c}}, 0x0) 05:57:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8, 0x15}, @IFLA_BR_VLAN_DEFAULT_PVID={0x6}]}}}]}, 0x44}}, 0x0) 05:57:43 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCXONC(r0, 0x80285442, 0x0) 05:57:43 executing program 4: r0 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) [ 68.914105][ T24] audit: type=1400 audit(1639893463.324:82): avc: denied { execmem } for pid=1818 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 68.987102][ T24] audit: type=1400 audit(1639893463.394:83): avc: denied { read } for pid=1822 comm="syz-executor.2" dev="nsfs" ino=4026531992 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.024317][ T24] audit: type=1400 audit(1639893463.424:84): avc: denied { open } for pid=1822 comm="syz-executor.2" path="net:[4026531992]" dev="nsfs" ino=4026531992 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.047812][ T24] audit: type=1400 audit(1639893463.424:85): avc: denied { mounton } for pid=1822 comm="syz-executor.2" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 69.069284][ T24] audit: type=1400 audit(1639893463.424:86): avc: denied { module_request } for pid=1822 comm="syz-executor.2" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 69.091131][ T24] audit: type=1400 audit(1639893463.424:87): avc: denied { sys_module } for pid=1822 comm="syz-executor.2" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 69.365499][ T1827] chnl_net:caif_netlink_parms(): no params data found [ 69.403730][ T1828] chnl_net:caif_netlink_parms(): no params data found [ 69.434775][ T1822] chnl_net:caif_netlink_parms(): no params data found [ 69.478055][ T1829] chnl_net:caif_netlink_parms(): no params data found [ 69.529612][ T1830] chnl_net:caif_netlink_parms(): no params data found [ 69.550889][ T1827] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.557963][ T1827] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.565565][ T1827] device bridge_slave_0 entered promiscuous mode [ 69.590763][ T1827] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.597847][ T1827] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.605304][ T1827] device bridge_slave_1 entered promiscuous mode [ 69.623486][ T1828] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.630552][ T1828] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.638253][ T1828] device bridge_slave_0 entered promiscuous mode [ 69.655850][ T1822] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.662926][ T1822] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.670433][ T1822] device bridge_slave_0 entered promiscuous mode [ 69.684674][ T1828] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.691730][ T1828] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.699129][ T1828] device bridge_slave_1 entered promiscuous mode [ 69.712011][ T1827] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.721233][ T1822] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.728262][ T1822] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.735738][ T1822] device bridge_slave_1 entered promiscuous mode [ 69.746011][ T1829] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.753055][ T1829] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.760526][ T1829] device bridge_slave_0 entered promiscuous mode [ 69.773953][ T1856] chnl_net:caif_netlink_parms(): no params data found [ 69.783149][ T1827] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.796671][ T1822] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.805769][ T1829] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.812796][ T1829] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.820203][ T1829] device bridge_slave_1 entered promiscuous mode [ 69.835259][ T1828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.848443][ T1822] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.869179][ T1828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.903108][ T1828] team0: Port device team_slave_0 added [ 69.909317][ T1827] team0: Port device team_slave_0 added [ 69.919434][ T1829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.928607][ T1830] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.935622][ T1830] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.943223][ T1830] device bridge_slave_0 entered promiscuous mode [ 69.953565][ T1828] team0: Port device team_slave_1 added [ 69.960067][ T1827] team0: Port device team_slave_1 added [ 69.966173][ T1822] team0: Port device team_slave_0 added [ 69.972628][ T1829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.981695][ T1830] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.988762][ T1830] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.996116][ T1830] device bridge_slave_1 entered promiscuous mode [ 70.014839][ T1822] team0: Port device team_slave_1 added [ 70.038990][ T1827] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.045951][ T1827] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.071897][ T1827] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.096803][ T1856] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.103840][ T1856] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.111322][ T1856] device bridge_slave_0 entered promiscuous mode [ 70.118463][ T1828] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.125384][ T1828] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.151311][ T1828] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.162160][ T1827] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.169130][ T1827] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.195029][ T1827] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.209539][ T1822] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.216471][ T1822] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.242444][ T1822] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.253781][ T1829] team0: Port device team_slave_0 added [ 70.260206][ T1830] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.269483][ T1856] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.276495][ T1856] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.284182][ T1856] device bridge_slave_1 entered promiscuous mode [ 70.291974][ T1828] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.298915][ T1828] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.324866][ T1828] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.342098][ T1822] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.349082][ T1822] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.374968][ T1822] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.386109][ T1829] team0: Port device team_slave_1 added [ 70.392529][ T1830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.423425][ T1828] device hsr_slave_0 entered promiscuous mode [ 70.430098][ T1828] device hsr_slave_1 entered promiscuous mode [ 70.455951][ T1827] device hsr_slave_0 entered promiscuous mode [ 70.462301][ T1827] device hsr_slave_1 entered promiscuous mode [ 70.468654][ T1827] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 70.476372][ T1827] Cannot create hsr debugfs directory [ 70.490712][ T1830] team0: Port device team_slave_0 added [ 70.497128][ T1856] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.514020][ T1829] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.520994][ T1829] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.547382][ T1829] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.558698][ T1830] team0: Port device team_slave_1 added [ 70.565150][ T1856] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.575998][ T1822] device hsr_slave_0 entered promiscuous mode [ 70.582398][ T1822] device hsr_slave_1 entered promiscuous mode [ 70.588812][ T1822] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 70.596336][ T1822] Cannot create hsr debugfs directory [ 70.604118][ T1829] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.611196][ T1829] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.637070][ T1829] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.690031][ T1856] team0: Port device team_slave_0 added [ 70.696109][ T1830] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.703263][ T1830] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.729239][ T1830] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.740224][ T1830] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.747240][ T1830] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.773266][ T1830] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.793383][ T1829] device hsr_slave_0 entered promiscuous mode [ 70.800057][ T1829] device hsr_slave_1 entered promiscuous mode [ 70.806449][ T1829] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 70.814045][ T1829] Cannot create hsr debugfs directory [ 70.820125][ T1856] team0: Port device team_slave_1 added [ 70.870021][ T1830] device hsr_slave_0 entered promiscuous mode [ 70.876516][ T1830] device hsr_slave_1 entered promiscuous mode [ 70.882988][ T1830] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 70.890561][ T1830] Cannot create hsr debugfs directory [ 70.897780][ T1856] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.904796][ T1856] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.930690][ T1856] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.941746][ T1856] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.948701][ T1856] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.974895][ T1856] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 71.018875][ T1856] device hsr_slave_0 entered promiscuous mode [ 71.025368][ T1856] device hsr_slave_1 entered promiscuous mode [ 71.031694][ T1856] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 71.040164][ T1856] Cannot create hsr debugfs directory [ 71.055016][ T1827] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 71.063581][ T1827] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 71.077898][ T1827] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 71.092301][ T1827] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 71.122540][ T1828] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 71.131427][ T1828] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 71.142866][ T1828] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 71.154062][ T1828] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 71.165728][ T1822] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 71.179763][ T1822] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 71.198341][ T1822] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 71.206696][ T1822] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 71.230943][ T1829] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 71.240338][ T1829] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 71.248496][ T1829] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 71.256670][ T1829] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 71.285243][ T1830] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 71.299443][ T1827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.306478][ T1830] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 71.330554][ T1856] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 71.339104][ T1856] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 71.346881][ T1830] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 71.349243][ T24] audit: type=1400 audit(1639893465.764:88): avc: denied { remove_name } for pid=1420 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 71.375994][ T24] audit: type=1400 audit(1639893465.764:89): avc: denied { rename } for pid=1420 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.401864][ T1828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.411985][ T1827] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.428216][ T1856] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 71.436296][ T1830] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 71.459539][ T1856] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 71.473722][ T1828] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.481190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.488775][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.496171][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.503921][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.511457][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.520010][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.528269][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.535277][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.543126][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.551591][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.559877][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.566930][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.574861][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.583472][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.594555][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.606463][ T1829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.632954][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.641437][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.650828][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.658394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.665797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.674508][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.682631][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.689641][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.697260][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.705801][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.714231][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.722334][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.730522][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.738909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.747004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.754869][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.763899][ T1829] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.772581][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.786464][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.794862][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.803199][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.810270][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.830679][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.839320][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.847583][ T1920] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.854599][ T1920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.862378][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.871689][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.880321][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.888698][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.896879][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.905057][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.913269][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.921505][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.929747][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.937532][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.949285][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.956632][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.967837][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.976287][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.984735][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.991747][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.999629][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.008220][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.022494][ T1830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.031224][ T1822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.040284][ T1827] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.053305][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.061610][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.069705][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.078157][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.090304][ T1822] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.101486][ T1829] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 72.111843][ T1829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.123220][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.146631][ T1822] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 72.157081][ T1822] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.169383][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.177041][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.184612][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.192319][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.200736][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.209039][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.217202][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.225459][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.233584][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.241698][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.250101][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.258331][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.265345][ T1917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.272932][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.281475][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.290006][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.298382][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.306739][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.313755][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.321431][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.330100][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.338668][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.347047][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.355637][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.363910][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.372543][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.380755][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.389138][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.397332][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.408446][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.415849][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.423779][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.431586][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.444118][ T1856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.453383][ T1830] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.467033][ T1822] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.482711][ T1828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.492086][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.499871][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.507406][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.515057][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.522495][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.530121][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.537456][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.544877][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.553658][ T1829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.563333][ T1856] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.576509][ T1827] device veth0_vlan entered promiscuous mode [ 72.595623][ T1830] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 72.606027][ T1830] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.622199][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.630128][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.637968][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.646060][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.654756][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.663405][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.671926][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.680396][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.688755][ T1905] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.695770][ T1905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.703565][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.712011][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.720456][ T1905] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.727457][ T1905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.735226][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.743992][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.752626][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.760972][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.769432][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.777607][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.785987][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.794209][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.802607][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.810730][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.819190][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.826937][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.834904][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.842584][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.850454][ T1905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.863833][ T1827] device veth1_vlan entered promiscuous mode [ 72.878766][ T1830] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.895218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 72.903796][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.912661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.921287][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.929817][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.938645][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.946049][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.953565][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.962078][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.970246][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.977246][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.985085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.993466][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.001712][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.008729][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.016511][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.024966][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.048299][ T1856] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 73.058769][ T1856] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 73.078864][ T1827] device veth0_macvtap entered promiscuous mode [ 73.089606][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 73.097428][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.105352][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.113660][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.122209][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 73.130678][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.139215][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.147629][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.156185][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.164536][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.173193][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 73.181319][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.189733][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 73.198211][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.206581][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 73.214736][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.222460][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 73.235097][ T1828] device veth0_vlan entered promiscuous mode [ 73.242317][ T1827] device veth1_macvtap entered promiscuous mode [ 73.256082][ T1829] device veth0_vlan entered promiscuous mode [ 73.266438][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 73.274692][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 73.282819][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.291168][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 73.299223][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.307510][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 73.315023][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 73.324544][ T1828] device veth1_vlan entered promiscuous mode [ 73.343788][ T1827] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.354653][ T1856] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.363339][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.371361][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.379367][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 73.387229][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.394939][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.402451][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 73.410947][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.419213][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 73.427654][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.436384][ T1822] device veth0_vlan entered promiscuous mode [ 73.449092][ T1828] device veth0_macvtap entered promiscuous mode [ 73.457408][ T1827] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.469557][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 73.477443][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.485137][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.492839][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.501326][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.509558][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 73.518267][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.528488][ T1822] device veth1_vlan entered promiscuous mode [ 73.536103][ T1828] device veth1_macvtap entered promiscuous mode [ 73.544249][ T1829] device veth1_vlan entered promiscuous mode [ 73.553628][ T1827] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.562513][ T1827] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.571263][ T1827] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.579989][ T1827] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.590818][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 73.598902][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 73.606984][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.619671][ T1828] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 73.630132][ T1828] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.640721][ T1828] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.650394][ T1830] device veth0_vlan entered promiscuous mode [ 73.658840][ T1828] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 73.669294][ T1828] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.680647][ T1828] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.707902][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.715458][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.723255][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 73.731746][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.740301][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 73.748750][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.757441][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 73.766222][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.779291][ T1830] device veth1_vlan entered promiscuous mode [ 73.789092][ T1828] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.797838][ T1828] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.806519][ T1828] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.815213][ T1828] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.835983][ T1830] device veth0_macvtap entered promiscuous mode [ 73.842365][ T24] audit: type=1400 audit(1639893468.244:90): avc: denied { mounton } for pid=1827 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 73.866837][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 73.875074][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 73.883416][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.891756][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.900315][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.908805][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.917159][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.925779][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.934392][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 73.943618][ T1829] device veth0_macvtap entered promiscuous mode [ 73.955114][ T1822] device veth0_macvtap entered promiscuous mode [ 73.966284][ T24] audit: type=1400 audit(1639893468.374:91): avc: denied { read write } for pid=1827 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 73.977457][ T1856] device veth0_vlan entered promiscuous mode [ 73.998435][ T24] audit: type=1400 audit(1639893468.404:92): avc: denied { open } for pid=1827 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 74.022617][ T24] audit: type=1400 audit(1639893468.404:93): avc: denied { ioctl } for pid=1827 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 74.051377][ T1822] device veth1_macvtap entered promiscuous mode 05:57:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000a00)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x30}}, 0x0) [ 74.058941][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 74.066853][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 74.074859][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.083406][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 74.091545][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.103161][ T1856] device veth1_vlan entered promiscuous mode [ 74.114056][ T1830] device veth1_macvtap entered promiscuous mode [ 74.132894][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.143379][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.153168][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.163797][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.174564][ T1830] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.182376][ T1829] device veth1_macvtap entered promiscuous mode [ 74.196758][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.207202][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.217003][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.227446][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.237244][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.247699][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.258834][ T1822] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.266205][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.274302][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.282234][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.289868][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.297617][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 74.305651][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.314188][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.322895][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.331356][ T1921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.345552][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.355559][ T1978] syz-executor.1 (1978) used greatest stack depth: 11304 bytes left 05:57:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000a00)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x30}}, 0x0) 05:57:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8, 0x15}, @IFLA_BR_VLAN_DEFAULT_PVID={0x6}]}}}]}, 0x44}}, 0x0) [ 74.356039][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.373746][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.384612][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.395344][ T1830] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.405923][ T1830] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.414667][ T1830] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.423353][ T1830] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.432093][ T1830] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.443024][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.453488][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.463282][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.473690][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.483663][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.494205][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.505193][ T1822] batman_adv: batadv0: Interface activated: batadv_slave_1 05:57:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000a00)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x30}}, 0x0) 05:57:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8, 0x15}, @IFLA_BR_VLAN_DEFAULT_PVID={0x6}]}}}]}, 0x44}}, 0x0) [ 74.515657][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 74.522648][ T1982] syz-executor.1 (1982) used greatest stack depth: 11120 bytes left [ 74.541478][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.550178][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.559072][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.567602][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.584035][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.594498][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.604346][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.614753][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.624554][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.635226][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.645079][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.655486][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.666378][ T1829] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.675995][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.686546][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.696452][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.706929][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.716725][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.727134][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.736931][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.747390][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.760644][ T1829] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.769005][ T1822] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.777689][ T1822] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.786512][ T1822] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.795203][ T1822] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 05:57:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8, 0x15}, @IFLA_BR_VLAN_DEFAULT_PVID={0x6}]}}}]}, 0x44}}, 0x0) 05:57:49 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000040)) close_range(r0, 0xffffffffffffffff, 0x0) [ 74.817926][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.833814][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.846061][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.855072][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.863246][ T24] audit: type=1400 audit(1639893469.274:94): avc: denied { open } for pid=1989 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 74.882721][ T24] audit: type=1400 audit(1639893469.274:95): avc: denied { perfmon } for pid=1989 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 74.903907][ T24] audit: type=1400 audit(1639893469.274:96): avc: denied { kernel } for pid=1989 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 74.925349][ T24] audit: type=1400 audit(1639893469.344:97): avc: denied { prog_load } for pid=1989 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 74.931103][ T1856] device veth0_macvtap entered promiscuous mode [ 74.944683][ T24] audit: type=1400 audit(1639893469.344:98): avc: denied { create } for pid=1989 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 74.970863][ T24] audit: type=1400 audit(1639893469.344:99): avc: denied { setopt } for pid=1989 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 74.994893][ T1829] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.003753][ T1829] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.012454][ T1829] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.021138][ T1829] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.047904][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 75.059985][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.070263][ T1856] device veth1_macvtap entered promiscuous mode [ 75.085136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 75.093111][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 75.123695][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.134168][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.143998][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.154433][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.164225][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.174631][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.184465][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.194866][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.204711][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.215157][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.226891][ T1856] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.235388][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 75.245935][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.255802][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 75.266231][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.276030][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 75.286573][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.296445][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 75.306844][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.316637][ T1856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 75.327059][ T1856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.338733][ T1856] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.346017][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.354720][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.364236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.372904][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.385160][ T1856] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.393896][ T1856] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.402767][ T1856] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.411679][ T1856] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 05:57:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1}, {0x20}, {0x6, 0x0, 0x0, 0x7fff7ffa}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 05:57:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0xfe}}, 0x1c}}, 0x0) 05:57:49 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000040)) close_range(r0, 0xffffffffffffffff, 0x0) 05:57:49 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000040)) close_range(r0, 0xffffffffffffffff, 0x0) 05:57:49 executing program 4: r0 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 05:57:49 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCXONC(r0, 0x80285442, 0x0) 05:57:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1}, {0x20}, {0x6, 0x0, 0x0, 0x7fff7ffa}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 05:57:49 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000040)) close_range(r0, 0xffffffffffffffff, 0x0) 05:57:49 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000040)) close_range(r0, 0xffffffffffffffff, 0x0) 05:57:49 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCXONC(r0, 0x80285442, 0x0) [ 75.487403][ T24] audit: type=1400 audit(1639893469.894:100): avc: denied { create } for pid=2001 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 05:57:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0xfe}}, 0x1c}}, 0x0) 05:57:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1}, {0x20}, {0x6, 0x0, 0x0, 0x7fff7ffa}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 05:57:50 executing program 4: r0 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 05:57:50 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000040)) close_range(r0, 0xffffffffffffffff, 0x0) 05:57:50 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000040)) close_range(r0, 0xffffffffffffffff, 0x0) 05:57:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0xfe}}, 0x1c}}, 0x0) 05:57:50 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCXONC(r0, 0x80285442, 0x0) 05:57:50 executing program 4: r0 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 05:57:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x480, 0x0, 0x9403, 0x5, 0x2c0, 0x2c0, 0x3b0, 0x3d8, 0x3d8, 0x3b0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0xc8, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@ipv6={@private2, @mcast2, [], [], 'veth1_to_bond\x00', 'rose0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x52e) 05:57:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x60, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x60}}, 0x0) 05:57:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_LABEL={0x8}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) 05:57:50 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @private=0xa010100}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "a5b42e9de975b573b5f760d5e61b58c721a7bbb3e8191503915cb6bca2fe3ccd3234cac62f033fb24e36e6cd4fcb88370109289a415af6c282011619d83387f9caf5690a32eb8576c308ae8ec5111ab7a1cefa41605dc9c6ce", ['\x00', '\x00', '\x00', '\x00']}, 0x4d1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x9, 0x400}, 0x8) dup3(r0, r1, 0x0) 05:57:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x201000, 0x0) umount2(&(0x7f0000000440)='./file0\x00', 0x1) 05:57:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_LABEL={0x8}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) 05:57:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)=0x2000004) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f00000002c0)=""/243) 05:57:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x60, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x60}}, 0x0) [ 75.651273][ T2038] xt_recent: Unsupported userspace flags (000000c8) 05:57:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x480, 0x0, 0x9403, 0x5, 0x2c0, 0x2c0, 0x3b0, 0x3d8, 0x3d8, 0x3b0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0xc8, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@ipv6={@private2, @mcast2, [], [], 'veth1_to_bond\x00', 'rose0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x52e) 05:57:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x201000, 0x0) umount2(&(0x7f0000000440)='./file0\x00', 0x1) 05:57:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x60, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x60}}, 0x0) 05:57:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_LABEL={0x8}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) 05:57:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x60, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x60}}, 0x0) 05:57:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x480, 0x0, 0x9403, 0x5, 0x2c0, 0x2c0, 0x3b0, 0x3d8, 0x3d8, 0x3b0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0xc8, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@ipv6={@private2, @mcast2, [], [], 'veth1_to_bond\x00', 'rose0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x52e) 05:57:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)=0x2000004) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f00000002c0)=""/243) 05:57:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x201000, 0x0) umount2(&(0x7f0000000440)='./file0\x00', 0x1) 05:57:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_LABEL={0x8}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) 05:57:50 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @private=0xa010100}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "a5b42e9de975b573b5f760d5e61b58c721a7bbb3e8191503915cb6bca2fe3ccd3234cac62f033fb24e36e6cd4fcb88370109289a415af6c282011619d83387f9caf5690a32eb8576c308ae8ec5111ab7a1cefa41605dc9c6ce", ['\x00', '\x00', '\x00', '\x00']}, 0x4d1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x9, 0x400}, 0x8) dup3(r0, r1, 0x0) [ 75.743837][ T2060] xt_recent: Unsupported userspace flags (000000c8) 05:57:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x201000, 0x0) umount2(&(0x7f0000000440)='./file0\x00', 0x1) 05:57:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x8, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) 05:57:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000080)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) [ 75.807440][ T2073] xt_recent: Unsupported userspace flags (000000c8) 05:57:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x480, 0x0, 0x9403, 0x5, 0x2c0, 0x2c0, 0x3b0, 0x3d8, 0x3d8, 0x3b0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0xc8, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@ipv6={@private2, @mcast2, [], [], 'veth1_to_bond\x00', 'rose0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x52e) 05:57:50 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @private=0xa010100}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "a5b42e9de975b573b5f760d5e61b58c721a7bbb3e8191503915cb6bca2fe3ccd3234cac62f033fb24e36e6cd4fcb88370109289a415af6c282011619d83387f9caf5690a32eb8576c308ae8ec5111ab7a1cefa41605dc9c6ce", ['\x00', '\x00', '\x00', '\x00']}, 0x4d1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x9, 0x400}, 0x8) dup3(r0, r1, 0x0) 05:57:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x8, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) 05:57:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)=0x2000004) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f00000002c0)=""/243) 05:57:50 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {0x2c}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 05:57:50 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @private=0xa010100}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "a5b42e9de975b573b5f760d5e61b58c721a7bbb3e8191503915cb6bca2fe3ccd3234cac62f033fb24e36e6cd4fcb88370109289a415af6c282011619d83387f9caf5690a32eb8576c308ae8ec5111ab7a1cefa41605dc9c6ce", ['\x00', '\x00', '\x00', '\x00']}, 0x4d1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x9, 0x400}, 0x8) dup3(r0, r1, 0x0) 05:57:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/204, 0xcc}], 0x1, 0x73, 0x0) 05:57:50 executing program 2: set_mempolicy(0x3, &(0x7f00000000c0)=0x77, 0x400) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) [ 75.863586][ T2082] netlink: 'syz-executor.5': attribute type 8 has an invalid length. [ 75.890517][ T2090] xt_recent: Unsupported userspace flags (000000c8) 05:57:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/204, 0xcc}], 0x1, 0x73, 0x0) 05:57:50 executing program 2: set_mempolicy(0x3, &(0x7f00000000c0)=0x77, 0x400) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 05:57:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x8, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) 05:57:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [], 0x0, "8bebeb894f74c3"}) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 05:57:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/204, 0xcc}], 0x1, 0x73, 0x0) [ 75.950198][ T2097] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 05:57:50 executing program 2: set_mempolicy(0x3, &(0x7f00000000c0)=0x77, 0x400) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 05:57:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)=0x2000004) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f00000002c0)=""/243) 05:57:50 executing program 2: set_mempolicy(0x3, &(0x7f00000000c0)=0x77, 0x400) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) [ 76.014729][ T2110] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 05:57:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {0x2c}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 05:57:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x8, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) 05:57:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/204, 0xcc}], 0x1, 0x73, 0x0) 05:57:51 executing program 2: getrandom(&(0x7f0000000100)=""/120, 0xffffffffffffffd4, 0x0) 05:57:51 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, 0x0, 0x1) 05:57:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [], 0x0, "8bebeb894f74c3"}) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 05:57:51 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, 0x0, 0x1) [ 76.811509][ T2128] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 05:57:51 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, 0x0, 0x1) 05:57:51 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) 05:57:51 executing program 0: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@can, 0x80, 0x0, 0x13}}], 0x1, 0x0) io_uring_enter(r0, 0x1239, 0x0, 0x0, 0x0, 0x0) 05:57:51 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, 0x0, 0x1) 05:57:51 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) 05:57:52 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {0x2c}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 05:57:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [], 0x0, "8bebeb894f74c3"}) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 05:57:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000003240)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000140)="414b63aabcec", 0x0, 0x0, 0x0, 0x0, 0x0}) 05:57:52 executing program 0: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@can, 0x80, 0x0, 0x13}}], 0x1, 0x0) io_uring_enter(r0, 0x1239, 0x0, 0x0, 0x0, 0x0) 05:57:52 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) 05:57:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0xb9) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x17) 05:57:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000003240)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000140)="414b63aabcec", 0x0, 0x0, 0x0, 0x0, 0x0}) 05:57:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0xb9) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x17) 05:57:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000003240)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000140)="414b63aabcec", 0x0, 0x0, 0x0, 0x0, 0x0}) 05:57:52 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) [ 77.742177][ C1] hrtimer: interrupt took 26471 ns 05:57:52 executing program 0: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@can, 0x80, 0x0, 0x13}}], 0x1, 0x0) io_uring_enter(r0, 0x1239, 0x0, 0x0, 0x0, 0x0) 05:57:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000003240)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000140)="414b63aabcec", 0x0, 0x0, 0x0, 0x0, 0x0}) 05:57:52 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1}, {0x2c}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 05:57:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0xb9) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x17) 05:57:52 executing program 5: fsmount(0xffffffffffffffff, 0x0, 0x10) 05:57:52 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000028c0), 0x8, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) 05:57:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [], 0x0, "8bebeb894f74c3"}) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 05:57:52 executing program 0: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@can, 0x80, 0x0, 0x13}}], 0x1, 0x0) io_uring_enter(r0, 0x1239, 0x0, 0x0, 0x0, 0x0) 05:57:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0xb9) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x17) 05:57:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) readv(r0, &(0x7f0000002600)=[{&(0x7f0000000000)=""/211, 0x200000d3}], 0x1) 05:57:53 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x9, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 05:57:53 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) 05:57:53 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000028c0), 0x8, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) 05:57:53 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x9, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 05:57:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'ip6gre0\x00', @ifru_mtu}) 05:57:53 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000028c0), 0x8, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) 05:57:53 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x9, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 05:57:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000011d80)={0x0, 0x0, &(0x7f0000011d40)={&(0x7f0000011e00)=ANY=[@ANYBLOB="d811010030"], 0x111d8}}, 0x0) 05:57:53 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa5, 0xa5, 0x5, [@datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], 'L'}, @const, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @volatile, @ptr]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xc5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x32) [ 79.462384][ T24] kauditd_printk_skb: 37 callbacks suppressed [ 79.462396][ T24] audit: type=1400 audit(1639893473.874:138): avc: denied { bpf } for pid=2199 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 05:57:53 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000028c0), 0x8, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) 05:57:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x40, 0x4, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000780)={r1, &(0x7f0000000b80), &(0x7f0000000740)=@tcp6=r0}, 0x20) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x12001) 05:57:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}, &(0x7f0000000140)=0x20) 05:57:53 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x9, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) [ 79.489386][ T24] audit: type=1400 audit(1639893473.874:139): avc: denied { ioctl } for pid=2193 comm="syz-executor.3" path="socket:[17636]" dev="sockfs" ino=17636 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 79.524795][ T24] audit: type=1326 audit(1639893473.934:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c85603e99 code=0x7fc00000 05:57:53 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) [ 79.548697][ T24] audit: type=1400 audit(1639893473.934:141): avc: denied { map_create } for pid=2205 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 79.568088][ T24] audit: type=1400 audit(1639893473.934:142): avc: denied { map_read map_write } for pid=2205 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 79.588189][ T24] audit: type=1400 audit(1639893473.984:143): avc: denied { shutdown } for pid=2206 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 05:57:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x40, 0x4, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000780)={r1, &(0x7f0000000b80), &(0x7f0000000740)=@tcp6=r0}, 0x20) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x12001) 05:57:54 executing program 3: setresgid(0xee01, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) setresgid(r3, 0x0, 0x0) 05:57:54 executing program 3: setresgid(0xee01, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) setresgid(r3, 0x0, 0x0) [ 79.608103][ T24] audit: type=1400 audit(1639893473.984:144): avc: denied { getopt } for pid=2206 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 79.627873][ T24] audit: type=1400 audit(1639893474.024:145): avc: denied { setopt } for pid=2206 comm="syz-executor.3" laddr=::ffff:172.20.20.170 lport=35444 faddr=::ffff:172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 05:57:54 executing program 3: setresgid(0xee01, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) setresgid(r3, 0x0, 0x0) 05:57:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000b28000)=0x3e) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0xfffffffffffffff8) dup2(r0, r1) 05:57:54 executing program 4: syz_mount_image$tmpfs(&(0x7f00000025c0), &(0x7f0000002600)='./file0\x00', 0x0, 0x0, &(0x7f0000002a00), 0x0, &(0x7f0000002ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x0]}}]}) [ 79.653346][ T24] audit: type=1400 audit(1639893474.044:146): avc: denied { getopt } for pid=2217 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 79.698363][ T24] audit: type=1326 audit(1639893474.114:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2212 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c85603e99 code=0x7fc00000 05:57:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0) 05:57:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x40, 0x4, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000780)={r1, &(0x7f0000000b80), &(0x7f0000000740)=@tcp6=r0}, 0x20) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x12001) 05:57:56 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa5, 0xa5, 0x5, [@datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], 'L'}, @const, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @volatile, @ptr]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xc5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x32) 05:57:56 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) 05:57:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000b28000)=0x3e) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0xfffffffffffffff8) dup2(r0, r1) 05:57:56 executing program 3: setresgid(0xee01, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) setresgid(r3, 0x0, 0x0) 05:57:56 executing program 4: keyctl$reject(0xa, 0x0, 0x20fffffc, 0x0, 0x0) 05:57:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'tunl0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @remote}]}, 0x28}}, 0x0) 05:57:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x40, 0x4, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000780)={r1, &(0x7f0000000b80), &(0x7f0000000740)=@tcp6=r0}, 0x20) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x12001) 05:57:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'tunl0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @remote}]}, 0x28}}, 0x0) 05:57:56 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa5, 0xa5, 0x5, [@datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], 'L'}, @const, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @volatile, @ptr]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xc5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x32) 05:57:56 executing program 4: keyctl$reject(0xa, 0x0, 0x20fffffc, 0x0, 0x0) 05:57:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000b28000)=0x3e) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0xfffffffffffffff8) dup2(r0, r1) 05:57:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'tunl0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @remote}]}, 0x28}}, 0x0) 05:57:56 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa5, 0xa5, 0x5, [@datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], 'L'}, @const, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @volatile, @ptr]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xc5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x32) 05:57:56 executing program 1: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="240000002e00074c8bfffd946fa2830022200afffffffffffff000e50c1be3a2ec0a027e140000005e00ff03c81f8374b4", 0x31}, {&(0x7f0000000040)="971db4e786948f", 0x7}], 0x2}, 0x0) 05:57:57 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) 05:57:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'tunl0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @remote}]}, 0x28}}, 0x0) 05:57:57 executing program 1: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="240000002e00074c8bfffd946fa2830022200afffffffffffff000e50c1be3a2ec0a027e140000005e00ff03c81f8374b4", 0x31}, {&(0x7f0000000040)="971db4e786948f", 0x7}], 0x2}, 0x0) 05:57:57 executing program 4: keyctl$reject(0xa, 0x0, 0x20fffffc, 0x0, 0x0) 05:57:57 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) 05:57:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000b28000)=0x3e) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0xfffffffffffffff8) dup2(r0, r1) 05:57:57 executing program 4: keyctl$reject(0xa, 0x0, 0x20fffffc, 0x0, 0x0) 05:57:57 executing program 1: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="240000002e00074c8bfffd946fa2830022200afffffffffffff000e50c1be3a2ec0a027e140000005e00ff03c81f8374b4", 0x31}, {&(0x7f0000000040)="971db4e786948f", 0x7}], 0x2}, 0x0) 05:57:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x57}]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xbd, &(0x7f0000000040)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:57:57 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x94, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x64, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8}]}}]}, 0x94}}, 0x0) [ 83.317447][ T2270] tmpfs: Unsupported parameter 'huge' 05:57:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x57}]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xbd, &(0x7f0000000040)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:57:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "000000dd0000000000f203ff0f00000200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5437, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "59a98e47de362e9f1bae5963d965106b618a4d"}) 05:57:58 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) 05:57:58 executing program 1: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="240000002e00074c8bfffd946fa2830022200afffffffffffff000e50c1be3a2ec0a027e140000005e00ff03c81f8374b4", 0x31}, {&(0x7f0000000040)="971db4e786948f", 0x7}], 0x2}, 0x0) 05:57:58 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x94, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x64, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8}]}}]}, 0x94}}, 0x0) 05:57:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x57}]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xbd, &(0x7f0000000040)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:57:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "000000dd0000000000f203ff0f00000200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5437, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "59a98e47de362e9f1bae5963d965106b618a4d"}) 05:57:58 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) 05:57:58 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x94, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x64, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8}]}}]}, 0x94}}, 0x0) 05:57:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x57}]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xbd, &(0x7f0000000040)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:57:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "000000dd0000000000f203ff0f00000200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5437, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "59a98e47de362e9f1bae5963d965106b618a4d"}) 05:57:58 executing program 1: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) 05:57:58 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x94, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x64, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8}]}}]}, 0x94}}, 0x0) [ 84.195467][ T2302] tmpfs: Unsupported parameter 'huge' [ 84.225569][ T2306] tmpfs: Unsupported parameter 'huge' 05:57:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "000000dd0000000000f203ff0f00000200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5437, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "59a98e47de362e9f1bae5963d965106b618a4d"}) [ 84.246922][ T2311] tmpfs: Unsupported parameter 'huge' 05:57:58 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000980)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004200029c4645f12c4640829c4645f00008730b6bd040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x9400}, {0x0, 0x0, 0x3fbfc}], 0x0, &(0x7f0000000180)=ANY=[]) getdents64(r0, &(0x7f0000000000)=""/126, 0x7e) 05:57:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000440)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0480f3", 0x8, 0x3a, 0x0, @local, @ipv4={'\x00', '\xff\xff', @multicast2}, {[], @echo_request}}}}}, 0x0) 05:57:58 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) 05:57:58 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) 05:57:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff07002000000003a08b7944080594e5d04e0d441804f0b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 05:57:58 executing program 1: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) 05:57:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000440)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0480f3", 0x8, 0x3a, 0x0, @local, @ipv4={'\x00', '\xff\xff', @multicast2}, {[], @echo_request}}}}}, 0x0) [ 84.343681][ T2322] loop4: detected capacity change from 0 to 1019 [ 84.359612][ T2326] tmpfs: Unsupported parameter 'huge' [ 84.376370][ T2330] tmpfs: Unsupported parameter 'huge' [ 84.387473][ T2322] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 05:57:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000440)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0480f3", 0x8, 0x3a, 0x0, @local, @ipv4={'\x00', '\xff\xff', @multicast2}, {[], @echo_request}}}}}, 0x0) 05:57:58 executing program 5: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c}, 0x1c}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x88002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="6800000021c259008900fffffffe040072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="2c2da2ee918a3730f7", 0x9}, {&(0x7f00000003c0)="92f63d5f0014068864", 0xb09}], 0x2) 05:57:58 executing program 1: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) 05:57:58 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) 05:57:58 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000c, 0x4003012, r2, 0x0) close(r1) [ 84.418303][ T2333] tmpfs: Unsupported parameter 'huge' 05:57:58 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="000300a1000007"], 0x20) set_mempolicy(0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000002640)=[{&(0x7f0000000140)="de", 0x1}], 0x1}}], 0x1, 0x0) [ 84.476468][ T2341] tmpfs: Unsupported parameter 'huge' [ 84.501714][ T2344] tmpfs: Unsupported parameter 'huge' [ 84.510283][ T24] kauditd_printk_skb: 7 callbacks suppressed 05:57:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000440)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0480f3", 0x8, 0x3a, 0x0, @local, @ipv4={'\x00', '\xff\xff', @multicast2}, {[], @echo_request}}}}}, 0x0) 05:57:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200), 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1b1, 0x1000000, 0x0) [ 84.510294][ T24] audit: type=1400 audit(1639893478.924:155): avc: denied { unmount } for pid=1856 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.512399][ T2346] tmpfs: Unsupported parameter 'huge' 05:57:59 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mlock2(&(0x7f0000125000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) [ 84.559541][ T24] audit: type=1400 audit(1639893478.974:156): avc: denied { write } for pid=2347 comm="syz-executor.0" name="raw6" dev="proc" ino=4026532471 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 84.600857][ T2352] mmap: syz-executor.3 (2352) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 05:57:59 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="000300a1000007"], 0x20) set_mempolicy(0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000002640)=[{&(0x7f0000000140)="de", 0x1}], 0x1}}], 0x1, 0x0) 05:57:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200), 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1b1, 0x1000000, 0x0) [ 84.629939][ T24] audit: type=1400 audit(1639893479.044:157): avc: denied { name_bind } for pid=2353 comm="syz-executor.4" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 84.651981][ T24] audit: type=1400 audit(1639893479.044:158): avc: denied { node_bind } for pid=2353 comm="syz-executor.4" saddr=::ffff:0.0.0.0 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 05:57:59 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="000300a1000007"], 0x20) set_mempolicy(0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000002640)=[{&(0x7f0000000140)="de", 0x1}], 0x1}}], 0x1, 0x0) 05:57:59 executing program 1: set_mempolicy(0x8005, &(0x7f00000000c0)=0x1763, 0x7f) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000080)=ANY=[]) 05:57:59 executing program 5: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c}, 0x1c}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x88002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="6800000021c259008900fffffffe040072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="2c2da2ee918a3730f7", 0x9}, {&(0x7f00000003c0)="92f63d5f0014068864", 0xb09}], 0x2) 05:57:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200), 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1b1, 0x1000000, 0x0) 05:57:59 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="000300a1000007"], 0x20) set_mempolicy(0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000002640)=[{&(0x7f0000000140)="de", 0x1}], 0x1}}], 0x1, 0x0) 05:57:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffd}, {0xc}, {0x6, 0x0, 0x0, 0x7fff7ffa}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 05:57:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000069c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@tclass={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}, @tclass={{0x14, 0x29, 0x43, 0x101}}], 0x58}}], 0x2, 0x0) 05:57:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffd}, {0xc}, {0x6, 0x0, 0x0, 0x7fff7ffa}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 05:57:59 executing program 1: set_mempolicy(0x8005, &(0x7f00000000c0)=0x1763, 0x7f) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000080)=ANY=[]) [ 84.776592][ T2367] loop1: detected capacity change from 0 to 512 [ 84.803423][ T2367] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 05:57:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000069c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@tclass={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}, @tclass={{0x14, 0x29, 0x43, 0x101}}], 0x58}}], 0x2, 0x0) 05:57:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200), 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1b1, 0x1000000, 0x0) 05:57:59 executing program 4: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index, 0x800000000}, 0x1) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)) syz_io_uring_submit(r4, r2, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_uring_enter(r0, 0x1dea, 0x0, 0x0, 0x0, 0x0) 05:57:59 executing program 5: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c}, 0x1c}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x88002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="6800000021c259008900fffffffe040072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="2c2da2ee918a3730f7", 0x9}, {&(0x7f00000003c0)="92f63d5f0014068864", 0xb09}], 0x2) [ 84.895333][ T2378] loop1: detected capacity change from 0 to 512 [ 84.911752][ T24] audit: type=1400 audit(1639893479.324:159): avc: denied { execute } for pid=2381 comm="syz-executor.4" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18565 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 05:57:59 executing program 4: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index, 0x800000000}, 0x1) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)) syz_io_uring_submit(r4, r2, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_uring_enter(r0, 0x1dea, 0x0, 0x0, 0x0, 0x0) 05:57:59 executing program 1: set_mempolicy(0x8005, &(0x7f00000000c0)=0x1763, 0x7f) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000080)=ANY=[]) 05:57:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000069c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@tclass={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}, @tclass={{0x14, 0x29, 0x43, 0x101}}], 0x58}}], 0x2, 0x0) 05:57:59 executing program 4: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index, 0x800000000}, 0x1) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)) syz_io_uring_submit(r4, r2, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_uring_enter(r0, 0x1dea, 0x0, 0x0, 0x0, 0x0) [ 84.915193][ T2378] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 05:57:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffd}, {0xc}, {0x6, 0x0, 0x0, 0x7fff7ffa}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 05:57:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pause() 05:57:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000069c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@tclass={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}, @tclass={{0x14, 0x29, 0x43, 0x101}}], 0x58}}], 0x2, 0x0) 05:57:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffd}, {0xc}, {0x6, 0x0, 0x0, 0x7fff7ffa}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) [ 85.017603][ T2397] loop1: detected capacity change from 0 to 512 05:57:59 executing program 4: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index, 0x800000000}, 0x1) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)) syz_io_uring_submit(r4, r2, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_uring_enter(r0, 0x1dea, 0x0, 0x0, 0x0, 0x0) 05:57:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe6, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}}}]}, 0x4c}}, 0x0) [ 85.047992][ T24] audit: type=1326 audit(1639893479.454:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2401 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 [ 85.072001][ T24] audit: type=1326 audit(1639893479.454:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2401 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 05:57:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000007c0)=ANY=[], 0x230) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) [ 85.095819][ T24] audit: type=1326 audit(1639893479.464:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2401 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=34 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 [ 85.125661][ T2397] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 05:57:59 executing program 5: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c}, 0x1c}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x88002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="6800000021c259008900fffffffe040072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="2c2da2ee918a3730f7", 0x9}, {&(0x7f00000003c0)="92f63d5f0014068864", 0xb09}], 0x2) 05:57:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80) 05:57:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe6, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}}}]}, 0x4c}}, 0x0) 05:57:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000007c0)=ANY=[], 0x230) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) 05:57:59 executing program 1: set_mempolicy(0x8005, &(0x7f00000000c0)=0x1763, 0x7f) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000080)=ANY=[]) 05:57:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000007c0)=ANY=[], 0x230) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) [ 85.231996][ T2421] loop1: detected capacity change from 0 to 512 [ 85.253725][ T2421] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 05:58:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pause() 05:58:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80) 05:58:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000007c0)=ANY=[], 0x230) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) 05:58:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe6, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}}}]}, 0x4c}}, 0x0) 05:58:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, 0x0) 05:58:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000004, 0x13, r0, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_buf(r1, 0x10d, 0xd7, 0x0, &(0x7f00000000c0)) 05:58:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000004, 0x13, r0, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_buf(r1, 0x10d, 0xd7, 0x0, &(0x7f00000000c0)) 05:58:00 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0xe4c}}, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) 05:58:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80) 05:58:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe6, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}}}]}, 0x4c}}, 0x0) [ 85.895886][ T24] audit: type=1400 audit(1639893480.304:163): avc: denied { create } for pid=2424 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 85.915725][ T24] audit: type=1400 audit(1639893480.304:164): avc: denied { getopt } for pid=2424 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 05:58:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000004, 0x13, r0, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_buf(r1, 0x10d, 0xd7, 0x0, &(0x7f00000000c0)) 05:58:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, 0x0) 05:58:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pause() 05:58:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000004, 0x13, r0, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_buf(r1, 0x10d, 0xd7, 0x0, &(0x7f00000000c0)) 05:58:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80) 05:58:01 executing program 3: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) recvmmsg(r0, &(0x7f0000002580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 05:58:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, 0x0) 05:58:01 executing program 3: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) recvmmsg(r0, &(0x7f0000002580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 05:58:01 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x1b}) 05:58:01 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0xe4c}}, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) 05:58:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0xac}, {0x4c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 05:58:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, 0x0) 05:58:01 executing program 3: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) recvmmsg(r0, &(0x7f0000002580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 05:58:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0xac}, {0x4c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 86.794520][ T2459] program syz-executor.5 is using a deprecated SCSI ioctl, please convert it to SG_IO 05:58:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pause() 05:58:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x1b}) 05:58:02 executing program 3: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) recvmmsg(r0, &(0x7f0000002580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 05:58:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0xac}, {0x4c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 05:58:02 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x5) fcntl$setlease(r0, 0x400, 0x1f165ee88b07e3d1) 05:58:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0xac}, {0x4c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 05:58:02 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x5) fcntl$setlease(r0, 0x400, 0x1f165ee88b07e3d1) 05:58:02 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0xe4c}}, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) 05:58:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x4e}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 05:58:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x1b}) 05:58:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmsg$can_raw(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x12043) 05:58:02 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x5) fcntl$setlease(r0, 0x400, 0x1f165ee88b07e3d1) [ 87.620354][ T2479] program syz-executor.5 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 87.696250][ T2495] program syz-executor.5 is using a deprecated SCSI ioctl, please convert it to SG_IO 05:58:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x1b}) 05:58:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x4e}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 05:58:02 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x5) fcntl$setlease(r0, 0x400, 0x1f165ee88b07e3d1) 05:58:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x6}, [@NDA_LLADDR={0xa, 0x2, @remote}]}, 0x28}}, 0x0) 05:58:02 executing program 0: linkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x2000) 05:58:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x4e}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 05:58:02 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x0, 0xfffffffe}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) dup3(r1, r0, 0x0) 05:58:02 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0xe4c}}, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) 05:58:02 executing program 0: linkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x2000) 05:58:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x64}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 88.477536][ T2500] device bond_slave_0 entered promiscuous mode [ 88.483733][ T2500] device bond_slave_1 entered promiscuous mode [ 88.491711][ T2505] program syz-executor.5 is using a deprecated SCSI ioctl, please convert it to SG_IO 05:58:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x6}, [@NDA_LLADDR={0xa, 0x2, @remote}]}, 0x28}}, 0x0) 05:58:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x64}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:58:02 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x0, 0xfffffffe}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) dup3(r1, r0, 0x0) 05:58:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x4e}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 05:58:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x6}, [@NDA_LLADDR={0xa, 0x2, @remote}]}, 0x28}}, 0x0) 05:58:03 executing program 0: linkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x2000) 05:58:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x64}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:58:03 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x0, 0xfffffffe}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) dup3(r1, r0, 0x0) 05:58:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x6}, [@NDA_LLADDR={0xa, 0x2, @remote}]}, 0x28}}, 0x0) 05:58:03 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00', 0x0) fallocate(r0, 0x0, 0x2000428, 0x80) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mount$bind(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x813100, 0x0) 05:58:03 executing program 0: linkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x2000) 05:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newtaction={0x70, 0x30, 0x90968b7077c64b9f, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_skbedit={0x58, 0x1, 0x0, 0x0, {{0xc}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18}, @TCA_SKBEDIT_PTYPE={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}}, 0x0) 05:58:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x64}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:58:03 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x0, 0xfffffffe}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) dup3(r1, r0, 0x0) 05:58:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x142) 05:58:03 executing program 5: unshare(0x42020400) socket$inet6(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo:\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\b\x01\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 05:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newtaction={0x70, 0x30, 0x90968b7077c64b9f, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_skbedit={0x58, 0x1, 0x0, 0x0, {{0xc}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18}, @TCA_SKBEDIT_PTYPE={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}}, 0x0) 05:58:03 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00', 0x0) fallocate(r0, 0x0, 0x2000428, 0x80) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mount$bind(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x813100, 0x0) 05:58:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) write(r0, &(0x7f0000000140)="bb", 0x1) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000100)=0xffff, 0x4) recvmmsg(r2, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) 05:58:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000008780)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x108) 05:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newtaction={0x70, 0x30, 0x90968b7077c64b9f, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_skbedit={0x58, 0x1, 0x0, 0x0, {{0xc}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18}, @TCA_SKBEDIT_PTYPE={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}}, 0x0) 05:58:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000008780)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x108) 05:58:03 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00', 0x0) fallocate(r0, 0x0, 0x2000428, 0x80) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mount$bind(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x813100, 0x0) 05:58:03 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x260100, 0x2) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000000)={0x7fff, 0xe37}) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x1]}, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x38, 0x0, 0x11, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x38}}, 0x0) 05:58:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) write(r0, &(0x7f0000000140)="bb", 0x1) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000100)=0xffff, 0x4) recvmmsg(r2, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) 05:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newtaction={0x70, 0x30, 0x90968b7077c64b9f, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_skbedit={0x58, 0x1, 0x0, 0x0, {{0xc}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18}, @TCA_SKBEDIT_PTYPE={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}}, 0x0) 05:58:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000008780)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x108) [ 89.532498][ T24] kauditd_printk_skb: 16 callbacks suppressed [ 89.532509][ T24] audit: type=1400 audit(1639893483.944:181): avc: denied { read write } for pid=2567 comm="syz-executor.2" name="snapshot" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 89.561537][ T2549] Y­4`Ò˜: renamed from lo 05:58:04 executing program 5: unshare(0x42020400) socket$inet6(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo:\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\b\x01\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 05:58:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_PROTOCOL={0x6}]}}}]}, 0x3c}}, 0x0) 05:58:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000008780)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x108) 05:58:04 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00', 0x0) fallocate(r0, 0x0, 0x2000428, 0x80) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mount$bind(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x813100, 0x0) 05:58:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) write(r0, &(0x7f0000000140)="bb", 0x1) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000100)=0xffff, 0x4) recvmmsg(r2, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) 05:58:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_PROTOCOL={0x6}]}}}]}, 0x3c}}, 0x0) 05:58:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000180)=0x4, 0x4) read(r1, &(0x7f0000000340)=""/178, 0xb2) [ 89.584133][ T24] audit: type=1400 audit(1639893483.984:182): avc: denied { open } for pid=2567 comm="syz-executor.2" path="/dev/snapshot" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 05:58:04 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x260100, 0x2) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000000)={0x7fff, 0xe37}) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x1]}, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x38, 0x0, 0x11, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x38}}, 0x0) 05:58:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6900) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000851}, 0x24004001) r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r4, 0x208200) openat(r4, &(0x7f0000000100)='./bus\x00', 0x0, 0x23) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffa) 05:58:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000180)=0x4, 0x4) read(r1, &(0x7f0000000340)=""/178, 0xb2) 05:58:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_PROTOCOL={0x6}]}}}]}, 0x3c}}, 0x0) 05:58:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_PROTOCOL={0x6}]}}}]}, 0x3c}}, 0x0) 05:58:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000180)=0x4, 0x4) read(r1, &(0x7f0000000340)=""/178, 0xb2) 05:58:04 executing program 5: unshare(0x42020400) socket$inet6(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo:\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\b\x01\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 05:58:04 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x260100, 0x2) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000000)={0x7fff, 0xe37}) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x1]}, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x38, 0x0, 0x11, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x38}}, 0x0) 05:58:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) 05:58:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) write(r0, &(0x7f0000000140)="bb", 0x1) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000100)=0xffff, 0x4) recvmmsg(r2, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) 05:58:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000180)=0x4, 0x4) read(r1, &(0x7f0000000340)=""/178, 0xb2) 05:58:04 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x260100, 0x2) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000000)={0x7fff, 0xe37}) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x1]}, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x38, 0x0, 0x11, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x38}}, 0x0) 05:58:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) [ 90.151404][ T2615] Y­4`Ò˜: renamed from lo 05:58:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6900) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000851}, 0x24004001) r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r4, 0x208200) openat(r4, &(0x7f0000000100)='./bus\x00', 0x0, 0x23) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffa) 05:58:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) setfsuid(0x0) 05:58:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) 05:58:04 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_SEC_KEY={0x28, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x1c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x44}}, 0x0) 05:58:04 executing program 5: unshare(0x42020400) socket$inet6(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo:\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\b\x01\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 05:58:04 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000001400)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000180)={0x28}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000240)={0xda8}, 0x0, 0x0, 0x0) 05:58:04 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000001400)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000180)={0x28}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000240)={0xda8}, 0x0, 0x0, 0x0) [ 90.544748][ T24] audit: type=1326 audit(1639893484.954:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 [ 90.568848][ T24] audit: type=1326 audit(1639893484.954:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=122 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 [ 90.592864][ T24] audit: type=1326 audit(1639893484.954:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 [ 90.617053][ T24] audit: type=1326 audit(1639893484.954:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 05:58:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) setfsuid(0x0) 05:58:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) 05:58:05 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000001400)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000180)={0x28}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000240)={0xda8}, 0x0, 0x0, 0x0) 05:58:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_SEC_KEY={0x28, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x1c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x44}}, 0x0) 05:58:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) setfsuid(0x0) [ 90.636882][ T2635] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 90.641006][ T24] audit: type=1400 audit(1639893485.034:187): avc: denied { ioctl } for pid=2630 comm="syz-executor.1" path="socket:[19043]" dev="sockfs" ino=19043 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 90.723865][ T24] audit: type=1326 audit(1639893485.094:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 [ 90.747957][ T24] audit: type=1326 audit(1639893485.094:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 [ 90.771831][ T24] audit: type=1326 audit(1639893485.104:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=122 compat=0 ip=0x7fb16ba9ce99 code=0x7ffc0000 05:58:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6900) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000851}, 0x24004001) r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r4, 0x208200) openat(r4, &(0x7f0000000100)='./bus\x00', 0x0, 0x23) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffa) 05:58:05 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000001400)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000180)={0x28}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000240)={0xda8}, 0x0, 0x0, 0x0) 05:58:05 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000001400)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000180)={0x28}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000240)={0xda8}, 0x0, 0x0, 0x0) 05:58:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) setfsuid(0x0) 05:58:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_SEC_KEY={0x28, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x1c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x44}}, 0x0) 05:58:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6900) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000851}, 0x24004001) r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r4, 0x208200) openat(r4, &(0x7f0000000100)='./bus\x00', 0x0, 0x23) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffa) 05:58:05 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setown(r0, 0x8, r2) ioctl$int_in(r0, 0x5452, &(0x7f0000000240)=0xbe6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 05:58:05 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000001400)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000180)={0x28}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000240)={0xda8}, 0x0, 0x0, 0x0) 05:58:05 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000001400)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000180)={0x28}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000240)={0xda8}, 0x0, 0x0, 0x0) 05:58:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_SEC_KEY={0x28, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x1c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x44}}, 0x0) 05:58:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0xbb}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x5c}}, 0x0) 05:58:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) [ 91.420888][ T2663] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 91.472642][ T2677] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 05:58:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6900) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000851}, 0x24004001) r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r4, 0x208200) openat(r4, &(0x7f0000000100)='./bus\x00', 0x0, 0x23) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffa) 05:58:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0xbb}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x5c}}, 0x0) 05:58:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000002000000bfa300000000000007030000fdfdfff67a0af0ffd8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000000000006a0a00fe00000000850000000a000000b70000000000000095000020000000009c050000002c9fbc429adad5ff4c6fa026093e530cf08ee200000000000000076b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c45aa7e2b347a36f5662403e1b2be4cc7c2683118a0d411aa11a9872971c5c56c7060d1e86ac65b0a2cb9cde0100000000000000f32f257e6873eb953ab12bda45c65549f69ca3c00cb9bf4e418d07fa22f0610a70f2bdf400d3ab967e0dd8e263f63223b7b80197aa743fe055193161f45346b100000000000000000089e399f6609876b5887437a172ebc02a748675298b79dc194e533583412dff048fc21f28bcd3e26a5ab2728a0481e9a9628f78785aa78515bded4b1ebbf0da43bb6cfb851ce5a9ff19fff77f4b65b6d6cafe3e64be033c9d2f972cc93c1c13caec04a347c24a9fb6a68afbffffffffffffcb15426415b6e8b14f822e86067a5e991c3b4049670000000000000000000000000000638052d8e3250065c26205a9645bf6c3cf80d991d4f837191b0bc0b650874e160b5c248fc7c54ee490dbcb16af73488858a71be1e3f69b3f96b9b32a325f2957182c477564b9691f9713bea546b0a28c260c4a431e4d13a990a99f49e0a8eb5c3301868f135b651f23366a9ce538cc12dceff25d5f0a7ba04fd1c2f26e04c70d3bdce726d5b0dd4849b51a349c16d60a3c4c333887288dd8a68a9bb73f9e3b2dc8984e3ea0577b8c58326c6f51993a5be441c3c32a39c12d3b5183665297076053c54faa98eae04266b23e0bd5d54504a5fc5634e58a520000000000000000000000000017000000000000000000000000000000fe161d6e0411f6aada7b9182c43fbb4b2e502db683473d5b90020d641d87a5917affe9799b73e3b9d90333ba26fe3660560dc411f97cd333c3c9c71c920a4d10e194a77e9914672b2ae3deaea1d23d73786bdaf4bf45848f9e69d5ae50609858751869eda420e74d09c91327f2a415c87de66e7702d6e8ef1bceaa11276fbbe06b76a79a269f449c95783dab27ed49c2fbf8bc108aaa150505b4d4913655421f6a484765e85225740100372173ae009e1087b9e7b07b0729569463122b65ae2b7500b7fb28c1513095303adec2dc8d0cc2959012d80fb4aa69719ccd3a2804000000506d3d3e5997b5ca53b2c700e9b59e8974532f65514ff62308be3cf69e5154f8e59c924cf973dc3636dda030e7e026e5699e4f2d5e9511510ef07ef3bb0cb32fa83827c7e6f809253915cd56fcdf58e0eb664a04bb9f1f1e503d7c92d597c94b1f2fae3df7680ff56f140e31eff1dafbeadacd98d9e76cae7dac7ce29d80344876936245fbe86c7afb1ad429e94903598b21c42f4235d739f2bbc4aee183053e8adb129fc3ba430e2b487657138ef913312ecfee56d2fdc07526c90f5eafea669b34ff39d7d37e968646"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x10, 0x0, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c5747c8", 0x0, 0x1000}, 0x28) 05:58:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) 05:58:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) 05:58:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6900) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000851}, 0x24004001) r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r4, 0x208200) openat(r4, &(0x7f0000000100)='./bus\x00', 0x0, 0x23) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffa) 05:58:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0xbb}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x5c}}, 0x0) 05:58:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) 05:58:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) 05:58:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0xbb}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x5c}}, 0x0) 05:58:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) 05:58:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000002000000bfa300000000000007030000fdfdfff67a0af0ffd8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000000000006a0a00fe00000000850000000a000000b70000000000000095000020000000009c050000002c9fbc429adad5ff4c6fa026093e530cf08ee200000000000000076b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c45aa7e2b347a36f5662403e1b2be4cc7c2683118a0d411aa11a9872971c5c56c7060d1e86ac65b0a2cb9cde0100000000000000f32f257e6873eb953ab12bda45c65549f69ca3c00cb9bf4e418d07fa22f0610a70f2bdf400d3ab967e0dd8e263f63223b7b80197aa743fe055193161f45346b100000000000000000089e399f6609876b5887437a172ebc02a748675298b79dc194e533583412dff048fc21f28bcd3e26a5ab2728a0481e9a9628f78785aa78515bded4b1ebbf0da43bb6cfb851ce5a9ff19fff77f4b65b6d6cafe3e64be033c9d2f972cc93c1c13caec04a347c24a9fb6a68afbffffffffffffcb15426415b6e8b14f822e86067a5e991c3b4049670000000000000000000000000000638052d8e3250065c26205a9645bf6c3cf80d991d4f837191b0bc0b650874e160b5c248fc7c54ee490dbcb16af73488858a71be1e3f69b3f96b9b32a325f2957182c477564b9691f9713bea546b0a28c260c4a431e4d13a990a99f49e0a8eb5c3301868f135b651f23366a9ce538cc12dceff25d5f0a7ba04fd1c2f26e04c70d3bdce726d5b0dd4849b51a349c16d60a3c4c333887288dd8a68a9bb73f9e3b2dc8984e3ea0577b8c58326c6f51993a5be441c3c32a39c12d3b5183665297076053c54faa98eae04266b23e0bd5d54504a5fc5634e58a520000000000000000000000000017000000000000000000000000000000fe161d6e0411f6aada7b9182c43fbb4b2e502db683473d5b90020d641d87a5917affe9799b73e3b9d90333ba26fe3660560dc411f97cd333c3c9c71c920a4d10e194a77e9914672b2ae3deaea1d23d73786bdaf4bf45848f9e69d5ae50609858751869eda420e74d09c91327f2a415c87de66e7702d6e8ef1bceaa11276fbbe06b76a79a269f449c95783dab27ed49c2fbf8bc108aaa150505b4d4913655421f6a484765e85225740100372173ae009e1087b9e7b07b0729569463122b65ae2b7500b7fb28c1513095303adec2dc8d0cc2959012d80fb4aa69719ccd3a2804000000506d3d3e5997b5ca53b2c700e9b59e8974532f65514ff62308be3cf69e5154f8e59c924cf973dc3636dda030e7e026e5699e4f2d5e9511510ef07ef3bb0cb32fa83827c7e6f809253915cd56fcdf58e0eb664a04bb9f1f1e503d7c92d597c94b1f2fae3df7680ff56f140e31eff1dafbeadacd98d9e76cae7dac7ce29d80344876936245fbe86c7afb1ad429e94903598b21c42f4235d739f2bbc4aee183053e8adb129fc3ba430e2b487657138ef913312ecfee56d2fdc07526c90f5eafea669b34ff39d7d37e968646"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x10, 0x0, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c5747c8", 0x0, 0x1000}, 0x28) 05:58:07 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) 05:58:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) 05:58:07 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xc0081) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000001c0)={0x252, @time={0xfff}}) 05:58:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000002000000bfa300000000000007030000fdfdfff67a0af0ffd8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000000000006a0a00fe00000000850000000a000000b70000000000000095000020000000009c050000002c9fbc429adad5ff4c6fa026093e530cf08ee200000000000000076b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c45aa7e2b347a36f5662403e1b2be4cc7c2683118a0d411aa11a9872971c5c56c7060d1e86ac65b0a2cb9cde0100000000000000f32f257e6873eb953ab12bda45c65549f69ca3c00cb9bf4e418d07fa22f0610a70f2bdf400d3ab967e0dd8e263f63223b7b80197aa743fe055193161f45346b100000000000000000089e399f6609876b5887437a172ebc02a748675298b79dc194e533583412dff048fc21f28bcd3e26a5ab2728a0481e9a9628f78785aa78515bded4b1ebbf0da43bb6cfb851ce5a9ff19fff77f4b65b6d6cafe3e64be033c9d2f972cc93c1c13caec04a347c24a9fb6a68afbffffffffffffcb15426415b6e8b14f822e86067a5e991c3b4049670000000000000000000000000000638052d8e3250065c26205a9645bf6c3cf80d991d4f837191b0bc0b650874e160b5c248fc7c54ee490dbcb16af73488858a71be1e3f69b3f96b9b32a325f2957182c477564b9691f9713bea546b0a28c260c4a431e4d13a990a99f49e0a8eb5c3301868f135b651f23366a9ce538cc12dceff25d5f0a7ba04fd1c2f26e04c70d3bdce726d5b0dd4849b51a349c16d60a3c4c333887288dd8a68a9bb73f9e3b2dc8984e3ea0577b8c58326c6f51993a5be441c3c32a39c12d3b5183665297076053c54faa98eae04266b23e0bd5d54504a5fc5634e58a520000000000000000000000000017000000000000000000000000000000fe161d6e0411f6aada7b9182c43fbb4b2e502db683473d5b90020d641d87a5917affe9799b73e3b9d90333ba26fe3660560dc411f97cd333c3c9c71c920a4d10e194a77e9914672b2ae3deaea1d23d73786bdaf4bf45848f9e69d5ae50609858751869eda420e74d09c91327f2a415c87de66e7702d6e8ef1bceaa11276fbbe06b76a79a269f449c95783dab27ed49c2fbf8bc108aaa150505b4d4913655421f6a484765e85225740100372173ae009e1087b9e7b07b0729569463122b65ae2b7500b7fb28c1513095303adec2dc8d0cc2959012d80fb4aa69719ccd3a2804000000506d3d3e5997b5ca53b2c700e9b59e8974532f65514ff62308be3cf69e5154f8e59c924cf973dc3636dda030e7e026e5699e4f2d5e9511510ef07ef3bb0cb32fa83827c7e6f809253915cd56fcdf58e0eb664a04bb9f1f1e503d7c92d597c94b1f2fae3df7680ff56f140e31eff1dafbeadacd98d9e76cae7dac7ce29d80344876936245fbe86c7afb1ad429e94903598b21c42f4235d739f2bbc4aee183053e8adb129fc3ba430e2b487657138ef913312ecfee56d2fdc07526c90f5eafea669b34ff39d7d37e968646"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x10, 0x0, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c5747c8", 0x0, 0x1000}, 0x28) 05:58:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6900) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000851}, 0x24004001) r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r4, 0x208200) openat(r4, &(0x7f0000000100)='./bus\x00', 0x0, 0x23) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffa) 05:58:07 executing program 4: socket(0x23, 0x0, 0x2) 05:58:07 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) 05:58:07 executing program 4: unshare(0x600) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000001b80), 0x18) 05:58:07 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f00000005c0)={&(0x7f0000000280)={0x2, 0x0, @rand_addr=0x70}, 0x10, 0x0, 0x0, &(0x7f0000000500)=[@zcopy_cookie={0x12}], 0x18}, 0x40) 05:58:07 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000080)) 05:58:07 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xc0081) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000001c0)={0x252, @time={0xfff}}) 05:58:07 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet(0x2, 0x4000000805, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x18}, 0x0, 0x0, 0x0) 05:58:07 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet(0x2, 0x4000000805, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x18}, 0x0, 0x0, 0x0) 05:58:07 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f00000005c0)={&(0x7f0000000280)={0x2, 0x0, @rand_addr=0x70}, 0x10, 0x0, 0x0, &(0x7f0000000500)=[@zcopy_cookie={0x12}], 0x18}, 0x40) 05:58:07 executing program 4: unshare(0x600) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000001b80), 0x18) 05:58:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x10, 0x0, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c5747c8", 0x0, 0x1000}, 0x28) 05:58:08 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f00000005c0)={&(0x7f0000000280)={0x2, 0x0, @rand_addr=0x70}, 0x10, 0x0, 0x0, &(0x7f0000000500)=[@zcopy_cookie={0x12}], 0x18}, 0x40) 05:58:08 executing program 4: unshare(0x600) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000001b80), 0x18) 05:58:08 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet(0x2, 0x4000000805, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x18}, 0x0, 0x0, 0x0) 05:58:08 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xc0081) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000001c0)={0x252, @time={0xfff}}) 05:58:08 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet(0x2, 0x4000000805, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x18}, 0x0, 0x0, 0x0) 05:58:08 executing program 5: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x2, &(0x7f0000001280)=0x7d, 0x101) fcntl$setpipe(r0, 0x407, 0x0) 05:58:08 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet(0x2, 0x4000000805, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x18}, 0x0, 0x0, 0x0) 05:58:08 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f00000005c0)={&(0x7f0000000280)={0x2, 0x0, @rand_addr=0x70}, 0x10, 0x0, 0x0, &(0x7f0000000500)=[@zcopy_cookie={0x12}], 0x18}, 0x40) 05:58:08 executing program 4: unshare(0x600) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000001b80), 0x18) 05:58:08 executing program 5: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x2, &(0x7f0000001280)=0x7d, 0x101) fcntl$setpipe(r0, 0x407, 0x0) 05:58:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0'}, 0xb) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4003012, r1, 0x0) 05:58:08 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet(0x2, 0x4000000805, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x18}, 0x0, 0x0, 0x0) 05:58:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x81}]}]}, 0x60}}, 0x0) 05:58:08 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet(0x2, 0x4000000805, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x18}, 0x0, 0x0, 0x0) 05:58:08 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={0x0, 0xffff1f00, 0x800, 0x0, 0x1}, 0x20) 05:58:08 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xc0081) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000001c0)={0x252, @time={0xfff}}) 05:58:08 executing program 5: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x2, &(0x7f0000001280)=0x7d, 0x101) fcntl$setpipe(r0, 0x407, 0x0) 05:58:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0'}, 0xb) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4003012, r1, 0x0) 05:58:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x81}]}]}, 0x60}}, 0x0) 05:58:08 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={0x0, 0xffff1f00, 0x800, 0x0, 0x1}, 0x20) 05:58:08 executing program 5: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x2, &(0x7f0000001280)=0x7d, 0x101) fcntl$setpipe(r0, 0x407, 0x0) 05:58:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0'}, 0xb) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4003012, r1, 0x0) 05:58:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x81}]}]}, 0x60}}, 0x0) 05:58:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) unshare(0x20000400) ioctl$TIOCSLCKTRMIOS(r0, 0x545d, 0x0) 05:58:08 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={0x0, 0xffff1f00, 0x800, 0x0, 0x1}, 0x20) 05:58:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0x4, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x24}}, 0x0) 05:58:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) unshare(0x20000400) ioctl$TIOCSLCKTRMIOS(r0, 0x545d, 0x0) 05:58:08 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={0x0, 0xffff1f00, 0x800, 0x0, 0x1}, 0x20) 05:58:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0'}, 0xb) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4003012, r1, 0x0) 05:58:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x81}]}]}, 0x60}}, 0x0) 05:58:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0x4, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x24}}, 0x0) 05:58:08 executing program 2: r0 = socket(0x15, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x2, 0x0, @fixed}, 0xe) 05:58:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) unshare(0x20000400) ioctl$TIOCSLCKTRMIOS(r0, 0x545d, 0x0) 05:58:08 executing program 4: pselect6(0x40, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0) 05:58:08 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0x1) 05:58:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) unshare(0x20000400) ioctl$TIOCSLCKTRMIOS(r0, 0x545d, 0x0) 05:58:08 executing program 2: r0 = socket(0x15, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x2, 0x0, @fixed}, 0xe) 05:58:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0x4, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x24}}, 0x0) 05:58:08 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000002e80)=[{{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000000040)="c59f69ab2cd4cbfc9aca3da4a801181e440829a01aea1d8edcc87039fb74f5540cb46d71d27c01ff41b018f628860f6548f6f8af3692300a6a661a53ac67c57f5b0d6a09631321cd16656ae39d697db51d6906752d3e6c9536ca492a9a883131bc4ec0c94eaa06715b9c9a0039f8e82a5f85e44da48632e4e7827e75a81f4a11f6ced797bc71549e62b8466553259a094fee645ccd0284762712514d9b95587f9891250088d8b3327956a4cf7caa1b295ff4812226782b9d60f8f03691b72694f09b4a389d09a6ca02a5386975ebe1fe99", 0xd1}], 0x1, 0x0, 0x190}}], 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x400454ca, &(0x7f0000000100)={0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454c9, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x400454c8, 0x0) 05:58:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0x4, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x24}}, 0x0) 05:58:08 executing program 2: r0 = socket(0x15, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x2, 0x0, @fixed}, 0xe) 05:58:08 executing program 5: r0 = io_uring_setup(0x2096, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x13, 0x20000000, r1) 05:58:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setrlimit(0x8, &(0x7f0000000040)={0x0, 0x3}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x47c10, 0x0, 0x1f4) r1 = signalfd4(r0, 0xfffffffffffffffd, 0x0, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1800000033000100000000000000000b06a45f00cc000000"], 0x18}}, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f00000002c0)={0x14a, 0x6, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x6, 0x2, @loopback, 0x1f}, 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000400) 05:58:08 executing program 2: r0 = socket(0x15, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x2, 0x0, @fixed}, 0xe) [ 94.360072][ T2822] tun0: tun_chr_ioctl cmd 1074025672 [ 94.365418][ T2822] tun0: ignored: set checksum enabled 05:58:08 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x4000}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x8) 05:58:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x21, 0x0) 05:58:08 executing program 2: eventfd(0x6) r0 = syz_io_uring_setup(0x1c87, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) 05:58:08 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x23, &(0x7f0000000000), &(0x7f0000000040)=0x28) 05:58:08 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000002e80)=[{{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000000040)="c59f69ab2cd4cbfc9aca3da4a801181e440829a01aea1d8edcc87039fb74f5540cb46d71d27c01ff41b018f628860f6548f6f8af3692300a6a661a53ac67c57f5b0d6a09631321cd16656ae39d697db51d6906752d3e6c9536ca492a9a883131bc4ec0c94eaa06715b9c9a0039f8e82a5f85e44da48632e4e7827e75a81f4a11f6ced797bc71549e62b8466553259a094fee645ccd0284762712514d9b95587f9891250088d8b3327956a4cf7caa1b295ff4812226782b9d60f8f03691b72694f09b4a389d09a6ca02a5386975ebe1fe99", 0xd1}], 0x1, 0x0, 0x190}}], 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x400454ca, &(0x7f0000000100)={0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454c9, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x400454c8, 0x0) 05:58:08 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x4000}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x8) 05:58:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x21, 0x0) 05:58:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x21, 0x0) [ 94.564501][ T24] kauditd_printk_skb: 19 callbacks suppressed [ 94.564515][ T24] audit: type=1400 audit(1639893488.964:210): avc: denied { connect } for pid=2850 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 94.590330][ T24] audit: type=1400 audit(1639893488.964:211): avc: denied { write } for pid=2850 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 05:58:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x21, 0x0) 05:58:09 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x23, &(0x7f0000000000), &(0x7f0000000040)=0x28) [ 94.624096][ T2852] tun0: tun_chr_ioctl cmd 1074025672 [ 94.629472][ T2852] tun0: ignored: set checksum enabled 05:58:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setrlimit(0x8, &(0x7f0000000040)={0x0, 0x3}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x47c10, 0x0, 0x1f4) r1 = signalfd4(r0, 0xfffffffffffffffd, 0x0, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1800000033000100000000000000000b06a45f00cc000000"], 0x18}}, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f00000002c0)={0x14a, 0x6, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x6, 0x2, @loopback, 0x1f}, 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000400) 05:58:09 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x4000}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x8) 05:58:09 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x23, &(0x7f0000000000), &(0x7f0000000040)=0x28) 05:58:09 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x2, 0x0, 0x0) 05:58:09 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000002e80)=[{{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000000040)="c59f69ab2cd4cbfc9aca3da4a801181e440829a01aea1d8edcc87039fb74f5540cb46d71d27c01ff41b018f628860f6548f6f8af3692300a6a661a53ac67c57f5b0d6a09631321cd16656ae39d697db51d6906752d3e6c9536ca492a9a883131bc4ec0c94eaa06715b9c9a0039f8e82a5f85e44da48632e4e7827e75a81f4a11f6ced797bc71549e62b8466553259a094fee645ccd0284762712514d9b95587f9891250088d8b3327956a4cf7caa1b295ff4812226782b9d60f8f03691b72694f09b4a389d09a6ca02a5386975ebe1fe99", 0xd1}], 0x1, 0x0, 0x190}}], 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x400454ca, &(0x7f0000000100)={0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454c9, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x400454c8, 0x0) 05:58:09 executing program 2: eventfd(0x6) r0 = syz_io_uring_setup(0x1c87, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) [ 95.217794][ T24] audit: type=1400 audit(1639893489.624:212): avc: denied { create } for pid=2868 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 95.237691][ T24] audit: type=1400 audit(1639893489.624:213): avc: denied { setopt } for pid=2868 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 95.240779][ T2871] tun0: tun_chr_ioctl cmd 1074025672 [ 95.262815][ T2871] tun0: ignored: set checksum enabled 05:58:09 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x4000}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x8) 05:58:09 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x23, &(0x7f0000000000), &(0x7f0000000040)=0x28) 05:58:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 05:58:09 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x2, 0x0, 0x0) 05:58:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 05:58:09 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x2, 0x0, 0x0) 05:58:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setrlimit(0x8, &(0x7f0000000040)={0x0, 0x3}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x47c10, 0x0, 0x1f4) r1 = signalfd4(r0, 0xfffffffffffffffd, 0x0, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1800000033000100000000000000000b06a45f00cc000000"], 0x18}}, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f00000002c0)={0x14a, 0x6, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x6, 0x2, @loopback, 0x1f}, 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000400) 05:58:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 05:58:10 executing program 4: getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x8, 0x10}, &(0x7f0000000280)=0xc) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000038000180060001000a000000080005000000d27509000700000000000000000008000900710000000700060073680000080008"], 0x4c}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0xb0, r2, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0xa}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40010}, 0x4044000) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0xa0, r2, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x16}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3a}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x57}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0x10}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x2d}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4010}, 0x2e4e5db8162393fa) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000011"], 0x54}}, 0x0) 05:58:10 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x2, 0x0, 0x0) 05:58:10 executing program 2: eventfd(0x6) r0 = syz_io_uring_setup(0x1c87, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) 05:58:10 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000002e80)=[{{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000000040)="c59f69ab2cd4cbfc9aca3da4a801181e440829a01aea1d8edcc87039fb74f5540cb46d71d27c01ff41b018f628860f6548f6f8af3692300a6a661a53ac67c57f5b0d6a09631321cd16656ae39d697db51d6906752d3e6c9536ca492a9a883131bc4ec0c94eaa06715b9c9a0039f8e82a5f85e44da48632e4e7827e75a81f4a11f6ced797bc71549e62b8466553259a094fee645ccd0284762712514d9b95587f9891250088d8b3327956a4cf7caa1b295ff4812226782b9d60f8f03691b72694f09b4a389d09a6ca02a5386975ebe1fe99", 0xd1}], 0x1, 0x0, 0x190}}], 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x400454ca, &(0x7f0000000100)={0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454c9, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x400454c8, 0x0) 05:58:10 executing program 1: prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffd000/0x1000)=nil) 05:58:10 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0xd, 0x2, &(0x7f0000000740)=@raw=[@call={0x85, 0x0, 0x0, 0x8f}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:58:10 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0xd, 0x2, &(0x7f0000000740)=@raw=[@call={0x85, 0x0, 0x0, 0x8f}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 96.029096][ T2893] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 05:58:10 executing program 1: r0 = epoll_create(0x3fe) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = syz_io_uring_setup(0x2de7, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r2, 0x302, 0x0, 0x0, 0x0, 0x0) r5 = fcntl$dupfd(r1, 0x0, r0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f0000000040)) [ 96.080716][ T24] audit: type=1400 audit(1639893490.474:214): avc: denied { prog_load } for pid=2901 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 05:58:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 05:58:10 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0xd, 0x2, &(0x7f0000000740)=@raw=[@call={0x85, 0x0, 0x0, 0x8f}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 96.198131][ T2904] tun0: tun_chr_ioctl cmd 1074025672 [ 96.203499][ T2904] tun0: ignored: set checksum enabled 05:58:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setrlimit(0x8, &(0x7f0000000040)={0x0, 0x3}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x47c10, 0x0, 0x1f4) r1 = signalfd4(r0, 0xfffffffffffffffd, 0x0, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1800000033000100000000000000000b06a45f00cc000000"], 0x18}}, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f00000002c0)={0x14a, 0x6, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x6, 0x2, @loopback, 0x1f}, 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000400) 05:58:11 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0xd, 0x2, &(0x7f0000000740)=@raw=[@call={0x85, 0x0, 0x0, 0x8f}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:58:11 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=@can={{}, 0x0, 0x0, 0x0, 0x0, "abd33d777b15138e"}, 0x10}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002300)=[{{0x0, 0x0, &(0x7f0000000a40)}}, {{0x0, 0x0, &(0x7f0000001800)=[{0x0}, {&(0x7f00000012c0)=""/199, 0xc7}], 0x2}}], 0x2, 0x10122, 0x0) recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)=""/206, 0x2000000}}], 0x2e4, 0x43, 0x0) 05:58:11 executing program 5: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:11 executing program 2: eventfd(0x6) r0 = syz_io_uring_setup(0x1c87, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) 05:58:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x2}, 0x20) 05:58:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x2}, 0x20) 05:58:11 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=@can={{}, 0x0, 0x0, 0x0, 0x0, "abd33d777b15138e"}, 0x10}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002300)=[{{0x0, 0x0, &(0x7f0000000a40)}}, {{0x0, 0x0, &(0x7f0000001800)=[{0x0}, {&(0x7f00000012c0)=""/199, 0xc7}], 0x2}}], 0x2, 0x10122, 0x0) recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)=""/206, 0x2000000}}], 0x2e4, 0x43, 0x0) [ 96.824236][ T24] audit: type=1400 audit(1639893491.234:215): avc: denied { read } for pid=2917 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 05:58:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x103042, 0x0) syz_mount_image$ext4(&(0x7f00000012c0)='ext2\x00', &(0x7f0000001440)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x9000, &(0x7f0000001500)) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8838, &(0x7f00000002c0)) 05:58:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x2}, 0x20) 05:58:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x2}, 0x20) 05:58:11 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=@can={{}, 0x0, 0x0, 0x0, 0x0, "abd33d777b15138e"}, 0x10}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002300)=[{{0x0, 0x0, &(0x7f0000000a40)}}, {{0x0, 0x0, &(0x7f0000001800)=[{0x0}, {&(0x7f00000012c0)=""/199, 0xc7}], 0x2}}], 0x2, 0x10122, 0x0) recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)=""/206, 0x2000000}}], 0x2e4, 0x43, 0x0) [ 96.906549][ T24] audit: type=1400 audit(1639893491.274:216): avc: denied { ioctl } for pid=2920 comm="syz-executor.5" path="socket:[19926]" dev="sockfs" ino=19926 ioctlcmd=0x6607 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.931653][ T24] audit: type=1400 audit(1639893491.314:217): avc: denied { mount } for pid=2920 comm="syz-executor.5" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 97.035080][ T24] audit: type=1400 audit(1639893491.394:218): avc: denied { mounton } for pid=2932 comm="syz-executor.4" path="/root/syzkaller-testdir300269628/syzkaller.pDfIB2/79/file0" dev="sda1" ino=1176 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 97.062081][ T24] audit: type=1400 audit(1639893491.394:219): avc: denied { unmount } for pid=1829 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 05:58:12 executing program 2: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=@can={{}, 0x0, 0x0, 0x0, 0x0, "abd33d777b15138e"}, 0x10}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002300)=[{{0x0, 0x0, &(0x7f0000000a40)}}, {{0x0, 0x0, &(0x7f0000001800)=[{0x0}, {&(0x7f00000012c0)=""/199, 0xc7}], 0x2}}], 0x2, 0x10122, 0x0) recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)=""/206, 0x2000000}}], 0x2e4, 0x43, 0x0) 05:58:12 executing program 5: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 0: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 4: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 3: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 5: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 1: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 3: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 2: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 0: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 4: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 2: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 5: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 3: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 1: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 0: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 4: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 2: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 5: unshare(0x20400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = dup2(r0, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x2, r3, 0x0) 05:58:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x80, &(0x7f0000000080)=""/128, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 05:58:12 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000002900)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000), &(0x7f0000000040)=0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, @dev, @private2}}) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) 05:58:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f00000000c0)={@empty}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000180)=""/62, 0x3e}], 0x1, 0x2, 0x0) 05:58:12 executing program 1: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x80, &(0x7f0000000080)=""/128, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 05:58:12 executing program 5: unshare(0x20400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = dup2(r0, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x2, r3, 0x0) 05:58:12 executing program 2: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x80, &(0x7f0000000080)=""/128, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 05:58:12 executing program 5: unshare(0x20400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = dup2(r0, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x2, r3, 0x0) 05:58:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f00000000c0)={@empty}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000180)=""/62, 0x3e}], 0x1, 0x2, 0x0) 05:58:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x80, &(0x7f0000000080)=""/128, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 05:58:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f00000000c0)={@empty}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000180)=""/62, 0x3e}], 0x1, 0x2, 0x0) 05:58:12 executing program 5: unshare(0x20400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = dup2(r0, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x2, r3, 0x0) 05:58:12 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000002900)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000), &(0x7f0000000040)=0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, @dev, @private2}}) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) 05:58:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, 0x0, 0x0) 05:58:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f00000000c0)={@empty}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000180)=""/62, 0x3e}], 0x1, 0x2, 0x0) 05:58:12 executing program 5: r0 = creat(&(0x7f0000000540)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x2000001) 05:58:12 executing program 2: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @llc={0x1a, 0x0, 0x13, 0x0, 0x0, 0x0, @random="e09a3d669e4a"}, @nl=@unspec}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x91284000) getuid() openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') fsetxattr$security_evm(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "2c4e5eddad83324097ff6c6804491d6a"}, 0x11, 0x2) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 05:58:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f05", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x5, [@func, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x8d}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:58:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, 0x0, 0x0) 05:58:12 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x4, 0x4) 05:58:12 executing program 5: r0 = creat(&(0x7f0000000540)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x2000001) 05:58:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00'}) 05:58:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, 0x0, 0x0) 05:58:12 executing program 5: r0 = creat(&(0x7f0000000540)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x2000001) 05:58:12 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000002900)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000), &(0x7f0000000040)=0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, @dev, @private2}}) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) 05:58:12 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000019c0)=[{}], &(0x7f0000002d00)=0x8) 05:58:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, 0x0, 0x0) 05:58:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00'}) 05:58:12 executing program 5: r0 = creat(&(0x7f0000000540)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x2000001) 05:58:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8}, {0x4, 0x4}]}]}, 0x2c}}, 0x0) 05:58:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f00000003c0)={{r2}, 0x0, 0x1a, @unused=[0x81, 0x0, 0x9b47, 0x3], @name="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"}) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @remote, 0x8}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0xd, &(0x7f0000000080)={r3}, 0x8) 05:58:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00'}) 05:58:15 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000019c0)=[{}], &(0x7f0000002d00)=0x8) 05:58:15 executing program 1: set_mempolicy(0x2, &(0x7f0000001ac0)=0x1, 0x1000) r0 = socket(0x2, 0x803, 0x9) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @dev, 0x0, 0x2f020000}, @l2={0x1f, 0x0, @fixed}, 0x96}) 05:58:15 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000002900)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000), &(0x7f0000000040)=0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, @dev, @private2}}) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) 05:58:15 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) poll(&(0x7f00000000c0)=[{r1, 0x4755}, {r0}, {r2, 0x1f8}], 0x3, 0x0) 05:58:15 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000019c0)=[{}], &(0x7f0000002d00)=0x8) [ 101.201039][ T24] kauditd_printk_skb: 19 callbacks suppressed [ 101.201050][ T24] audit: type=1326 audit(1639893495.614:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3048 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f956286be99 code=0x7ffc0000 05:58:15 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000019c0)=[{}], &(0x7f0000002d00)=0x8) 05:58:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f00000003c0)={{r2}, 0x0, 0x1a, @unused=[0x81, 0x0, 0x9b47, 0x3], @name="eba3355d83b9ec914198c52c08f0fad05011db25a153a41a60e89ac6c50da220b8c9f9bbe9fc369610901254ceecbbcdef3f700c80bf30d7bc995d0ec1218db1adff4deec22581217586736fb3b1086360a7cf8f8415aaceb060cc287c68f9eba9fd0ef78553cd95c52654d52a5312aebde182b7096777750410181b958ea4b959f9912b4a3c9a35b2b013f37f48112a9c249687098e21a69fc39415484f568c2d5d34266fcb7d4fd83e74966c85156af958804c272e801468fe46a73b96a7bd2e0bb4a30bcb160c5d5b88b8918ca108e2195f18eb0bf20c7dfb8b3bcdacbc0f4656ac070056899f96432569774c510a8d7b004bded8085627f1d5cd933e72408279d7ae5a86b5252bc6751be21dca938956dcd0d3d2dcb8dc01ea44d7ca1fb91d955cddc3a5a48c4885146dccf269c31d6544da8de8e84ce2c22fb42f28cf4647f28f5e5f82afb69fa02c3f0f4d0d087f04551c429082a0a1297b5de3e116176c4587b73a625deac8bd7706a8d8f2a031b3150f97ee8dc1755613ded215957a13e304e49b46630f4fe2e89f2978cb1804eb766e68cf33ab5e308d7869a31ffb4e5e05993cc8c7948a8ee4e9f554324fefd6f9a1138834e2a9c87a998c91dd5abd06767aadff0b863ddb142b6c346c44cfcf9d1a5e719ca70822c32b90076916583125ce2b0c1c5a3cb3c66012801a4b86fa970bd5f482e5257c2f925644cfda0e086200f30086bfa19e3222f8ee74bd8feb9b96eb4978b11ccb4888bd652c4c8796508e8331f16788ea8116d9cf23d26a01a1029f6d5df10a3d9a590a60e9ce5bbb43c187ac4799a858ce169ef96ceebd092eadb30ea301c1ad54236c8b0bf9acb461d9d52e21c4386656834dddb26629476a290bdf7dbdd362843c144af9ab692b6eff0cce849d5187abe2ca8ee385ba83f084a4cb1d1fa9adf0a9c1b629791751d93893eaf1a832d29f412a72067fa31eee89aee69778f457b76052ee40dc4dfecd7ef5e01ef908fe9ea4ed9e409a3b3fbd80e12574109656f6aaba11eec63e61fae857f8a64f571c164374a232053beeb82e5d4db3bc1ed1c80eaf690d47a9bb2107d753435b249a139c176bafc9328f55892e7415eebde7456db99faba2c8448ea6620156d60da583da155f6e0f65e6af3c9a763e6e6213264fc296df6a291708a258280df43530a712a55c6b76495c06229a8f036f8a7e256255103aef6894b788336934cfc737c83641371f954f898534abb2e7fec622ab2d4e6d97d0fb85252ecfb06bc542e7d0502f7d0e1610ae05fce7f41b665f813cda0a9ad42b774ae24f065482bdbfd5edfff6cebfa97d6d6d1bc8168a93d2ad2f8223408a72c42bd529ec0bd05f356c5e5f38458e718f630e656c82a294501cdc71ba8318537d3f2459c64535c4f27ff520228529f2b1b4cf63b78aa4057fe5947fe6939e80644087f4f725e13e4b02babe63e1b9fd1ea25d348f0c35ec239e339f2df4c56ccfa90903893afb53cad213b1a225e37b71655eec17ffa95ef8d1d114e17e75c7408ab5db49b7d07b22297439cfdde26664c022dd96da0e327064c2fd567536797fac5cfa22204ea40dbda01d50c9cec9da032aa2d1ac1a519a10bf869c6e83a72ca01808669c196fe9473884fd723f01d19d87c59b2ca17603dd41dab0184b69d254708ca82f8ec3be2e98dad477899134a6f7955eaa55446a14f95a8b01c76c5dde46434aeadbc3fa28317d60d6a6b3ba2f54e10869c9a4c2b9a872aa31f0f89dfd621a33f020f41bfcfea7ff9d08d3d76ec3c924e465de72e328b6d74cfe40438aed634da833d6d81e27bef2ed12419f52ca36db8e9dd69502620daca3be06fcec215215ae063deac143213d6d8f01ac8d29eb28fe4a92a9c17dcdc390ec22dc6c4eb6e4be4e017b0e1445b61484b1b5f9b81228fc73ee4ceb3823a2dd248b2286c8f930d93532cd8301d968053f6808d5368a6f380f0b8c532a5abcfb6c960d68aa8da4288327f71eead5e60b7de98ddbdcb27ea40b7c830f96fb1bdcdc6918d93fdfeea820d7a6aaefe7361b8f95c5d9760a1bac9e1842e491edeb0e67f125eb2e2bfe937a1c7c334a3b91ab9717f6e313f1f531e8a1e6a5567febf7a6a238e05d2391732f0c8c9209d8f0b84800a6a2f94a0f4f57807658d60942d3c8801db9bdca1da7a125b35fe31e8597f57caeb1a6b67ad83c058307a14aff7c5fd76c757bb642aceed342f3629b523b154d690a518dd5b842575ac732fda456c10d41d1e6ef305dc33d119ee19f53ec829dd7abcf054088c4cee70f8efbd95595e8f13deeb0380a3abff107a99b055bdb432d7fba570666c659d101222fce2e720e1112d8bfc56b8bd9de9f05cd80a076defc6c54c18c4d867cf8c832cc535bd2be7342b726694f1f2da5f74866d9fd4341293bb7d6bafcdb903c69a7455d6c950f4121d3992b6a50acd5e302e1b6b9d842f5508e00d819e4142c3bbae6a91552c3b70eeb798e0ea1d1e81f2a53f12bf8783fc0a5f84f33e932eacd6dbaf13c221a55162fa2799d1316ae0e33ab81cb65fd26154f1c7572ec0b39adb96e204c03535af4f4f0a0559b362eb4850120a62f1a06c15684200c50b18ceb660dcd4233b24bcc25857ef5ac5e53586f329bac2a997b049a0bd3963b35203955b9ec522dc528c50f1dae735e9ced0ece81e8ec96343bbc73c93ed6e1d0c15414563fc362d72f4ed2d0060ca4b11a1422609c5e301f9b3afd01be10fd349b5b6dc85d6cc3524a4a223980db4f028b0d0ee9e0d80d87b72c55df22dd3e6c18dd1beb43fe8965c7f134e8afef2fa8143d43104b9cd59ee478ac43d13a76dcff003dbfdd2350e6aa9fde32285b40dc331610a0f127fee09f94c06a1e998b25e17e1a4530cd9411517f9f94a1700a90ddd9b5a3d681d1e8f4cb214b4e18b655fb3ffb1eb9e8bd8be854414eafef8e683f84e94a1ab764f9366ee6ea2289f681db843470f8c74868fa63e5e7f74f18dc4396c456c51642da55451635d4d67523b72962b106642d475239cfb7b375bcef940358db50e2cedb76ce7b89f5ea79e2a48e59cefd48c303a9b772b6752ca923c324ef66915411cce281dca7884863fe784d12c6b75e6c71f0822a2e5f814d0fd37dfbc0b5e00a9afe1a5063c144aa36111908e73e76c1fec5a6dc8ee95d9c2f73c27920471e41b6e582493b4e764801a9376c113fbeabe6b0bd3772ae5d14547c05cebd5f54024d52ff616a80afd739a465e364fcc4e5722256ba29ba3dc6301c2ae5f343730fbe4c09565a907d0046f9851f13106c90130ac7644cb59fc58c39fd21b2d8912bb2dc77541a679404bba4f96b935f6d7b1c0722e874f9c35adfa005d8259cf13f8828a05c351ae18202aab151b592e83198f184e790d3e7ec2431ead4e37c6b61535da256442a9f80f69d4e727927533629d06bbe1cde9020a79729907a742c62cac4ff3b92c2c5dd350f2931bda8c5075c9807065a9c35a7b656e87fad73e1f7e7768b8dfec49bb66d492936e712e3a632600d37fed620e19744e09bf0d4d4aafcba396f1b64cb2d5e838818b8e4aaf67005b7525047f2276315cb9709706fdd4721adbff682ac91afafe9cd2b2a23a74c987539e145d0b16247b34ec43c094c9c9e7835dd06f8aadf0e371628f1ccd8d6b081f20649c02515833c966aafe50b758bb60b36862b7cc58d76bcfed52877d552baaa7d75a87037d2b59a5cba5e4d1ab0c88d060d84e83c5ebb4a09f330039108c834fea524725fdc5f55273664d0256312cf36a9893de8632c098ecc39f749a89ef00534b908c07a86988c318b4d6d97b655e1a5d511fb2ccb9a8941bd945d2ea9e733e1dba221ccd380f7d3eb9f5ca1af3ddb3112585ee0b9998511a0284a2145434073818b4b70a10486cae0bf1d01db962ce9500285269daf983998d754b42defe5480deef18273eea90df576d8f1e15fdb98aaf1a0b028924f68dce0cec94cdc1e77cfbc652daba9830b34bea567e8d9fa26f006c37c509b8d3afd0811437b061f3ba2281da188585d473383be58f9bc407c92c1cf4cf04ed5295bccbb32c329ba939b7ff8ca5b341c53d875cad5b3242a2c4de2159cb51a96209fd070706bf14744d4b4056743af8e7c02ee509b5e22c57ba66b6be4fb726594c777daedc85e85d66e1676e585dee120f7ecd3c1fdb8579a3874acbae519f8faaca8558f7f2a4ea4ffb4b10005f0367b8146bdfd8bde011563dd4cd21d8912df048390e0883f10c31d368a49b59d15f172f386ec778a6de0f4772899e31b2cda000a8f88c0f775bc09f799afb71723c59b629c54f0bfb1ab2643fe1bb430976f14510fdff83cfb103f61478830d505305fc45759574aa0b92e3d058e6392bc66b1671eb39ee7b01b07884ba417416f62e5fac34ab2976aea6900aba6ba413d073da38875ab4a0333a4f5d79ae4fabf4506a2ed69f2b9ab67244a2fe298865e40fa240d400e946afbddb029c9eb79569f6c3c6fe9a549f83feeb3c33d7d6ba05b55d99ed18d646c85a1bbefa87a66224b9f3c0291f8fee5b15233a3eda284b40997cd3e8d6b7a2e000b6f46615442d45648c6581d1c8638d28d3c126d4b0ee4677e124f853289832687c3baab2744bf76b02ae7a3b0bfe99a000699b65243694fe8bc9b24dd7dbe27e8b5f2af32704cb8276da145dea19c4bce052464494059e159f891453b24a18c4d470fd19bab04830e71f3be1dd36d0d699e410121b6e7a559aae59c9d98be21447aada793ea5d9d25ce68f94acbd0001e8caee853b07a073a3aaff03998df78d95a831f94634e337e16956ad586e2ae2444a6ff2c33629b26d56c3a4510317a238a77da8c1b9293fea08bf51a09bb5a01a02c7a6479b454a87e7febefc5849b680c554c96dbb3d4de1331988ecde1fe477008dff6508f7d175b6fc6bab39180304bfefe22bfd78c7f62a3f1b296a67be2210cfc7cea637327b836c40f63ca0c8793a3551cda8be656ceadaea7f7052992f3a7b51e8dd886ee8b17af02369557b077eb1f953463613bbb7d98dd3517f79b956fd7c92b6af8607dfd21702c459cff80052a5580bbda2816f61c233d39056a9a1a2c5bae8b09069f517cfe2d968b44f3e7f79e37a75a99df975c260a78b3996d1390c2bfc55ea7b55728f1bf88d9f8b73b65007675156ad68e9fb0eb4305bbd77637502cd363848df58da6d097220f6ccdd6d53264c15f7d2fc385e6ca5fb72918db6d488144fa1c532adcca25c2e24c4444bbd3db994f6bc832825ab0ed9c14b20f8dd3e2f1786689dce3920185f31e0aecd9b595962005c4617f651ab6cb602d968581ffd1b18ca3b2861d91832c0ceaf876d28ad0b096a1dc0d07a3b8bf4bd020c1bd35e0bff5a03a13137da6e5819b211c40d878c3f01c10ade7e7e88b53658ea34a3efb2f7949e9130c352367e2f7c31a9d82b2beb99a19a7a8ffd3d912ed513839e83aed779c29a6a764c1c8244642711a253c33ee42023be7c79791deaa393b08868f16350474d9e53161688b1d45000e77edcb49fb35c98e0b56de1d1c85a65a58ce0efb1ccac35177914dcaa912e354afe1d4774c126113de00c0516def8cbcd7bd6c451acc5b43080eda65d1acc6cbe5a71362169df5adca434f913597f435db15d4fe5c02ca62d389481f334773dc0661070dd05e62c54025ca9a1e37203b51bc6b8c3f0a71b0e03e40433b"}) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @remote, 0x8}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0xd, &(0x7f0000000080)={r3}, 0x8) [ 101.240361][ T24] audit: type=1326 audit(1639893495.654:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3048 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f956286be99 code=0x7ffc0000 [ 101.264176][ T24] audit: type=1326 audit(1639893495.654:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3048 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f956286be99 code=0x7ffc0000 05:58:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8}, {0x4, 0x4}]}]}, 0x2c}}, 0x0) 05:58:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00'}) 05:58:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = syz_io_uring_setup(0x83, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 05:58:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8}, {0x4, 0x4}]}]}, 0x2c}}, 0x0) [ 101.288138][ T24] audit: type=1326 audit(1639893495.654:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3048 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f956286be99 code=0x7ffc0000 [ 101.311895][ T24] audit: type=1326 audit(1639893495.654:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3048 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f956286be99 code=0x7ffc0000 05:58:15 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) poll(&(0x7f00000000c0)=[{r1, 0x4755}, {r0}, {r2, 0x1f8}], 0x3, 0x0) 05:58:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f00000003c0)={{r2}, 0x0, 0x1a, @unused=[0x81, 0x0, 0x9b47, 0x3], @name="eba3355d83b9ec914198c52c08f0fad05011db25a153a41a60e89ac6c50da220b8c9f9bbe9fc369610901254ceecbbcdef3f700c80bf30d7bc995d0ec1218db1adff4deec22581217586736fb3b1086360a7cf8f8415aaceb060cc287c68f9eba9fd0ef78553cd95c52654d52a5312aebde182b7096777750410181b958ea4b959f9912b4a3c9a35b2b013f37f48112a9c249687098e21a69fc39415484f568c2d5d34266fcb7d4fd83e74966c85156af958804c272e801468fe46a73b96a7bd2e0bb4a30bcb160c5d5b88b8918ca108e2195f18eb0bf20c7dfb8b3bcdacbc0f4656ac070056899f96432569774c510a8d7b004bded8085627f1d5cd933e72408279d7ae5a86b5252bc6751be21dca938956dcd0d3d2dcb8dc01ea44d7ca1fb91d955cddc3a5a48c4885146dccf269c31d6544da8de8e84ce2c22fb42f28cf4647f28f5e5f82afb69fa02c3f0f4d0d087f04551c429082a0a1297b5de3e116176c4587b73a625deac8bd7706a8d8f2a031b3150f97ee8dc1755613ded215957a13e304e49b46630f4fe2e89f2978cb1804eb766e68cf33ab5e308d7869a31ffb4e5e05993cc8c7948a8ee4e9f554324fefd6f9a1138834e2a9c87a998c91dd5abd06767aadff0b863ddb142b6c346c44cfcf9d1a5e719ca70822c32b90076916583125ce2b0c1c5a3cb3c66012801a4b86fa970bd5f482e5257c2f925644cfda0e086200f30086bfa19e3222f8ee74bd8feb9b96eb4978b11ccb4888bd652c4c8796508e8331f16788ea8116d9cf23d26a01a1029f6d5df10a3d9a590a60e9ce5bbb43c187ac4799a858ce169ef96ceebd092eadb30ea301c1ad54236c8b0bf9acb461d9d52e21c4386656834dddb26629476a290bdf7dbdd362843c144af9ab692b6eff0cce849d5187abe2ca8ee385ba83f084a4cb1d1fa9adf0a9c1b629791751d93893eaf1a832d29f412a72067fa31eee89aee69778f457b76052ee40dc4dfecd7ef5e01ef908fe9ea4ed9e409a3b3fbd80e12574109656f6aaba11eec63e61fae857f8a64f571c164374a232053beeb82e5d4db3bc1ed1c80eaf690d47a9bb2107d753435b249a139c176bafc9328f55892e7415eebde7456db99faba2c8448ea6620156d60da583da155f6e0f65e6af3c9a763e6e6213264fc296df6a291708a258280df43530a712a55c6b76495c06229a8f036f8a7e256255103aef6894b788336934cfc737c83641371f954f898534abb2e7fec622ab2d4e6d97d0fb85252ecfb06bc542e7d0502f7d0e1610ae05fce7f41b665f813cda0a9ad42b774ae24f065482bdbfd5edfff6cebfa97d6d6d1bc8168a93d2ad2f8223408a72c42bd529ec0bd05f356c5e5f38458e718f630e656c82a294501cdc71ba8318537d3f2459c64535c4f27ff520228529f2b1b4cf63b78aa4057fe5947fe6939e80644087f4f725e13e4b02babe63e1b9fd1ea25d348f0c35ec239e339f2df4c56ccfa90903893afb53cad213b1a225e37b71655eec17ffa95ef8d1d114e17e75c7408ab5db49b7d07b22297439cfdde26664c022dd96da0e327064c2fd567536797fac5cfa22204ea40dbda01d50c9cec9da032aa2d1ac1a519a10bf869c6e83a72ca01808669c196fe9473884fd723f01d19d87c59b2ca17603dd41dab0184b69d254708ca82f8ec3be2e98dad477899134a6f7955eaa55446a14f95a8b01c76c5dde46434aeadbc3fa28317d60d6a6b3ba2f54e10869c9a4c2b9a872aa31f0f89dfd621a33f020f41bfcfea7ff9d08d3d76ec3c924e465de72e328b6d74cfe40438aed634da833d6d81e27bef2ed12419f52ca36db8e9dd69502620daca3be06fcec215215ae063deac143213d6d8f01ac8d29eb28fe4a92a9c17dcdc390ec22dc6c4eb6e4be4e017b0e1445b61484b1b5f9b81228fc73ee4ceb3823a2dd248b2286c8f930d93532cd8301d968053f6808d5368a6f380f0b8c532a5abcfb6c960d68aa8da4288327f71eead5e60b7de98ddbdcb27ea40b7c830f96fb1bdcdc6918d93fdfeea820d7a6aaefe7361b8f95c5d9760a1bac9e1842e491edeb0e67f125eb2e2bfe937a1c7c334a3b91ab9717f6e313f1f531e8a1e6a5567febf7a6a238e05d2391732f0c8c9209d8f0b84800a6a2f94a0f4f57807658d60942d3c8801db9bdca1da7a125b35fe31e8597f57caeb1a6b67ad83c058307a14aff7c5fd76c757bb642aceed342f3629b523b154d690a518dd5b842575ac732fda456c10d41d1e6ef305dc33d119ee19f53ec829dd7abcf054088c4cee70f8efbd95595e8f13deeb0380a3abff107a99b055bdb432d7fba570666c659d101222fce2e720e1112d8bfc56b8bd9de9f05cd80a076defc6c54c18c4d867cf8c832cc535bd2be7342b726694f1f2da5f74866d9fd4341293bb7d6bafcdb903c69a7455d6c950f4121d3992b6a50acd5e302e1b6b9d842f5508e00d819e4142c3bbae6a91552c3b70eeb798e0ea1d1e81f2a53f12bf8783fc0a5f84f33e932eacd6dbaf13c221a55162fa2799d1316ae0e33ab81cb65fd26154f1c7572ec0b39adb96e204c03535af4f4f0a0559b362eb4850120a62f1a06c15684200c50b18ceb660dcd4233b24bcc25857ef5ac5e53586f329bac2a997b049a0bd3963b35203955b9ec522dc528c50f1dae735e9ced0ece81e8ec96343bbc73c93ed6e1d0c15414563fc362d72f4ed2d0060ca4b11a1422609c5e301f9b3afd01be10fd349b5b6dc85d6cc3524a4a223980db4f028b0d0ee9e0d80d87b72c55df22dd3e6c18dd1beb43fe8965c7f134e8afef2fa8143d43104b9cd59ee478ac43d13a76dcff003dbfdd2350e6aa9fde32285b40dc331610a0f127fee09f94c06a1e998b25e17e1a4530cd9411517f9f94a1700a90ddd9b5a3d681d1e8f4cb214b4e18b655fb3ffb1eb9e8bd8be854414eafef8e683f84e94a1ab764f9366ee6ea2289f681db843470f8c74868fa63e5e7f74f18dc4396c456c51642da55451635d4d67523b72962b106642d475239cfb7b375bcef940358db50e2cedb76ce7b89f5ea79e2a48e59cefd48c303a9b772b6752ca923c324ef66915411cce281dca7884863fe784d12c6b75e6c71f0822a2e5f814d0fd37dfbc0b5e00a9afe1a5063c144aa36111908e73e76c1fec5a6dc8ee95d9c2f73c27920471e41b6e582493b4e764801a9376c113fbeabe6b0bd3772ae5d14547c05cebd5f54024d52ff616a80afd739a465e364fcc4e5722256ba29ba3dc6301c2ae5f343730fbe4c09565a907d0046f9851f13106c90130ac7644cb59fc58c39fd21b2d8912bb2dc77541a679404bba4f96b935f6d7b1c0722e874f9c35adfa005d8259cf13f8828a05c351ae18202aab151b592e83198f184e790d3e7ec2431ead4e37c6b61535da256442a9f80f69d4e727927533629d06bbe1cde9020a79729907a742c62cac4ff3b92c2c5dd350f2931bda8c5075c9807065a9c35a7b656e87fad73e1f7e7768b8dfec49bb66d492936e712e3a632600d37fed620e19744e09bf0d4d4aafcba396f1b64cb2d5e838818b8e4aaf67005b7525047f2276315cb9709706fdd4721adbff682ac91afafe9cd2b2a23a74c987539e145d0b16247b34ec43c094c9c9e7835dd06f8aadf0e371628f1ccd8d6b081f20649c02515833c966aafe50b758bb60b36862b7cc58d76bcfed52877d552baaa7d75a87037d2b59a5cba5e4d1ab0c88d060d84e83c5ebb4a09f330039108c834fea524725fdc5f55273664d0256312cf36a9893de8632c098ecc39f749a89ef00534b908c07a86988c318b4d6d97b655e1a5d511fb2ccb9a8941bd945d2ea9e733e1dba221ccd380f7d3eb9f5ca1af3ddb3112585ee0b9998511a0284a2145434073818b4b70a10486cae0bf1d01db962ce9500285269daf983998d754b42defe5480deef18273eea90df576d8f1e15fdb98aaf1a0b028924f68dce0cec94cdc1e77cfbc652daba9830b34bea567e8d9fa26f006c37c509b8d3afd0811437b061f3ba2281da188585d473383be58f9bc407c92c1cf4cf04ed5295bccbb32c329ba939b7ff8ca5b341c53d875cad5b3242a2c4de2159cb51a96209fd070706bf14744d4b4056743af8e7c02ee509b5e22c57ba66b6be4fb726594c777daedc85e85d66e1676e585dee120f7ecd3c1fdb8579a3874acbae519f8faaca8558f7f2a4ea4ffb4b10005f0367b8146bdfd8bde011563dd4cd21d8912df048390e0883f10c31d368a49b59d15f172f386ec778a6de0f4772899e31b2cda000a8f88c0f775bc09f799afb71723c59b629c54f0bfb1ab2643fe1bb430976f14510fdff83cfb103f61478830d505305fc45759574aa0b92e3d058e6392bc66b1671eb39ee7b01b07884ba417416f62e5fac34ab2976aea6900aba6ba413d073da38875ab4a0333a4f5d79ae4fabf4506a2ed69f2b9ab67244a2fe298865e40fa240d400e946afbddb029c9eb79569f6c3c6fe9a549f83feeb3c33d7d6ba05b55d99ed18d646c85a1bbefa87a66224b9f3c0291f8fee5b15233a3eda284b40997cd3e8d6b7a2e000b6f46615442d45648c6581d1c8638d28d3c126d4b0ee4677e124f853289832687c3baab2744bf76b02ae7a3b0bfe99a000699b65243694fe8bc9b24dd7dbe27e8b5f2af32704cb8276da145dea19c4bce052464494059e159f891453b24a18c4d470fd19bab04830e71f3be1dd36d0d699e410121b6e7a559aae59c9d98be21447aada793ea5d9d25ce68f94acbd0001e8caee853b07a073a3aaff03998df78d95a831f94634e337e16956ad586e2ae2444a6ff2c33629b26d56c3a4510317a238a77da8c1b9293fea08bf51a09bb5a01a02c7a6479b454a87e7febefc5849b680c554c96dbb3d4de1331988ecde1fe477008dff6508f7d175b6fc6bab39180304bfefe22bfd78c7f62a3f1b296a67be2210cfc7cea637327b836c40f63ca0c8793a3551cda8be656ceadaea7f7052992f3a7b51e8dd886ee8b17af02369557b077eb1f953463613bbb7d98dd3517f79b956fd7c92b6af8607dfd21702c459cff80052a5580bbda2816f61c233d39056a9a1a2c5bae8b09069f517cfe2d968b44f3e7f79e37a75a99df975c260a78b3996d1390c2bfc55ea7b55728f1bf88d9f8b73b65007675156ad68e9fb0eb4305bbd77637502cd363848df58da6d097220f6ccdd6d53264c15f7d2fc385e6ca5fb72918db6d488144fa1c532adcca25c2e24c4444bbd3db994f6bc832825ab0ed9c14b20f8dd3e2f1786689dce3920185f31e0aecd9b595962005c4617f651ab6cb602d968581ffd1b18ca3b2861d91832c0ceaf876d28ad0b096a1dc0d07a3b8bf4bd020c1bd35e0bff5a03a13137da6e5819b211c40d878c3f01c10ade7e7e88b53658ea34a3efb2f7949e9130c352367e2f7c31a9d82b2beb99a19a7a8ffd3d912ed513839e83aed779c29a6a764c1c8244642711a253c33ee42023be7c79791deaa393b08868f16350474d9e53161688b1d45000e77edcb49fb35c98e0b56de1d1c85a65a58ce0efb1ccac35177914dcaa912e354afe1d4774c126113de00c0516def8cbcd7bd6c451acc5b43080eda65d1acc6cbe5a71362169df5adca434f913597f435db15d4fe5c02ca62d389481f334773dc0661070dd05e62c54025ca9a1e37203b51bc6b8c3f0a71b0e03e40433b"}) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @remote, 0x8}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0xd, &(0x7f0000000080)={r3}, 0x8) 05:58:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = syz_io_uring_setup(0x83, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) [ 101.360116][ T24] audit: type=1326 audit(1639893495.754:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3067 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f956286be99 code=0x7ffc0000 [ 101.384538][ T24] audit: type=1326 audit(1639893495.754:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3067 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f956286be99 code=0x7ffc0000 [ 101.408439][ T24] audit: type=1326 audit(1639893495.754:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3067 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f956286be99 code=0x7ffc0000 [ 101.432259][ T24] audit: type=1326 audit(1639893495.754:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3067 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f956286be99 code=0x7ffc0000 [ 101.432350][ T24] audit: type=1326 audit(1639893495.754:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3067 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f956286be99 code=0x7ffc0000 05:58:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8}, {0x4, 0x4}]}]}, 0x2c}}, 0x0) 05:58:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = syz_io_uring_setup(0x83, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 05:58:15 executing program 4: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@random="71305988d525", @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0xf1, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @rand_addr, @local, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x0, [{@private}, {@empty}, {@remote}]}, @cipso={0x86, 0x19, 0x0, [{0x0, 0x11, "555eec38e872fc739a75cb07000000"}, {0x0, 0x2}]}]}}}}}}}, 0x0) 05:58:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f00000003c0)={{r2}, 0x0, 0x1a, @unused=[0x81, 0x0, 0x9b47, 0x3], @name="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"}) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @remote, 0x8}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0xd, &(0x7f0000000080)={r3}, 0x8) 05:58:15 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) poll(&(0x7f00000000c0)=[{r1, 0x4755}, {r0}, {r2, 0x1f8}], 0x3, 0x0) 05:58:15 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xff, 0x40, 0xff, 0xfffffffd}, {0x3, 0x0, 0x9}, {0x8e, 0xff, 0x1, 0x3}, {0x0, 0xfb, 0xf7}, {0x0, 0x7f, 0x1, 0x2}, {0x3, 0x20, 0x9, 0x20}]}) prlimit64(0x0, 0xb, &(0x7f0000000140)={0xfffffffffffffff9, 0x402}, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) preadv(r2, 0x0, 0x0, 0x80000000, 0xffff38e5) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000140)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x20100, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"dfdf6b97bf41e1ec1c5241dabdb1d6f7", 0x0, 0x0, {0x6, 0x9}, {0x40, 0x57a}, 0x100000000, [0x200, 0x6, 0x80000000, 0x400, 0x502, 0x0, 0x5, 0x1ff, 0x101, 0x19, 0x5, 0xdd46, 0x4, 0x9, 0x200, 0x54]}) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fallocate(r6, 0x10, 0x8, 0x6) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000500)={0x0, 0x101, 0x2, 0x1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000900)={{r4}, r5, 0x4, @inherit={0x60, &(0x7f0000000340)={0x1, 0x3, 0xfff, 0x80000000, {0x13, 0x20, 0x20, 0x100, 0x4}, [0x1, 0xffffffff, 0x1]}}, @devid=r7}) gettid() clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000200)=0x8) 05:58:15 executing program 4: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@random="71305988d525", @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0xf1, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @rand_addr, @local, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x0, [{@private}, {@empty}, {@remote}]}, @cipso={0x86, 0x19, 0x0, [{0x0, 0x11, "555eec38e872fc739a75cb07000000"}, {0x0, 0x2}]}]}}}}}}}, 0x0) 05:58:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = syz_io_uring_setup(0x83, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 05:58:16 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) poll(&(0x7f00000000c0)=[{r1, 0x4755}, {r0}, {r2, 0x1f8}], 0x3, 0x0) 05:58:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) 05:58:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x6c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_EXPR={0x30, 0x11, 0x0, 0x1, @immediate={{0xe}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x10, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x5, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_IMMEDIATE_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb4}}, 0x0) 05:58:16 executing program 4: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@random="71305988d525", @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0xf1, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @rand_addr, @local, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x0, [{@private}, {@empty}, {@remote}]}, @cipso={0x86, 0x19, 0x0, [{0x0, 0x11, "555eec38e872fc739a75cb07000000"}, {0x0, 0x2}]}]}}}}}}}, 0x0) 05:58:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWSET={0x80, 0x9, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x31}, @NFTA_SET_ID={0x8}, @NFTA_SET_DESC={0x44, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x8, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0xfffffffffffffe65}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}]}, @NFTA_SET_DESC_SIZE={0x8}]}]}], {0x14}}, 0xa8}}, 0x0) 05:58:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)=""/252, 0xfc}], 0x1, 0xb2, 0x0) 05:58:16 executing program 4: syz_emit_ethernet(0x76, &(0x7f00000000c0)={@random="71305988d525", @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0xf1, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @rand_addr, @local, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x0, [{@private}, {@empty}, {@remote}]}, @cipso={0x86, 0x19, 0x0, [{0x0, 0x11, "555eec38e872fc739a75cb07000000"}, {0x0, 0x2}]}]}}}}}}}, 0x0) 05:58:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x6c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_EXPR={0x30, 0x11, 0x0, 0x1, @immediate={{0xe}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x10, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x5, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_IMMEDIATE_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb4}}, 0x0) 05:58:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)=""/252, 0xfc}], 0x1, 0xb2, 0x0) [ 101.645824][ T3107] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 05:58:16 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xff, 0x40, 0xff, 0xfffffffd}, {0x3, 0x0, 0x9}, {0x8e, 0xff, 0x1, 0x3}, {0x0, 0xfb, 0xf7}, {0x0, 0x7f, 0x1, 0x2}, {0x3, 0x20, 0x9, 0x20}]}) prlimit64(0x0, 0xb, &(0x7f0000000140)={0xfffffffffffffff9, 0x402}, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) preadv(r2, 0x0, 0x0, 0x80000000, 0xffff38e5) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000140)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x20100, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"dfdf6b97bf41e1ec1c5241dabdb1d6f7", 0x0, 0x0, {0x6, 0x9}, {0x40, 0x57a}, 0x100000000, [0x200, 0x6, 0x80000000, 0x400, 0x502, 0x0, 0x5, 0x1ff, 0x101, 0x19, 0x5, 0xdd46, 0x4, 0x9, 0x200, 0x54]}) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fallocate(r6, 0x10, 0x8, 0x6) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000500)={0x0, 0x101, 0x2, 0x1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000900)={{r4}, r5, 0x4, @inherit={0x60, &(0x7f0000000340)={0x1, 0x3, 0xfff, 0x80000000, {0x13, 0x20, 0x20, 0x100, 0x4}, [0x1, 0xffffffff, 0x1]}}, @devid=r7}) gettid() clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000200)=0x8) 05:58:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWSET={0x80, 0x9, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x31}, @NFTA_SET_ID={0x8}, @NFTA_SET_DESC={0x44, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x8, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0xfffffffffffffe65}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}]}, @NFTA_SET_DESC_SIZE={0x8}]}]}], {0x14}}, 0xa8}}, 0x0) 05:58:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)=""/252, 0xfc}], 0x1, 0xb2, 0x0) 05:58:16 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) io_setup(0x9, 0x0) lseek(r0, 0x6084, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) [ 101.783615][ T3123] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 05:58:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) 05:58:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x6c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_EXPR={0x30, 0x11, 0x0, 0x1, @immediate={{0xe}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x10, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x5, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_IMMEDIATE_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb4}}, 0x0) 05:58:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)=""/252, 0xfc}], 0x1, 0xb2, 0x0) 05:58:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWSET={0x80, 0x9, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x31}, @NFTA_SET_ID={0x8}, @NFTA_SET_DESC={0x44, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x8, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0xfffffffffffffe65}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}]}, @NFTA_SET_DESC_SIZE={0x8}]}]}], {0x14}}, 0xa8}}, 0x0) 05:58:16 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xff, 0x40, 0xff, 0xfffffffd}, {0x3, 0x0, 0x9}, {0x8e, 0xff, 0x1, 0x3}, {0x0, 0xfb, 0xf7}, {0x0, 0x7f, 0x1, 0x2}, {0x3, 0x20, 0x9, 0x20}]}) prlimit64(0x0, 0xb, &(0x7f0000000140)={0xfffffffffffffff9, 0x402}, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) preadv(r2, 0x0, 0x0, 0x80000000, 0xffff38e5) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000140)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x20100, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"dfdf6b97bf41e1ec1c5241dabdb1d6f7", 0x0, 0x0, {0x6, 0x9}, {0x40, 0x57a}, 0x100000000, [0x200, 0x6, 0x80000000, 0x400, 0x502, 0x0, 0x5, 0x1ff, 0x101, 0x19, 0x5, 0xdd46, 0x4, 0x9, 0x200, 0x54]}) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fallocate(r6, 0x10, 0x8, 0x6) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000500)={0x0, 0x101, 0x2, 0x1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000900)={{r4}, r5, 0x4, @inherit={0x60, &(0x7f0000000340)={0x1, 0x3, 0xfff, 0x80000000, {0x13, 0x20, 0x20, 0x100, 0x4}, [0x1, 0xffffffff, 0x1]}}, @devid=r7}) gettid() clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000200)=0x8) 05:58:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) 05:58:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x6c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_EXPR={0x30, 0x11, 0x0, 0x1, @immediate={{0xe}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x10, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x5, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_IMMEDIATE_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb4}}, 0x0) 05:58:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWSET={0x80, 0x9, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x31}, @NFTA_SET_ID={0x8}, @NFTA_SET_DESC={0x44, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x8, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0xfffffffffffffe65}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}]}, @NFTA_SET_DESC_SIZE={0x8}]}]}], {0x14}}, 0xa8}}, 0x0) [ 101.964802][ T3136] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 05:58:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 102.025887][ T3144] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 05:58:16 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xff, 0x40, 0xff, 0xfffffffd}, {0x3, 0x0, 0x9}, {0x8e, 0xff, 0x1, 0x3}, {0x0, 0xfb, 0xf7}, {0x0, 0x7f, 0x1, 0x2}, {0x3, 0x20, 0x9, 0x20}]}) prlimit64(0x0, 0xb, &(0x7f0000000140)={0xfffffffffffffff9, 0x402}, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) preadv(r2, 0x0, 0x0, 0x80000000, 0xffff38e5) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000140)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x20100, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"dfdf6b97bf41e1ec1c5241dabdb1d6f7", 0x0, 0x0, {0x6, 0x9}, {0x40, 0x57a}, 0x100000000, [0x200, 0x6, 0x80000000, 0x400, 0x502, 0x0, 0x5, 0x1ff, 0x101, 0x19, 0x5, 0xdd46, 0x4, 0x9, 0x200, 0x54]}) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fallocate(r6, 0x10, 0x8, 0x6) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000500)={0x0, 0x101, 0x2, 0x1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000900)={{r4}, r5, 0x4, @inherit={0x60, &(0x7f0000000340)={0x1, 0x3, 0xfff, 0x80000000, {0x13, 0x20, 0x20, 0x100, 0x4}, [0x1, 0xffffffff, 0x1]}}, @devid=r7}) gettid() clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000200)=0x8) 05:58:16 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xff, 0x40, 0xff, 0xfffffffd}, {0x3, 0x0, 0x9}, {0x8e, 0xff, 0x1, 0x3}, {0x0, 0xfb, 0xf7}, {0x0, 0x7f, 0x1, 0x2}, {0x3, 0x20, 0x9, 0x20}]}) prlimit64(0x0, 0xb, &(0x7f0000000140)={0xfffffffffffffff9, 0x402}, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) preadv(r2, 0x0, 0x0, 0x80000000, 0xffff38e5) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000140)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x20100, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"dfdf6b97bf41e1ec1c5241dabdb1d6f7", 0x0, 0x0, {0x6, 0x9}, {0x40, 0x57a}, 0x100000000, [0x200, 0x6, 0x80000000, 0x400, 0x502, 0x0, 0x5, 0x1ff, 0x101, 0x19, 0x5, 0xdd46, 0x4, 0x9, 0x200, 0x54]}) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fallocate(r6, 0x10, 0x8, 0x6) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000500)={0x0, 0x101, 0x2, 0x1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000900)={{r4}, r5, 0x4, @inherit={0x60, &(0x7f0000000340)={0x1, 0x3, 0xfff, 0x80000000, {0x13, 0x20, 0x20, 0x100, 0x4}, [0x1, 0xffffffff, 0x1]}}, @devid=r7}) gettid() clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000200)=0x8) 05:58:17 executing program 3: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) 05:58:17 executing program 4: r0 = socket(0x22, 0x2, 0x4) getsockname$qrtr(r0, 0x0, 0x0) 05:58:17 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xff, 0x40, 0xff, 0xfffffffd}, {0x3, 0x0, 0x9}, {0x8e, 0xff, 0x1, 0x3}, {0x0, 0xfb, 0xf7}, {0x0, 0x7f, 0x1, 0x2}, {0x3, 0x20, 0x9, 0x20}]}) prlimit64(0x0, 0xb, &(0x7f0000000140)={0xfffffffffffffff9, 0x402}, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) preadv(r2, 0x0, 0x0, 0x80000000, 0xffff38e5) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000140)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x20100, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"dfdf6b97bf41e1ec1c5241dabdb1d6f7", 0x0, 0x0, {0x6, 0x9}, {0x40, 0x57a}, 0x100000000, [0x200, 0x6, 0x80000000, 0x400, 0x502, 0x0, 0x5, 0x1ff, 0x101, 0x19, 0x5, 0xdd46, 0x4, 0x9, 0x200, 0x54]}) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fallocate(r6, 0x10, 0x8, 0x6) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000500)={0x0, 0x101, 0x2, 0x1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000900)={{r4}, r5, 0x4, @inherit={0x60, &(0x7f0000000340)={0x1, 0x3, 0xfff, 0x80000000, {0x13, 0x20, 0x20, 0x100, 0x4}, [0x1, 0xffffffff, 0x1]}}, @devid=r7}) gettid() clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000200)=0x8) 05:58:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) 05:58:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) 05:58:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 102.631243][ T3166] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 05:58:17 executing program 4: r0 = socket(0x22, 0x2, 0x4) getsockname$qrtr(r0, 0x0, 0x0) [ 102.686911][ T3173] vhci_hcd vhci_hcd.0: pdev(3) rhport(1) sockfd(6) [ 102.693490][ T3173] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 102.700949][ T3173] vhci_hcd vhci_hcd.0: Device attached 05:58:17 executing program 4: r0 = socket(0x22, 0x2, 0x4) getsockname$qrtr(r0, 0x0, 0x0) 05:58:17 executing program 4: r0 = socket(0x22, 0x2, 0x4) getsockname$qrtr(r0, 0x0, 0x0) 05:58:17 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xff, 0x40, 0xff, 0xfffffffd}, {0x3, 0x0, 0x9}, {0x8e, 0xff, 0x1, 0x3}, {0x0, 0xfb, 0xf7}, {0x0, 0x7f, 0x1, 0x2}, {0x3, 0x20, 0x9, 0x20}]}) prlimit64(0x0, 0xb, &(0x7f0000000140)={0xfffffffffffffff9, 0x402}, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) preadv(r2, 0x0, 0x0, 0x80000000, 0xffff38e5) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000140)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x20100, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"dfdf6b97bf41e1ec1c5241dabdb1d6f7", 0x0, 0x0, {0x6, 0x9}, {0x40, 0x57a}, 0x100000000, [0x200, 0x6, 0x80000000, 0x400, 0x502, 0x0, 0x5, 0x1ff, 0x101, 0x19, 0x5, 0xdd46, 0x4, 0x9, 0x200, 0x54]}) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fallocate(r6, 0x10, 0x8, 0x6) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000500)={0x0, 0x101, 0x2, 0x1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000900)={{r4}, r5, 0x4, @inherit={0x60, &(0x7f0000000340)={0x1, 0x3, 0xfff, 0x80000000, {0x13, 0x20, 0x20, 0x100, 0x4}, [0x1, 0xffffffff, 0x1]}}, @devid=r7}) gettid() clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000200)=0x8) [ 102.738243][ T3166] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 05:58:17 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}}}}]}, 0x88}}, 0x0) [ 102.801789][ T3166] vhci_hcd vhci_hcd.0: pdev(3) rhport(3) sockfd(17) [ 102.808404][ T3166] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 102.815963][ T3166] vhci_hcd vhci_hcd.0: Device attached 05:58:17 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}}}}]}, 0x88}}, 0x0) [ 102.853827][ T3173] vhci_hcd vhci_hcd.0: pdev(3) rhport(4) sockfd(22) [ 102.860512][ T3173] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 102.868126][ T3173] vhci_hcd vhci_hcd.0: Device attached [ 102.917817][ T1905] vhci_hcd: vhci_device speed not set [ 102.945299][ T3174] vhci_hcd: connection closed [ 102.945325][ T3187] vhci_hcd: connection closed [ 102.950283][ T33] vhci_hcd: stop threads [ 102.952069][ T3193] vhci_hcd: connection closed [ 102.954969][ T33] vhci_hcd: release socket [ 102.954980][ T33] vhci_hcd: disconnect device [ 102.997787][ T1905] usb 7-2: new full-speed USB device number 2 using vhci_hcd [ 103.010429][ T1905] usb 7-2: enqueue for inactive port 1 [ 103.020315][ T33] vhci_hcd: stop threads [ 103.024616][ T33] vhci_hcd: release socket [ 103.029069][ T33] vhci_hcd: disconnect device [ 103.039278][ T1905] usb 7-2: enqueue for inactive port 1 [ 103.056211][ T1905] usb 7-2: enqueue for inactive port 1 [ 103.062790][ T33] vhci_hcd: stop threads [ 103.067100][ T33] vhci_hcd: release socket [ 103.071546][ T33] vhci_hcd: disconnect device [ 103.157745][ T1905] vhci_hcd: vhci_device speed not set 05:58:17 executing program 3: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) 05:58:17 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}}}}]}, 0x88}}, 0x0) 05:58:17 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/time_for_children\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 05:58:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) 05:58:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) 05:58:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000040)={0x18c7, 0x2040000000000000}, 0x0) setpriority(0x0, 0x0, 0xcebd674a) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)=ANY=[], 0xffffffe3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0xda6bed164a1c43e4) creat(&(0x7f0000000100)='./bus\x00', 0x0) 05:58:17 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}}}}]}, 0x88}}, 0x0) 05:58:17 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/time_for_children\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 05:58:17 executing program 4: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) 05:58:17 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/time_for_children\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) [ 103.518300][ T3210] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 05:58:18 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/time_for_children\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) [ 103.581525][ T3219] vhci_hcd vhci_hcd.0: pdev(3) rhport(1) sockfd(6) [ 103.581536][ T3222] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 103.596420][ T3219] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 103.603897][ T3219] vhci_hcd vhci_hcd.0: Device attached 05:58:18 executing program 0: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) [ 103.626196][ T3222] vhci_hcd vhci_hcd.0: pdev(4) rhport(1) sockfd(5) [ 103.632733][ T3222] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 103.640182][ T3222] vhci_hcd vhci_hcd.0: Device attached [ 103.675824][ T3234] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 103.684214][ T3222] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 103.703378][ T3210] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 103.714950][ T3234] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(5) [ 103.721484][ T3234] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 103.728921][ T3234] vhci_hcd vhci_hcd.0: Device attached [ 103.739668][ T3222] vhci_hcd vhci_hcd.0: pdev(4) rhport(3) sockfd(19) [ 103.746318][ T3222] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 103.753836][ T3222] vhci_hcd vhci_hcd.0: Device attached [ 103.760221][ T3234] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 103.780078][ T3219] vhci_hcd vhci_hcd.0: pdev(3) rhport(3) sockfd(20) [ 103.786690][ T3219] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 103.794197][ T3219] vhci_hcd vhci_hcd.0: Device attached [ 103.810425][ T3234] vhci_hcd vhci_hcd.0: pdev(0) rhport(3) sockfd(19) [ 103.817057][ T3234] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 103.824645][ T3234] vhci_hcd vhci_hcd.0: Device attached [ 103.841838][ T3244] vhci_hcd vhci_hcd.0: pdev(3) rhport(4) sockfd(19) [ 103.848037][ T1921] vhci_hcd: vhci_device speed not set [ 103.848441][ T3244] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 103.861422][ T3244] vhci_hcd vhci_hcd.0: Device attached [ 103.872459][ T3241] vhci_hcd vhci_hcd.0: pdev(4) rhport(4) sockfd(21) [ 103.879064][ T3241] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 103.886664][ T3241] vhci_hcd vhci_hcd.0: Device attached [ 103.902549][ T3220] vhci_hcd: connection closed [ 103.902674][ T3239] vhci_hcd: connection closed [ 103.902731][ T1841] vhci_hcd: stop threads [ 103.907831][ T3245] vhci_hcd: connection closed [ 103.912135][ T1841] vhci_hcd: release socket [ 103.925504][ T1841] vhci_hcd: disconnect device [ 103.931296][ T1921] usb 9-2: new full-speed USB device number 2 using vhci_hcd [ 103.968283][ T25] vhci_hcd: vhci_device speed not set [ 103.973793][ T1905] vhci_hcd: vhci_device speed not set [ 103.980274][ T3247] vhci_hcd: connection closed [ 103.983379][ T3225] vhci_hcd: connection reset by peer [ 103.993391][ T3235] vhci_hcd: connection closed [ 103.995624][ T1841] vhci_hcd: stop threads [ 104.004618][ T1841] vhci_hcd: release socket [ 104.009036][ T1841] vhci_hcd: disconnect device [ 104.016687][ T3249] vhci_hcd vhci_hcd.0: pdev(0) rhport(4) sockfd(22) [ 104.023288][ T3249] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 104.030952][ T3249] vhci_hcd vhci_hcd.0: Device attached [ 104.039813][ T1841] vhci_hcd: stop threads [ 104.044086][ T1841] vhci_hcd: release socket [ 104.048535][ T1841] vhci_hcd: disconnect device [ 104.053428][ T25] usb 1-2: new full-speed USB device number 2 using vhci_hcd [ 104.068938][ T1841] vhci_hcd: stop threads [ 104.073205][ T1841] vhci_hcd: release socket [ 104.077674][ T1841] vhci_hcd: disconnect device [ 104.083371][ T3242] vhci_hcd: connection closed [ 104.083400][ T3236] vhci_hcd: connection reset by peer [ 104.083455][ T3250] vhci_hcd: connection closed [ 104.105409][ T1841] vhci_hcd: stop threads [ 104.114363][ T1841] vhci_hcd: release socket [ 104.118803][ T1841] vhci_hcd: disconnect device [ 104.128851][ T1841] vhci_hcd: stop threads [ 104.133125][ T1841] vhci_hcd: release socket [ 104.137538][ T1841] vhci_hcd: disconnect device [ 104.210321][ T1841] vhci_hcd: stop threads [ 104.214614][ T1841] vhci_hcd: release socket [ 104.219087][ T1841] vhci_hcd: disconnect device [ 104.224160][ T1841] vhci_hcd: stop threads [ 104.228444][ T1841] vhci_hcd: release socket [ 104.232853][ T1841] vhci_hcd: disconnect device [ 104.239716][ T1841] vhci_hcd: stop threads [ 104.243968][ T1841] vhci_hcd: release socket [ 104.248466][ T1841] vhci_hcd: disconnect device 05:58:18 executing program 3: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) 05:58:18 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x111e0b4, &(0x7f0000000080)={[{@commit}]}) 05:58:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/vmstat\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x8000000b}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000140)={0xa0000004}) 05:58:18 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) getsockopt$inet_int(r0, 0x10d, 0xad, 0x0, &(0x7f00000000c0)) 05:58:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/vmstat\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x8000000b}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000140)={0xa0000004}) 05:58:18 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) getsockopt$inet_int(r0, 0x10d, 0xad, 0x0, &(0x7f00000000c0)) 05:58:18 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) getsockopt$inet_int(r0, 0x10d, 0xad, 0x0, &(0x7f00000000c0)) [ 104.447613][ T3259] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 104.473659][ T3258] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000,,errors=continue. Quota mode: none. [ 104.485130][ T3259] vhci_hcd vhci_hcd.0: pdev(3) rhport(1) sockfd(5) 05:58:18 executing program 4: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) 05:58:18 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x111e0b4, &(0x7f0000000080)={[{@commit}]}) 05:58:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/vmstat\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x8000000b}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000140)={0xa0000004}) [ 104.491709][ T3259] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 104.499196][ T3259] vhci_hcd vhci_hcd.0: Device attached [ 104.506425][ T3259] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 104.515926][ T3259] vhci_hcd vhci_hcd.0: pdev(3) rhport(3) sockfd(19) [ 104.522584][ T3259] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 104.530155][ T3259] vhci_hcd vhci_hcd.0: Device attached [ 104.536692][ T3259] vhci_hcd vhci_hcd.0: pdev(3) rhport(4) sockfd(21) [ 104.543353][ T3259] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 104.551038][ T3259] vhci_hcd vhci_hcd.0: Device attached [ 104.557162][ T3260] vhci_hcd: connection closed [ 104.557309][ T3267] vhci_hcd: connection closed [ 104.557406][ T3269] vhci_hcd: connection closed [ 104.562747][ T1841] vhci_hcd: stop threads [ 104.575683][ T1841] vhci_hcd: release socket [ 104.580120][ T1841] vhci_hcd: disconnect device [ 104.585080][ T1841] vhci_hcd: stop threads [ 104.589400][ T1841] vhci_hcd: release socket [ 104.593789][ T1841] vhci_hcd: disconnect device 05:58:19 executing program 0: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) [ 104.599043][ T1841] vhci_hcd: stop threads [ 104.603325][ T1841] vhci_hcd: release socket [ 104.607767][ T1841] vhci_hcd: disconnect device 05:58:19 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) getsockopt$inet_int(r0, 0x10d, 0xad, 0x0, &(0x7f00000000c0)) [ 104.728750][ T3275] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 104.744469][ T3275] vhci_hcd vhci_hcd.0: pdev(4) rhport(1) sockfd(5) [ 104.751075][ T3275] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 104.758518][ T3275] vhci_hcd vhci_hcd.0: Device attached [ 104.765024][ T3275] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 104.774463][ T3275] vhci_hcd vhci_hcd.0: pdev(4) rhport(3) sockfd(19) [ 104.775113][ T3281] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000,,errors=continue. Quota mode: none. [ 104.781085][ T3275] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 104.781165][ T3275] vhci_hcd vhci_hcd.0: Device attached [ 104.809452][ T3284] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 104.815174][ T3275] vhci_hcd vhci_hcd.0: pdev(4) rhport(4) sockfd(21) [ 104.819206][ T3284] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(5) [ 104.824103][ T3275] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 104.830582][ T3284] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 104.838205][ T3275] vhci_hcd vhci_hcd.0: Device attached [ 104.845577][ T3284] vhci_hcd vhci_hcd.0: Device attached [ 104.861585][ T3279] vhci_hcd: connection closed [ 104.861688][ T3282] vhci_hcd: connection closed [ 104.861799][ T1841] vhci_hcd: stop threads [ 104.866528][ T3285] vhci_hcd: connection closed [ 104.871116][ T1841] vhci_hcd: release socket [ 104.871127][ T1841] vhci_hcd: disconnect device [ 104.886754][ T3284] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 104.892366][ T1841] vhci_hcd: stop threads [ 104.902263][ T1841] vhci_hcd: release socket [ 104.903033][ T3284] vhci_hcd vhci_hcd.0: pdev(0) rhport(3) sockfd(19) [ 104.906729][ T1841] vhci_hcd: disconnect device [ 104.913232][ T3284] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 104.913346][ T3284] vhci_hcd vhci_hcd.0: Device attached [ 104.919216][ T3284] vhci_hcd vhci_hcd.0: pdev(0) rhport(4) sockfd(21) [ 104.926271][ T1841] vhci_hcd: stop threads [ 104.930899][ T3284] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 104.930997][ T3284] vhci_hcd vhci_hcd.0: Device attached [ 104.937507][ T1841] vhci_hcd: release socket [ 104.937567][ T1841] vhci_hcd: disconnect device [ 104.951598][ T3289] vhci_hcd: connection closed [ 104.956802][ T3287] vhci_hcd: connection closed [ 104.962273][ T3291] vhci_hcd: connection closed [ 104.974195][ T1841] vhci_hcd: stop threads [ 104.983142][ T1841] vhci_hcd: release socket [ 104.987535][ T1841] vhci_hcd: disconnect device [ 104.992471][ T1841] vhci_hcd: stop threads [ 104.996782][ T1841] vhci_hcd: release socket [ 105.001231][ T1841] vhci_hcd: disconnect device [ 105.006076][ T1841] vhci_hcd: stop threads [ 105.010430][ T1841] vhci_hcd: release socket [ 105.014826][ T1841] vhci_hcd: disconnect device 05:58:19 executing program 3: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) 05:58:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/vmstat\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x8000000b}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000140)={0xa0000004}) 05:58:19 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x111e0b4, &(0x7f0000000080)={[{@commit}]}) 05:58:19 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000240)={@local, @ipv4={'\x00', '\xff\xff', @empty}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x0, 0x0, 0x0, 0x100, 0x0, 0x20c200a2}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) fork() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x0) 05:58:19 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2881090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x111e0b4, &(0x7f0000000080)={[{@commit}]}) [ 105.113561][ T3297] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000,,errors=continue. Quota mode: none. [ 105.198634][ T3303] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 105.210384][ T3303] vhci_hcd vhci_hcd.0: pdev(3) rhport(1) sockfd(5) [ 105.216921][ T3303] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 105.224349][ T3303] vhci_hcd vhci_hcd.0: Device attached [ 105.230637][ T3303] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 105.241690][ T3303] vhci_hcd vhci_hcd.0: pdev(3) rhport(3) sockfd(19) 05:58:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000240)={@local, @ipv4={'\x00', '\xff\xff', @empty}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x0, 0x0, 0x0, 0x100, 0x0, 0x20c200a2}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) fork() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x0) [ 105.248375][ T3303] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 105.256073][ T3303] vhci_hcd vhci_hcd.0: Device attached [ 105.259226][ T3310] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000,,errors=continue. Quota mode: none. [ 105.267169][ T3303] vhci_hcd vhci_hcd.0: pdev(3) rhport(4) sockfd(21) [ 105.278821][ T3303] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 105.286683][ T3303] vhci_hcd vhci_hcd.0: Device attached [ 105.299634][ T3311] vhci_hcd: connection closed [ 105.299739][ T3313] vhci_hcd: connection closed [ 105.300312][ T3304] vhci_hcd: connection closed [ 105.308313][ T1841] vhci_hcd: stop threads [ 105.318402][ T1841] vhci_hcd: release socket [ 105.322809][ T1841] vhci_hcd: disconnect device [ 105.327592][ T1841] vhci_hcd: stop threads [ 105.332001][ T1841] vhci_hcd: release socket [ 105.336404][ T1841] vhci_hcd: disconnect device [ 105.341202][ T1841] vhci_hcd: stop threads [ 105.345505][ T1841] vhci_hcd: release socket [ 105.350077][ T1841] vhci_hcd: disconnect device 05:58:19 executing program 4: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) 05:58:19 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000240)={@local, @ipv4={'\x00', '\xff\xff', @empty}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x0, 0x0, 0x0, 0x100, 0x0, 0x20c200a2}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) fork() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x0) 05:58:19 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:19 executing program 0: syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) 05:58:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000240)={@local, @ipv4={'\x00', '\xff\xff', @empty}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x0, 0x0, 0x0, 0x100, 0x0, 0x20c200a2}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) fork() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x0) [ 105.496336][ T3326] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 105.505563][ T3326] vhci_hcd vhci_hcd.0: pdev(4) rhport(1) sockfd(5) [ 105.512067][ T3326] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 105.519649][ T3326] vhci_hcd vhci_hcd.0: Device attached [ 105.526281][ T3326] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 105.535203][ T3326] vhci_hcd vhci_hcd.0: pdev(4) rhport(3) sockfd(19) [ 105.541825][ T3326] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 105.549340][ T3326] vhci_hcd vhci_hcd.0: Device attached [ 105.555806][ T3326] vhci_hcd vhci_hcd.0: pdev(4) rhport(4) sockfd(21) [ 105.562497][ T3326] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 105.570199][ T3326] vhci_hcd vhci_hcd.0: Device attached [ 105.585044][ T3327] vhci_hcd: connection closed [ 105.585168][ T3330] vhci_hcd: connection closed [ 105.590325][ T1841] vhci_hcd: stop threads [ 105.599469][ T1841] vhci_hcd: release socket [ 105.603893][ T1841] vhci_hcd: disconnect device [ 105.608091][ T3332] vhci_hcd: connection closed [ 105.609278][ T1841] vhci_hcd: stop threads [ 105.618263][ T1841] vhci_hcd: release socket [ 105.622664][ T1841] vhci_hcd: disconnect device [ 105.628077][ T1841] vhci_hcd: stop threads [ 105.632329][ T1841] vhci_hcd: release socket [ 105.636720][ T1841] vhci_hcd: disconnect device [ 105.710120][ T3338] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 105.719386][ T3338] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(5) [ 105.725913][ T3338] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 105.733404][ T3338] vhci_hcd vhci_hcd.0: Device attached [ 105.740042][ T3338] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 105.750139][ T3338] vhci_hcd vhci_hcd.0: pdev(0) rhport(3) sockfd(19) [ 105.756732][ T3338] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 105.764254][ T3338] vhci_hcd vhci_hcd.0: Device attached [ 105.770953][ T3338] vhci_hcd vhci_hcd.0: pdev(0) rhport(4) sockfd(21) [ 105.777598][ T3338] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 105.785334][ T3338] vhci_hcd vhci_hcd.0: Device attached [ 105.791988][ T3339] vhci_hcd: connection closed [ 105.792253][ T43] vhci_hcd: stop threads [ 105.792919][ T3341] vhci_hcd: connection closed [ 105.797057][ T43] vhci_hcd: release socket 05:58:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000240)={@local, @ipv4={'\x00', '\xff\xff', @empty}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x0, 0x0, 0x0, 0x100, 0x0, 0x20c200a2}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) fork() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x0) 05:58:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000240)={@local, @ipv4={'\x00', '\xff\xff', @empty}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x0, 0x0, 0x0, 0x100, 0x0, 0x20c200a2}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) fork() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x0) 05:58:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000240)={@local, @ipv4={'\x00', '\xff\xff', @empty}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x0, 0x0, 0x0, 0x100, 0x0, 0x20c200a2}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) fork() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x0) 05:58:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) [ 105.801674][ T3343] vhci_hcd: connection closed [ 105.805992][ T43] vhci_hcd: disconnect device [ 105.806857][ T43] vhci_hcd: stop threads [ 105.824066][ T43] vhci_hcd: release socket [ 105.828493][ T43] vhci_hcd: disconnect device [ 105.834088][ T43] vhci_hcd: stop threads [ 105.838433][ T43] vhci_hcd: release socket [ 105.842843][ T43] vhci_hcd: disconnect device 05:58:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x3, 0x6, 0x3}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), 0x0, 0xfe000000, r0}, 0x38) 05:58:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 0: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000880)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 05:58:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x3, 0x6, 0x3}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), 0x0, 0xfe000000, r0}, 0x38) [ 106.342964][ T24] kauditd_printk_skb: 10 callbacks suppressed [ 106.342977][ T24] audit: type=1400 audit(1639893500.754:259): avc: denied { map_create } for pid=3373 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 106.368494][ T24] audit: type=1400 audit(1639893500.754:260): avc: denied { map_read map_write } for pid=3373 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 05:58:20 executing program 0: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000880)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 05:58:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 5: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "000200", 0x0, 0x21, 0x0, @mcast2, @loopback, [@routing]}}}}}}}, 0x0) 05:58:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) socket(0x29, 0x80000, 0x8) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r3 = dup2(r0, r1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x3fc, 0x108, 0x108, 0xffffffff, 0x0, 0x1fc, 0x368, 0x368, 0xffffffff, 0x368, 0x368, 0x5, &(0x7f00000003c0), {[{{@uncond, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00', 0x0, 0xe, 0x1, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x16, @ipv6=@remote, @ipv6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, @gre_key=0x4, @port=0x4e24}}}, {{@uncond, 0x0, 0xc0, 0xf4, 0x0, {}, [@common=@inet=@set2={{0x24}, {{0x1, 0x4}}}, @common=@addrtype={{0x2c}, {0x352, 0x181, 0x0, 0x1}}]}, @NETMAP={0x34, 'NETMAP\x00', 0x0, {0x1, {0x4, @loopback, @empty, @gre_key=0x6, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x70, 0xa4}, @MASQUERADE={0x34, 'MASQUERADE\x00', 0x0, {0x1, {0xe, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3f}, @gre_key=0x9, @icmp_id=0x65}}}}, {{@ip={@rand_addr=0x64010102, @broadcast, 0xffffffff, 0xffffffff, 'geneve1\x00', 'geneve1\x00', {}, {0xff}, 0x5e, 0x0, 0x4}, 0x0, 0x94, 0xc8, 0x0, {}, [@common=@icmp={{0x24}, {0x12, "bb92", 0x1}}]}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x1, @multicast2, @broadcast, @gre_key, @icmp_id=0x66}}}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x458) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010008506008020000000000000000000", @ANYRES32=r2, @ANYBLOB="0100626f6e64000000000c0002000892b642ec44db0001000470c9103d811d6df19f8e55b3b6d3cf72885a"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x88, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x58, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x48, 0x2, 0x0, 0x1, [@IFLA_GRE_IGNORE_DF={0x5}, @IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e21}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x5}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x1000}, @IFLA_GRE_ENCAP_TYPE={0x6, 0xe, 0x3}, @IFLA_GRE_REMOTE={0x8, 0x7, @remote}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_ENCAP_DPORT={0x6, 0x11, 0x4e21}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x88}}, 0x84080) 05:58:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x3, 0x6, 0x3}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), 0x0, 0xfe000000, r0}, 0x38) 05:58:21 executing program 0: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000880)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 05:58:21 executing program 5: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "000200", 0x0, 0x21, 0x0, @mcast2, @loopback, [@routing]}}}}}}}, 0x0) 05:58:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x3, 0x6, 0x3}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180), 0x0, 0xfe000000, r0}, 0x38) 05:58:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) socket(0x29, 0x80000, 0x8) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r3 = dup2(r0, r1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x3fc, 0x108, 0x108, 0xffffffff, 0x0, 0x1fc, 0x368, 0x368, 0xffffffff, 0x368, 0x368, 0x5, &(0x7f00000003c0), {[{{@uncond, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00', 0x0, 0xe, 0x1, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x16, @ipv6=@remote, @ipv6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, @gre_key=0x4, @port=0x4e24}}}, {{@uncond, 0x0, 0xc0, 0xf4, 0x0, {}, [@common=@inet=@set2={{0x24}, {{0x1, 0x4}}}, @common=@addrtype={{0x2c}, {0x352, 0x181, 0x0, 0x1}}]}, @NETMAP={0x34, 'NETMAP\x00', 0x0, {0x1, {0x4, @loopback, @empty, @gre_key=0x6, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x70, 0xa4}, @MASQUERADE={0x34, 'MASQUERADE\x00', 0x0, {0x1, {0xe, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3f}, @gre_key=0x9, @icmp_id=0x65}}}}, {{@ip={@rand_addr=0x64010102, @broadcast, 0xffffffff, 0xffffffff, 'geneve1\x00', 'geneve1\x00', {}, {0xff}, 0x5e, 0x0, 0x4}, 0x0, 0x94, 0xc8, 0x0, {}, [@common=@icmp={{0x24}, {0x12, "bb92", 0x1}}]}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x1, @multicast2, @broadcast, @gre_key, @icmp_id=0x66}}}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x458) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010008506008020000000000000000000", @ANYRES32=r2, @ANYBLOB="0100626f6e64000000000c0002000892b642ec44db0001000470c9103d811d6df19f8e55b3b6d3cf72885a"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x88, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x58, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x48, 0x2, 0x0, 0x1, [@IFLA_GRE_IGNORE_DF={0x5}, @IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e21}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x5}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x1000}, @IFLA_GRE_ENCAP_TYPE={0x6, 0xe, 0x3}, @IFLA_GRE_REMOTE={0x8, 0x7, @remote}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_ENCAP_DPORT={0x6, 0x11, 0x4e21}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x88}}, 0x84080) [ 106.637459][ T3398] Zero length message leads to an empty skb [ 106.645948][ T3398] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:21 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpuacct'}]}, 0x9) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) 05:58:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x60, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x3c}, @NFTA_SET_EXPR={0x24, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x18}, @NFTA_META_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 05:58:21 executing program 0: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000880)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 05:58:21 executing program 5: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "000200", 0x0, 0x21, 0x0, @mcast2, @loopback, [@routing]}}}}}}}, 0x0) 05:58:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000180)={'wg1\x00', 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@updpolicy={0xc0, 0x19, 0x1, 0x0, 0x0, {{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@XFRMA_IF_ID={0x8, 0x1f, r1}]}, 0xc0}}, 0x0) 05:58:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) socket(0x29, 0x80000, 0x8) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r3 = dup2(r0, r1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x3fc, 0x108, 0x108, 0xffffffff, 0x0, 0x1fc, 0x368, 0x368, 0xffffffff, 0x368, 0x368, 0x5, &(0x7f00000003c0), {[{{@uncond, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00', 0x0, 0xe, 0x1, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x16, @ipv6=@remote, @ipv6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, @gre_key=0x4, @port=0x4e24}}}, {{@uncond, 0x0, 0xc0, 0xf4, 0x0, {}, [@common=@inet=@set2={{0x24}, {{0x1, 0x4}}}, @common=@addrtype={{0x2c}, {0x352, 0x181, 0x0, 0x1}}]}, @NETMAP={0x34, 'NETMAP\x00', 0x0, {0x1, {0x4, @loopback, @empty, @gre_key=0x6, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x70, 0xa4}, @MASQUERADE={0x34, 'MASQUERADE\x00', 0x0, {0x1, {0xe, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3f}, @gre_key=0x9, @icmp_id=0x65}}}}, {{@ip={@rand_addr=0x64010102, @broadcast, 0xffffffff, 0xffffffff, 'geneve1\x00', 'geneve1\x00', {}, {0xff}, 0x5e, 0x0, 0x4}, 0x0, 0x94, 0xc8, 0x0, {}, [@common=@icmp={{0x24}, {0x12, "bb92", 0x1}}]}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x1, @multicast2, @broadcast, @gre_key, @icmp_id=0x66}}}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x458) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010008506008020000000000000000000", @ANYRES32=r2, @ANYBLOB="0100626f6e64000000000c0002000892b642ec44db0001000470c9103d811d6df19f8e55b3b6d3cf72885a"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x88, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x58, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x48, 0x2, 0x0, 0x1, [@IFLA_GRE_IGNORE_DF={0x5}, @IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e21}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x5}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x1000}, @IFLA_GRE_ENCAP_TYPE={0x6, 0xe, 0x3}, @IFLA_GRE_REMOTE={0x8, 0x7, @remote}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_ENCAP_DPORT={0x6, 0x11, 0x4e21}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x88}}, 0x84080) [ 106.781431][ T3407] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14}, 0x33fe0}}, 0x0) 05:58:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x60, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x3c}, @NFTA_SET_EXPR={0x24, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x18}, @NFTA_META_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 05:58:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfb}, 0xc) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfb, 0x1}, 0xc) 05:58:21 executing program 5: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "000200", 0x0, 0x21, 0x0, @mcast2, @loopback, [@routing]}}}}}}}, 0x0) [ 106.872345][ T24] audit: type=1400 audit(1639893501.284:261): avc: denied { create } for pid=3412 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 106.893027][ T24] audit: type=1400 audit(1639893501.284:262): avc: denied { ioctl } for pid=3412 comm="syz-executor.2" path="socket:[21655]" dev="sockfs" ino=21655 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 106.918893][ T24] audit: type=1400 audit(1639893501.284:263): avc: denied { write } for pid=3412 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 106.939405][ T24] audit: type=1400 audit(1639893501.284:264): avc: denied { nlmsg_write } for pid=3412 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 05:58:21 executing program 4: io_setup(0x202, &(0x7f0000000200)=0x0) r1 = socket$tipc(0x1e, 0x4, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x40}, 0x10) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 05:58:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) socket(0x29, 0x80000, 0x8) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r3 = dup2(r0, r1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x3fc, 0x108, 0x108, 0xffffffff, 0x0, 0x1fc, 0x368, 0x368, 0xffffffff, 0x368, 0x368, 0x5, &(0x7f00000003c0), {[{{@uncond, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00', 0x0, 0xe, 0x1, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x16, @ipv6=@remote, @ipv6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, @gre_key=0x4, @port=0x4e24}}}, {{@uncond, 0x0, 0xc0, 0xf4, 0x0, {}, [@common=@inet=@set2={{0x24}, {{0x1, 0x4}}}, @common=@addrtype={{0x2c}, {0x352, 0x181, 0x0, 0x1}}]}, @NETMAP={0x34, 'NETMAP\x00', 0x0, {0x1, {0x4, @loopback, @empty, @gre_key=0x6, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x70, 0xa4}, @MASQUERADE={0x34, 'MASQUERADE\x00', 0x0, {0x1, {0xe, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3f}, @gre_key=0x9, @icmp_id=0x65}}}}, {{@ip={@rand_addr=0x64010102, @broadcast, 0xffffffff, 0xffffffff, 'geneve1\x00', 'geneve1\x00', {}, {0xff}, 0x5e, 0x0, 0x4}, 0x0, 0x94, 0xc8, 0x0, {}, [@common=@icmp={{0x24}, {0x12, "bb92", 0x1}}]}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x1, @multicast2, @broadcast, @gre_key, @icmp_id=0x66}}}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x458) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010008506008020000000000000000000", @ANYRES32=r2, @ANYBLOB="0100626f6e64000000000c0002000892b642ec44db0001000470c9103d811d6df19f8e55b3b6d3cf72885a"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x88, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x58, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x48, 0x2, 0x0, 0x1, [@IFLA_GRE_IGNORE_DF={0x5}, @IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e21}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x5}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x1000}, @IFLA_GRE_ENCAP_TYPE={0x6, 0xe, 0x3}, @IFLA_GRE_REMOTE={0x8, 0x7, @remote}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_ENCAP_DPORT={0x6, 0x11, 0x4e21}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x88}}, 0x84080) 05:58:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14}, 0x33fe0}}, 0x0) [ 106.965351][ T3421] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:21 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r0, &(0x7f0000000f80), 0x10) 05:58:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfb}, 0xc) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfb, 0x1}, 0xc) 05:58:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x60, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x3c}, @NFTA_SET_EXPR={0x24, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x18}, @NFTA_META_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 107.057188][ T24] audit: type=1400 audit(1639893501.464:265): avc: denied { audit_read } for pid=3426 comm="syz-executor.2" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 05:58:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14}, 0x33fe0}}, 0x0) 05:58:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0xf0, 0x0, 0x0, 0xf0, 0x0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'ip6gretap0\x00', '\x00', {}, {}, 0x73}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x2, 0x0, 0x7}}, @common=@ah={{0x30}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@ah={{0x30}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) [ 107.123425][ T3433] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:21 executing program 5: r0 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 05:58:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfb}, 0xc) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfb, 0x1}, 0xc) 05:58:21 executing program 4: io_setup(0x202, &(0x7f0000000200)=0x0) r1 = socket$tipc(0x1e, 0x4, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x40}, 0x10) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 05:58:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14}, 0x33fe0}}, 0x0) 05:58:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0xf0, 0x0, 0x0, 0xf0, 0x0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'ip6gretap0\x00', '\x00', {}, {}, 0x73}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x2, 0x0, 0x7}}, @common=@ah={{0x30}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@ah={{0x30}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) 05:58:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x60, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x3c}, @NFTA_SET_EXPR={0x24, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x18}, @NFTA_META_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 05:58:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfb}, 0xc) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfb, 0x1}, 0xc) 05:58:21 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x8927, &(0x7f0000000140)={'ip6_vti0\x00', 0x0}) [ 107.244814][ T3444] xt_l2tp: v2 doesn't support IP mode 05:58:21 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mreqn(r0, 0x0, 0x17, 0x0, &(0x7f0000000080)) 05:58:21 executing program 4: io_setup(0x202, &(0x7f0000000200)=0x0) r1 = socket$tipc(0x1e, 0x4, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x40}, 0x10) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 05:58:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0xf0, 0x0, 0x0, 0xf0, 0x0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'ip6gretap0\x00', '\x00', {}, {}, 0x73}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x2, 0x0, 0x7}}, @common=@ah={{0x30}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@ah={{0x30}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) 05:58:21 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) [ 107.352656][ T3456] xt_l2tp: v2 doesn't support IP mode 05:58:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x3, 0x290, 0xf8, 0x0, 0x148, 0xf8, 0x148, 0x1f8, 0x240, 0x240, 0x1f8, 0x240, 0x3, 0x0, {[{{@ip={@rand_addr, @private, 0x0, 0x0, 'batadv_slave_0\x00', 'caif0\x00'}, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@unspec=@connbytes={{0x38}}, @common=@socket0={{0x20}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@ip={@rand_addr, @local, 0x0, 0x0, 'team0\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7]}, {0xffffffffffffffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) 05:58:21 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) bind$tipc(r2, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x8}}}, 0x10) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3}}, 0x10) bind$tipc(r2, 0x0, 0x0) 05:58:21 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mreqn(r0, 0x0, 0x17, 0x0, &(0x7f0000000080)) 05:58:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0xf0, 0x0, 0x0, 0xf0, 0x0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'ip6gretap0\x00', '\x00', {}, {}, 0x73}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x2, 0x0, 0x7}}, @common=@ah={{0x30}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@ah={{0x30}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) [ 107.475376][ T3468] xt_l2tp: v2 doesn't support IP mode [ 107.514463][ C0] sd 0:0:1:0: tag#3950 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 05:58:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x3, 0x290, 0xf8, 0x0, 0x148, 0xf8, 0x148, 0x1f8, 0x240, 0x240, 0x1f8, 0x240, 0x3, 0x0, {[{{@ip={@rand_addr, @private, 0x0, 0x0, 'batadv_slave_0\x00', 'caif0\x00'}, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@unspec=@connbytes={{0x38}}, @common=@socket0={{0x20}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@ip={@rand_addr, @local, 0x0, 0x0, 'team0\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7]}, {0xffffffffffffffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) 05:58:22 executing program 4: io_setup(0x202, &(0x7f0000000200)=0x0) r1 = socket$tipc(0x1e, 0x4, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x40}, 0x10) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 107.524307][ C0] sd 0:0:1:0: tag#3950 CDB: opcode=0xe5 (vendor) [ 107.530631][ C0] sd 0:0:1:0: tag#3950 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 107.539662][ C0] sd 0:0:1:0: tag#3950 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 107.548712][ C0] sd 0:0:1:0: tag#3950 CDB[20]: ba [ 107.554174][ T3474] xt_connbytes: Forcing CT accounting to be enabled [ 107.566798][ T3472] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw 05:58:22 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) 05:58:22 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) bind$tipc(r2, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x8}}}, 0x10) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3}}, 0x10) bind$tipc(r2, 0x0, 0x0) 05:58:22 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mreqn(r0, 0x0, 0x17, 0x0, &(0x7f0000000080)) [ 107.598940][ T24] audit: type=1400 audit(1639893502.004:266): avc: denied { bind } for pid=3473 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 107.624497][ T3480] xt_l2tp: v2 doesn't support IP mode 05:58:22 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) [ 107.630381][ T24] audit: type=1400 audit(1639893502.044:267): avc: denied { append } for pid=1420 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 107.652632][ T24] audit: type=1400 audit(1639893502.044:268): avc: denied { open } for pid=1420 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 05:58:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x3, 0x290, 0xf8, 0x0, 0x148, 0xf8, 0x148, 0x1f8, 0x240, 0x240, 0x1f8, 0x240, 0x3, 0x0, {[{{@ip={@rand_addr, @private, 0x0, 0x0, 'batadv_slave_0\x00', 'caif0\x00'}, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@unspec=@connbytes={{0x38}}, @common=@socket0={{0x20}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@ip={@rand_addr, @local, 0x0, 0x0, 'team0\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7]}, {0xffffffffffffffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) 05:58:22 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mreqn(r0, 0x0, 0x17, 0x0, &(0x7f0000000080)) 05:58:22 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) bind$tipc(r2, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x8}}}, 0x10) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3}}, 0x10) bind$tipc(r2, 0x0, 0x0) 05:58:22 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) [ 107.770009][ C1] sd 0:0:1:0: tag#3923 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 107.779855][ C1] sd 0:0:1:0: tag#3923 CDB: opcode=0xe5 (vendor) [ 107.786216][ C1] sd 0:0:1:0: tag#3923 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 107.795247][ C1] sd 0:0:1:0: tag#3923 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 107.804276][ C1] sd 0:0:1:0: tag#3923 CDB[20]: ba [ 107.850510][ C0] sd 0:0:1:0: tag#3944 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 107.860339][ C0] sd 0:0:1:0: tag#3944 CDB: opcode=0xe5 (vendor) [ 107.866650][ C0] sd 0:0:1:0: tag#3944 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 107.875733][ C0] sd 0:0:1:0: tag#3944 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 107.884811][ C0] sd 0:0:1:0: tag#3944 CDB[20]: ba 05:58:22 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) 05:58:22 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) [ 107.896429][ T3493] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw 05:58:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x3, 0x290, 0xf8, 0x0, 0x148, 0xf8, 0x148, 0x1f8, 0x240, 0x240, 0x1f8, 0x240, 0x3, 0x0, {[{{@ip={@rand_addr, @private, 0x0, 0x0, 'batadv_slave_0\x00', 'caif0\x00'}, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@unspec=@connbytes={{0x38}}, @common=@socket0={{0x20}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@ip={@rand_addr, @local, 0x0, 0x0, 'team0\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7]}, {0xffffffffffffffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) 05:58:22 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) bind$tipc(r2, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x8}}}, 0x10) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3}}, 0x10) bind$tipc(r2, 0x0, 0x0) 05:58:22 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) [ 107.987567][ C0] sd 0:0:1:0: tag#3945 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 107.997394][ C0] sd 0:0:1:0: tag#3945 CDB: opcode=0xe5 (vendor) [ 108.003768][ C0] sd 0:0:1:0: tag#3945 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.012825][ C0] sd 0:0:1:0: tag#3945 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.021860][ C0] sd 0:0:1:0: tag#3945 CDB[20]: ba [ 108.042202][ C0] sd 0:0:1:0: tag#3910 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 108.052080][ C0] sd 0:0:1:0: tag#3910 CDB: opcode=0xe5 (vendor) [ 108.058415][ C0] sd 0:0:1:0: tag#3910 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.067441][ C0] sd 0:0:1:0: tag#3910 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.076507][ C0] sd 0:0:1:0: tag#3910 CDB[20]: ba [ 108.080824][ C1] sd 0:0:1:0: tag#3924 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 05:58:22 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) [ 108.091519][ C1] sd 0:0:1:0: tag#3924 CDB: opcode=0xe5 (vendor) [ 108.097848][ C1] sd 0:0:1:0: tag#3924 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.106862][ C1] sd 0:0:1:0: tag#3924 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.115889][ C1] sd 0:0:1:0: tag#3924 CDB[20]: ba [ 108.128547][ T3506] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw 05:58:22 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) 05:58:22 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) 05:58:22 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) [ 108.129748][ T3510] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw 05:58:22 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@ip_ttl={{0x14}}, @ip_retopts={{0x10}}], 0x28}, 0x0) 05:58:22 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) [ 108.217474][ C0] sd 0:0:1:0: tag#3944 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 108.227309][ C0] sd 0:0:1:0: tag#3944 CDB: opcode=0xe5 (vendor) [ 108.233674][ C0] sd 0:0:1:0: tag#3944 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.242700][ C0] sd 0:0:1:0: tag#3944 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.251737][ C0] sd 0:0:1:0: tag#3944 CDB[20]: ba [ 108.315652][ C0] sd 0:0:1:0: tag#3925 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 108.325485][ C0] sd 0:0:1:0: tag#3925 CDB: opcode=0xe5 (vendor) [ 108.331825][ C0] sd 0:0:1:0: tag#3925 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.332173][ C1] sd 0:0:1:0: tag#3931 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 108.340855][ C0] sd 0:0:1:0: tag#3925 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.350651][ C1] sd 0:0:1:0: tag#3931 CDB: opcode=0xe5 (vendor) [ 108.359659][ C0] sd 0:0:1:0: tag#3925 CDB[20]: ba [ 108.365965][ C1] sd 0:0:1:0: tag#3931 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.371103][ C0] sd 0:0:1:0: tag#3926 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 108.380061][ C1] sd 0:0:1:0: tag#3931 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.380077][ C1] sd 0:0:1:0: tag#3931 CDB[20]: ba [ 108.389862][ C0] sd 0:0:1:0: tag#3926 CDB: opcode=0xe5 (vendor) 05:58:22 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@ip_ttl={{0x14}}, @ip_retopts={{0x10}}], 0x28}, 0x0) [ 108.410291][ C0] sd 0:0:1:0: tag#3926 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.419351][ C0] sd 0:0:1:0: tag#3926 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.428411][ C0] sd 0:0:1:0: tag#3926 CDB[20]: ba [ 108.451014][ T3531] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw 05:58:22 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@ip_ttl={{0x14}}, @ip_retopts={{0x10}}], 0x28}, 0x0) 05:58:22 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) 05:58:22 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) 05:58:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x3, "625ba89fca32f92ca7733d220db1890cf3025c2e72ccedf277bd041dca28037f", "13b6de0426e1e58727728b53ed2d37dae92303d394cd354b540da59e358e5905", "ed01089cbf16d27b134a0004b2b92b36859fc22c7463fe5241e84fccefeeb4d4", "414b01b935a8f2cbb0a19a23ccf631b2717cfc3e10b399f60dec62a11d8e68a3", "a0491a9cdac2a6582b3fd4df615680fc54d28e7974a07d8eb16ec044132cb086", "7e816ac7e9714084fd3b7c87"}}) 05:58:22 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) [ 108.457643][ T3523] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 108.485295][ T3528] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw 05:58:23 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@ip_ttl={{0x14}}, @ip_retopts={{0x10}}], 0x28}, 0x0) 05:58:23 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@ip_ttl={{0x14}}, @ip_retopts={{0x10}}], 0x28}, 0x0) 05:58:23 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000500)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_LINK_NETNSID={0x8, 0xa, 0x3}, @NDA_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140), 0x10) fsetxattr$security_selinux(r5, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "8bebeb894f74c3"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x80, 0x8, 0xc, 0x4c, 0x0, 0x0, 0x21400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x1800, 0x7, 0x18000000, 0x4, 0x200, 0x9b4, 0x65, 0x0, 0xed1, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000b80)={{r6}, r4, 0x0, @unused=[0xc986, 0x38], @devid=r7}) clone(0x80910b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = signalfd(r8, &(0x7f00000002c0)={[0x480000000000]}, 0x8) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006a00200025bd7000fddbdf25020000000000000004000b007b0caa32bae6e54e7668022a23"], 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x238, 0x0, 0x0, 0x148, 0x108, 0x148, 0x1a0, 0x22f, 0x240, 0x1a0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, 'veth0_macvtap\x00', 'team0\x00'}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x0, 0x100}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x400, 0x7fffffff, 0x0, 0x0, 0x9, 0x7f, 0x6fe]}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00./']) 05:58:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x3, "625ba89fca32f92ca7733d220db1890cf3025c2e72ccedf277bd041dca28037f", "13b6de0426e1e58727728b53ed2d37dae92303d394cd354b540da59e358e5905", "ed01089cbf16d27b134a0004b2b92b36859fc22c7463fe5241e84fccefeeb4d4", "414b01b935a8f2cbb0a19a23ccf631b2717cfc3e10b399f60dec62a11d8e68a3", "a0491a9cdac2a6582b3fd4df615680fc54d28e7974a07d8eb16ec044132cb086", "7e816ac7e9714084fd3b7c87"}}) 05:58:23 executing program 4: set_mempolicy(0x1, &(0x7f0000000000)=0x7d, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x8c, 0x30, 0xffff, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ife={0x74, 0x1, 0x0, 0x0, {{0x8}, {0x4c, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_DMAC={0xa, 0x3, @random="4627e36ccac8"}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x10000000}, 0x1}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_PRIO={0x8}, @IFE_META_TCINDEX={0x6}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) [ 108.599222][ T3545] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 108.609553][ T3546] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw 05:58:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}, [@mark={0xc}]}, 0x34}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 05:58:23 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@ip_ttl={{0x14}}, @ip_retopts={{0x10}}], 0x28}, 0x0) 05:58:23 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@ip_ttl={{0x14}}, @ip_retopts={{0x10}}], 0x28}, 0x0) 05:58:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x3, "625ba89fca32f92ca7733d220db1890cf3025c2e72ccedf277bd041dca28037f", "13b6de0426e1e58727728b53ed2d37dae92303d394cd354b540da59e358e5905", "ed01089cbf16d27b134a0004b2b92b36859fc22c7463fe5241e84fccefeeb4d4", "414b01b935a8f2cbb0a19a23ccf631b2717cfc3e10b399f60dec62a11d8e68a3", "a0491a9cdac2a6582b3fd4df615680fc54d28e7974a07d8eb16ec044132cb086", "7e816ac7e9714084fd3b7c87"}}) 05:58:23 executing program 4: set_mempolicy(0x1, &(0x7f0000000000)=0x7d, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x8c, 0x30, 0xffff, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ife={0x74, 0x1, 0x0, 0x0, {{0x8}, {0x4c, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_DMAC={0xa, 0x3, @random="4627e36ccac8"}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x10000000}, 0x1}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_PRIO={0x8}, @IFE_META_TCINDEX={0x6}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 05:58:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@empty}, 0x14) [ 108.795537][ T3564] device veth0_to_bond entered promiscuous mode [ 108.802775][ T3564] team0: Device macvtap1 failed to register rx_handler [ 108.809996][ T3564] device veth0_to_bond left promiscuous mode 05:58:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x3, "625ba89fca32f92ca7733d220db1890cf3025c2e72ccedf277bd041dca28037f", "13b6de0426e1e58727728b53ed2d37dae92303d394cd354b540da59e358e5905", "ed01089cbf16d27b134a0004b2b92b36859fc22c7463fe5241e84fccefeeb4d4", "414b01b935a8f2cbb0a19a23ccf631b2717cfc3e10b399f60dec62a11d8e68a3", "a0491a9cdac2a6582b3fd4df615680fc54d28e7974a07d8eb16ec044132cb086", "7e816ac7e9714084fd3b7c87"}}) 05:58:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x68000000, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb9460a480e0a10000000e3bd6efb250009000e002e0040fe00ff050005001201", 0x2e}], 0x1}, 0x0) 05:58:23 executing program 2: unshare(0x2000400) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ppoll(&(0x7f0000000c80)=[{r1, 0x4085}], 0x1, 0x0, 0x0, 0x0) 05:58:23 executing program 4: set_mempolicy(0x1, &(0x7f0000000000)=0x7d, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x8c, 0x30, 0xffff, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ife={0x74, 0x1, 0x0, 0x0, {{0x8}, {0x4c, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_DMAC={0xa, 0x3, @random="4627e36ccac8"}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x10000000}, 0x1}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_PRIO={0x8}, @IFE_META_TCINDEX={0x6}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 05:58:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}, [@mark={0xc}]}, 0x34}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 05:58:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@empty}, 0x14) [ 108.895589][ T3564] syz-executor.0 (3564) used greatest stack depth: 10192 bytes left 05:58:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}, [@mark={0xc}]}, 0x34}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 05:58:23 executing program 2: unshare(0x2000400) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ppoll(&(0x7f0000000c80)=[{r1, 0x4085}], 0x1, 0x0, 0x0, 0x0) 05:58:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x68000000, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb9460a480e0a10000000e3bd6efb250009000e002e0040fe00ff050005001201", 0x2e}], 0x1}, 0x0) 05:58:23 executing program 4: set_mempolicy(0x1, &(0x7f0000000000)=0x7d, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x8c, 0x30, 0xffff, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ife={0x74, 0x1, 0x0, 0x0, {{0x8}, {0x4c, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_DMAC={0xa, 0x3, @random="4627e36ccac8"}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x10000000}, 0x1}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_PRIO={0x8}, @IFE_META_TCINDEX={0x6}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) [ 109.005217][ T3582] netlink: 'syz-executor.5': attribute type 46 has an invalid length. [ 109.031213][ T3585] device veth0_to_bond entered promiscuous mode [ 109.037993][ T1921] usb 9-2: enqueue for inactive port 1 [ 109.038691][ T3585] team0: Device macvtap1 failed to register rx_handler 05:58:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@empty}, 0x14) [ 109.043481][ T1921] usb 9-2: enqueue for inactive port 1 [ 109.056166][ T3585] device veth0_to_bond left promiscuous mode 05:58:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}, [@mark={0xc}]}, 0x34}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) [ 109.117802][ T1921] vhci_hcd: vhci_device speed not set [ 109.127864][ T25] usb 1-2: enqueue for inactive port 1 [ 109.134578][ T25] usb 1-2: enqueue for inactive port 1 [ 109.170812][ T3591] device veth0_to_bond entered promiscuous mode [ 109.178976][ T3591] team0: Device macvtap1 failed to register rx_handler [ 109.186193][ T3591] device veth0_to_bond left promiscuous mode [ 109.203547][ T3592] netlink: 'syz-executor.5': attribute type 46 has an invalid length. 05:58:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x68000000, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb9460a480e0a10000000e3bd6efb250009000e002e0040fe00ff050005001201", 0x2e}], 0x1}, 0x0) 05:58:23 executing program 2: unshare(0x2000400) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ppoll(&(0x7f0000000c80)=[{r1, 0x4085}], 0x1, 0x0, 0x0, 0x0) 05:58:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@setlink={0x34, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0xc, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x4}]}]}, @IFLA_CARRIER={0x5, 0x21, 0x6}]}, 0x34}}, 0x0) 05:58:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}, [@mark={0xc}]}, 0x34}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) [ 109.217913][ T25] vhci_hcd: vhci_device speed not set 05:58:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@empty}, 0x14) [ 109.327949][ T3598] device veth0_to_bond entered promiscuous mode [ 109.338633][ T3598] team0: Device macvtap1 failed to register rx_handler [ 109.345841][ T3598] device veth0_to_bond left promiscuous mode 05:58:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x68000000, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb9460a480e0a10000000e3bd6efb250009000e002e0040fe00ff050005001201", 0x2e}], 0x1}, 0x0) 05:58:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@setlink={0x34, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0xc, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x4}]}]}, @IFLA_CARRIER={0x5, 0x21, 0x6}]}, 0x34}}, 0x0) 05:58:23 executing program 2: unshare(0x2000400) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ppoll(&(0x7f0000000c80)=[{r1, 0x4085}], 0x1, 0x0, 0x0, 0x0) 05:58:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}, [@mark={0xc}]}, 0x34}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) [ 109.370775][ T3603] netlink: 'syz-executor.5': attribute type 46 has an invalid length. [ 109.383562][ T3604] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. 05:58:23 executing program 1: unshare(0x8000600) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast2}}, 0x24) [ 109.425494][ T3607] device veth0_to_bond entered promiscuous mode [ 109.434134][ T3607] team0: Device macvtap1 failed to register rx_handler [ 109.441642][ T3607] device veth0_to_bond left promiscuous mode 05:58:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}, [@mark={0xc}]}, 0x34}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 05:58:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x240, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1d0, 0xffffffff, 0xffffffff, 0x1d0, 0xffffffff, 0x3, 0x0, {[{{@ip={@remote, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'team0\x00', {}, {}, 0x0, 0x0, 0x82}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@ip={@broadcast, @loopback, 0x0, 0x0, 'syzkaller1\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) [ 109.555149][ T3613] netlink: 'syz-executor.5': attribute type 46 has an invalid length. [ 109.584677][ T3615] device veth0_to_bond entered promiscuous mode [ 109.591926][ T3615] team0: Device macvtap1 failed to register rx_handler 05:58:24 executing program 2: r0 = getpid() getpriority(0x1, r0) 05:58:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@setlink={0x34, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0xc, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x4}]}]}, @IFLA_CARRIER={0x5, 0x21, 0x6}]}, 0x34}}, 0x0) 05:58:24 executing program 1: unshare(0x8000600) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast2}}, 0x24) 05:58:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x1001, 0x4, 0x3e8, 0x210, 0x110, 0x110, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @remote, @multicast1, 0x1}}}, {{@arp={@remote, @loopback, 0x0, 0x0, 0x0, 0x0, {@mac=@multicast}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'vxcan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x7}}}, {{@arp={@local, @multicast1, 0x0, 0x0, 0x0, 0x0, {@mac=@random="a34d8414499c"}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'xfrm0\x00', 'virt_wifi0\x00'}, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) [ 109.600760][ T3615] device veth0_to_bond left promiscuous mode [ 109.615855][ T3616] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 109.691707][ T3620] device veth0_to_bond entered promiscuous mode [ 109.698866][ T3620] team0: Device macvtap1 failed to register rx_handler [ 109.706029][ T3620] device veth0_to_bond left promiscuous mode 05:58:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x240, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1d0, 0xffffffff, 0xffffffff, 0x1d0, 0xffffffff, 0x3, 0x0, {[{{@ip={@remote, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'team0\x00', {}, {}, 0x0, 0x0, 0x82}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@ip={@broadcast, @loopback, 0x0, 0x0, 'syzkaller1\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) 05:58:24 executing program 2: r0 = getpid() getpriority(0x1, r0) 05:58:24 executing program 1: unshare(0x8000600) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast2}}, 0x24) 05:58:24 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x7fffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x4bfa, 0x0) 05:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000140)=[{&(0x7f00000001c0)="d800000018008100e00f80ecdb4cb9ac0a4465ef0b007c05e87c55a1bc000900b8000699020000000500150007008103a80016000b0001c0060000005aac04000bd6936f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017a9ec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db791262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace813f0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f0500000000", 0xd8}], 0x1}, 0x0) 05:58:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@setlink={0x34, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0xc, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x4}]}]}, @IFLA_CARRIER={0x5, 0x21, 0x6}]}, 0x34}}, 0x0) [ 109.787646][ T3628] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 109.803162][ T3630] cannot load conntrack support for proto=3 05:58:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x240, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1d0, 0xffffffff, 0xffffffff, 0x1d0, 0xffffffff, 0x3, 0x0, {[{{@ip={@remote, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'team0\x00', {}, {}, 0x0, 0x0, 0x82}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@ip={@broadcast, @loopback, 0x0, 0x0, 'syzkaller1\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) 05:58:24 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x7fffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x4bfa, 0x0) 05:58:24 executing program 2: r0 = getpid() getpriority(0x1, r0) 05:58:24 executing program 1: unshare(0x8000600) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast2}}, 0x24) 05:58:24 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000048c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000004900)=0x119, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), 0x4) [ 109.909872][ T3641] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 109.938166][ T3642] IPv6: NLM_F_CREATE should be specified when creating new route [ 109.946012][ T3642] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 05:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000140)=[{&(0x7f00000001c0)="d800000018008100e00f80ecdb4cb9ac0a4465ef0b007c05e87c55a1bc000900b8000699020000000500150007008103a80016000b0001c0060000005aac04000bd6936f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017a9ec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db791262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace813f0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f0500000000", 0xd8}], 0x1}, 0x0) [ 109.954167][ T3642] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:24 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x7fffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x4bfa, 0x0) 05:58:24 executing program 5: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x240, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1d0, 0xffffffff, 0xffffffff, 0x1d0, 0xffffffff, 0x3, 0x0, {[{{@ip={@remote, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'team0\x00', {}, {}, 0x0, 0x0, 0x82}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@ip={@broadcast, @loopback, 0x0, 0x0, 'syzkaller1\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) 05:58:24 executing program 2: r0 = getpid() getpriority(0x1, r0) 05:58:24 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000a80)=ANY=[], 0xfffffecc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 05:58:24 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000048c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000004900)=0x119, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), 0x4) 05:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000140)=[{&(0x7f00000001c0)="d800000018008100e00f80ecdb4cb9ac0a4465ef0b007c05e87c55a1bc000900b8000699020000000500150007008103a80016000b0001c0060000005aac04000bd6936f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017a9ec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db791262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace813f0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f0500000000", 0xd8}], 0x1}, 0x0) [ 110.116459][ T3654] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 110.124663][ T3654] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:24 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x7fffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x4bfa, 0x0) 05:58:24 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}, {@version_9p2000}], [{@defcontext={'defcontext', 0x3d, 'root'}, 0x22}]}}) 05:58:24 executing program 2: r0 = syz_io_uring_setup(0x6862, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 05:58:24 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000048c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000004900)=0x119, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), 0x4) 05:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000140)=[{&(0x7f00000001c0)="d800000018008100e00f80ecdb4cb9ac0a4465ef0b007c05e87c55a1bc000900b8000699020000000500150007008103a80016000b0001c0060000005aac04000bd6936f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017a9ec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db791262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace813f0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f0500000000", 0xd8}], 0x1}, 0x0) 05:58:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000d40)=@mangle={'mangle\x00', 0x2, 0x6, 0x610, 0x0, 0x420, 0x0, 0x0, 0x0, 0x540, 0x540, 0x540, 0x540, 0x540, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@dst={{0x48}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@dev, @ipv4=@loopback}}}, {{@ipv6={@mcast1, @remote, [], [], 'veth1_to_team\x00', 'syz_tun\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private1, @ipv6=@mcast2}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0xff0}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x420}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ipv6header={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x670) 05:58:24 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}, {@version_9p2000}], [{@defcontext={'defcontext', 0x3d, 'root'}, 0x22}]}}) 05:58:24 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000048c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000004900)=0x119, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), 0x4) [ 110.257833][ T3667] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 110.265933][ T3667] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:24 executing program 2: r0 = syz_io_uring_setup(0x6862, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) [ 110.379319][ T3679] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 110.387418][ T3679] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x5, 0x100, 0x209e28, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) 05:58:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000d40)=@mangle={'mangle\x00', 0x2, 0x6, 0x610, 0x0, 0x420, 0x0, 0x0, 0x0, 0x540, 0x540, 0x540, 0x540, 0x540, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@dst={{0x48}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@dev, @ipv4=@loopback}}}, {{@ipv6={@mcast1, @remote, [], [], 'veth1_to_team\x00', 'syz_tun\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private1, @ipv6=@mcast2}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0xff0}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x420}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ipv6header={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x670) 05:58:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) 05:58:25 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}, {@version_9p2000}], [{@defcontext={'defcontext', 0x3d, 'root'}, 0x22}]}}) 05:58:25 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000a80)=ANY=[], 0xfffffecc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 05:58:25 executing program 2: r0 = syz_io_uring_setup(0x6862, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 05:58:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000d40)=@mangle={'mangle\x00', 0x2, 0x6, 0x610, 0x0, 0x420, 0x0, 0x0, 0x0, 0x540, 0x540, 0x540, 0x540, 0x540, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@dst={{0x48}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@dev, @ipv4=@loopback}}}, {{@ipv6={@mcast1, @remote, [], [], 'veth1_to_team\x00', 'syz_tun\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private1, @ipv6=@mcast2}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0xff0}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x420}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ipv6header={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x670) 05:58:25 executing program 2: r0 = syz_io_uring_setup(0x6862, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 05:58:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x5, 0x100, 0x209e28, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) 05:58:25 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}, {@version_9p2000}], [{@defcontext={'defcontext', 0x3d, 'root'}, 0x22}]}}) 05:58:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) 05:58:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000d40)=@mangle={'mangle\x00', 0x2, 0x6, 0x610, 0x0, 0x420, 0x0, 0x0, 0x0, 0x540, 0x540, 0x540, 0x540, 0x540, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@dst={{0x48}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@dev, @ipv4=@loopback}}}, {{@ipv6={@mcast1, @remote, [], [], 'veth1_to_team\x00', 'syz_tun\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private1, @ipv6=@mcast2}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0xff0}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x420}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ipv6header={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x670) 05:58:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x5, 0x100, 0x209e28, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) 05:58:25 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 05:58:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) 05:58:25 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x20000000) 05:58:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) writev(0xffffffffffffffff, &(0x7f00000046c0)=[{&(0x7f00000016c0)="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", 0x981}], 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@pppol2tp, 0x80, 0x0}, 0x0, 0x20000000}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0xfe80000000000000) io_uring_enter(r0, 0x7338, 0x0, 0x0, 0x0, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000006, 0x11, r0, 0x10000000) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000880)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000800)=@can, 0x0, 0x0, 0x1}, 0x6) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x2, 0x0) syz_io_uring_submit(r1, r4, 0x0, 0x0) 05:58:26 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x136, [0x0, 0x20000180, 0x200001b0, 0x200002be], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x11, 0x0, 0x0, 'vlan0\x00', 'wlan1\x00', 'tunl0\x00', 'vlan1\x00', @link_local, [], @remote, [], 0x6e, 0x6e, 0xa6, [], [], @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x1ae) 05:58:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) 05:58:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x5, 0x100, 0x209e28, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) 05:58:26 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x20000000) 05:58:26 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000a80)=ANY=[], 0xfffffecc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 05:58:26 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x136, [0x0, 0x20000180, 0x200001b0, 0x200002be], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x11, 0x0, 0x0, 'vlan0\x00', 'wlan1\x00', 'tunl0\x00', 'vlan1\x00', @link_local, [], @remote, [], 0x6e, 0x6e, 0xa6, [], [], @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x1ae) 05:58:26 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x20000000) 05:58:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000180)={{}, {0x2}}, 0x24, 0x0) 05:58:26 executing program 4: socketpair(0x10, 0x3, 0x5, &(0x7f0000000040)) 05:58:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) writev(0xffffffffffffffff, &(0x7f00000046c0)=[{&(0x7f00000016c0)="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", 0x981}], 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@pppol2tp, 0x80, 0x0}, 0x0, 0x20000000}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0xfe80000000000000) io_uring_enter(r0, 0x7338, 0x0, 0x0, 0x0, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000006, 0x11, r0, 0x10000000) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000880)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000800)=@can, 0x0, 0x0, 0x1}, 0x6) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x2, 0x0) syz_io_uring_submit(r1, r4, 0x0, 0x0) 05:58:26 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x20000000) 05:58:26 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x136, [0x0, 0x20000180, 0x200001b0, 0x200002be], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x11, 0x0, 0x0, 'vlan0\x00', 'wlan1\x00', 'tunl0\x00', 'vlan1\x00', @link_local, [], @remote, [], 0x6e, 0x6e, 0xa6, [], [], @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x1ae) [ 112.133856][ T24] kauditd_printk_skb: 6 callbacks suppressed [ 112.133867][ T24] audit: type=1400 audit(1639893506.544:275): avc: denied { create } for pid=3736 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 05:58:27 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000a80)=ANY=[], 0xfffffecc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 05:58:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000180)={{}, {0x2}}, 0x24, 0x0) 05:58:27 executing program 4: socketpair(0x10, 0x3, 0x5, &(0x7f0000000040)) 05:58:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newtaction={0xb4, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0xa0, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x4, r3}}]}, {0x4}, {0xc}, {0xc}}}, @m_csum={0x4c, 0x2, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xb4}}, 0x0) 05:58:27 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x136, [0x0, 0x20000180, 0x200001b0, 0x200002be], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x11, 0x0, 0x0, 'vlan0\x00', 'wlan1\x00', 'tunl0\x00', 'vlan1\x00', @link_local, [], @remote, [], 0x6e, 0x6e, 0xa6, [], [], @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x1ae) 05:58:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) writev(0xffffffffffffffff, &(0x7f00000046c0)=[{&(0x7f00000016c0)="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", 0x981}], 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@pppol2tp, 0x80, 0x0}, 0x0, 0x20000000}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0xfe80000000000000) io_uring_enter(r0, 0x7338, 0x0, 0x0, 0x0, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000006, 0x11, r0, 0x10000000) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000880)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000800)=@can, 0x0, 0x0, 0x1}, 0x6) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x2, 0x0) syz_io_uring_submit(r1, r4, 0x0, 0x0) 05:58:27 executing program 5: nanosleep(&(0x7f0000000100)={0xfffffffffffffffc}, 0x0) 05:58:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180), 0x8) 05:58:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000180)={{}, {0x2}}, 0x24, 0x0) 05:58:27 executing program 4: socketpair(0x10, 0x3, 0x5, &(0x7f0000000040)) 05:58:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) writev(0xffffffffffffffff, &(0x7f00000046c0)=[{&(0x7f00000016c0)="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", 0x981}], 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@pppol2tp, 0x80, 0x0}, 0x0, 0x20000000}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0xfe80000000000000) io_uring_enter(r0, 0x7338, 0x0, 0x0, 0x0, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000006, 0x11, r0, 0x10000000) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000880)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000800)=@can, 0x0, 0x0, 0x1}, 0x6) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x2, 0x0) syz_io_uring_submit(r1, r4, 0x0, 0x0) 05:58:27 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0xe0000004}) shutdown(r2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x400) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 05:58:28 executing program 4: socketpair(0x10, 0x3, 0x5, &(0x7f0000000040)) 05:58:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x5, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}]}], {0x14, 0x10}}, 0xbc}}, 0x0) 05:58:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r1, 0x0) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYBLOB="e03ff8b014785c5d92d55fa2a84bc23b79a34fa3f82766a2eac25ea0eb5d03e2a6c5459ce761cb246ec5920b437c9d5cfa0a564a456ec31698b087336a7a78e9f0a4f9a3159132a2ac2ef8d29a09665a4c06f5a610f3dff7204bee9f69cda8d3e9ab61f9c47a3f", @ANYRES64], 0xfc30) 05:58:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000180)={{}, {0x2}}, 0x24, 0x0) 05:58:28 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0xe0000004}) shutdown(r2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x400) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 05:58:28 executing program 1: r0 = fork() tgkill(r0, r0, 0x16) waitid(0x0, 0x0, 0x0, 0x41000002, &(0x7f0000000080)) 05:58:28 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010000100000000000000b9100a48", 0x12}], 0x1, 0x0, 0x0, 0xa}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 05:58:28 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e6, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) connect$inet6(r0, &(0x7f0000003c40)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 05:58:28 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0xe0000004}) shutdown(r2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x400) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 05:58:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x5, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}]}], {0x14, 0x10}}, 0xbc}}, 0x0) 05:58:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r1, 0x0) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYBLOB="e03ff8b014785c5d92d55fa2a84bc23b79a34fa3f82766a2eac25ea0eb5d03e2a6c5459ce761cb246ec5920b437c9d5cfa0a564a456ec31698b087336a7a78e9f0a4f9a3159132a2ac2ef8d29a09665a4c06f5a610f3dff7204bee9f69cda8d3e9ab61f9c47a3f", @ANYRES64], 0xfc30) [ 113.912853][ T3783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:28 executing program 1: r0 = fork() tgkill(r0, r0, 0x16) waitid(0x0, 0x0, 0x0, 0x41000002, &(0x7f0000000080)) 05:58:28 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0xe0000004}) shutdown(r2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x400) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 05:58:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x5, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}]}], {0x14, 0x10}}, 0xbc}}, 0x0) 05:58:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r1, 0x0) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYBLOB="e03ff8b014785c5d92d55fa2a84bc23b79a34fa3f82766a2eac25ea0eb5d03e2a6c5459ce761cb246ec5920b437c9d5cfa0a564a456ec31698b087336a7a78e9f0a4f9a3159132a2ac2ef8d29a09665a4c06f5a610f3dff7204bee9f69cda8d3e9ab61f9c47a3f", @ANYRES64], 0xfc30) 05:58:28 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e6, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) connect$inet6(r0, &(0x7f0000003c40)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 05:58:28 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010000100000000000000b9100a48", 0x12}], 0x1, 0x0, 0x0, 0xa}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 05:58:28 executing program 1: r0 = fork() tgkill(r0, r0, 0x16) waitid(0x0, 0x0, 0x0, 0x41000002, &(0x7f0000000080)) [ 114.048767][ T3796] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:28 executing program 2: r0 = fork() tgkill(r0, r0, 0x16) waitid(0x0, 0x0, 0x0, 0x41000002, &(0x7f0000000080)) 05:58:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x5, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}]}], {0x14, 0x10}}, 0xbc}}, 0x0) [ 114.154254][ T3804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r1, 0x0) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYBLOB="e03ff8b014785c5d92d55fa2a84bc23b79a34fa3f82766a2eac25ea0eb5d03e2a6c5459ce761cb246ec5920b437c9d5cfa0a564a456ec31698b087336a7a78e9f0a4f9a3159132a2ac2ef8d29a09665a4c06f5a610f3dff7204bee9f69cda8d3e9ab61f9c47a3f", @ANYRES64], 0xfc30) 05:58:28 executing program 1: r0 = fork() tgkill(r0, r0, 0x16) waitid(0x0, 0x0, 0x0, 0x41000002, &(0x7f0000000080)) 05:58:28 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010000100000000000000b9100a48", 0x12}], 0x1, 0x0, 0x0, 0xa}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 05:58:28 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e6, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) connect$inet6(r0, &(0x7f0000003c40)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 05:58:28 executing program 2: r0 = fork() tgkill(r0, r0, 0x16) waitid(0x0, 0x0, 0x0, 0x41000002, &(0x7f0000000080)) 05:58:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r1, 0x0) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYBLOB="e03ff8b014785c5d92d55fa2a84bc23b79a34fa3f82766a2eac25ea0eb5d03e2a6c5459ce761cb246ec5920b437c9d5cfa0a564a456ec31698b087336a7a78e9f0a4f9a3159132a2ac2ef8d29a09665a4c06f5a610f3dff7204bee9f69cda8d3e9ab61f9c47a3f", @ANYRES64], 0xfc30) [ 114.280261][ T3818] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x3c, 0x11, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0x5, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}]}]}, 0x3c}}, 0x0) 05:58:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000400)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000300)="baec4b844dbc", 0x0, 0x0, 0x0, 0x0, 0x0}) 05:58:28 executing program 2: r0 = fork() tgkill(r0, r0, 0x16) waitid(0x0, 0x0, 0x0, 0x41000002, &(0x7f0000000080)) 05:58:28 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010000100000000000000b9100a48", 0x12}], 0x1, 0x0, 0x0, 0xa}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 05:58:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r1, 0x0) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYBLOB="e03ff8b014785c5d92d55fa2a84bc23b79a34fa3f82766a2eac25ea0eb5d03e2a6c5459ce761cb246ec5920b437c9d5cfa0a564a456ec31698b087336a7a78e9f0a4f9a3159132a2ac2ef8d29a09665a4c06f5a610f3dff7204bee9f69cda8d3e9ab61f9c47a3f", @ANYRES64], 0xfc30) 05:58:28 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e6, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) connect$inet6(r0, &(0x7f0000003c40)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 05:58:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x3c, 0x11, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0x5, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}]}]}, 0x3c}}, 0x0) 05:58:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000400)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000300)="baec4b844dbc", 0x0, 0x0, 0x0, 0x0, 0x0}) 05:58:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_delneigh={0x28, 0x1d, 0xe05, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x8f}, [@NDA_DST_MAC={0xa, 0x1, @broadcast}]}, 0x28}}, 0x0) 05:58:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r1, 0x0) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYBLOB="e03ff8b014785c5d92d55fa2a84bc23b79a34fa3f82766a2eac25ea0eb5d03e2a6c5459ce761cb246ec5920b437c9d5cfa0a564a456ec31698b087336a7a78e9f0a4f9a3159132a2ac2ef8d29a09665a4c06f5a610f3dff7204bee9f69cda8d3e9ab61f9c47a3f", @ANYRES64], 0xfc30) 05:58:28 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x2014}) 05:58:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x3c, 0x11, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0x5, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}]}]}, 0x3c}}, 0x0) 05:58:29 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x120) 05:58:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_delneigh={0x28, 0x1d, 0xe05, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x8f}, [@NDA_DST_MAC={0xa, 0x1, @broadcast}]}, 0x28}}, 0x0) 05:58:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000400)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000300)="baec4b844dbc", 0x0, 0x0, 0x0, 0x0, 0x0}) 05:58:29 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x2014}) 05:58:29 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000280)=""/76, 0xff0d}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x0, &(0x7f0000000280)) getpeername(r0, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000040)=0x80) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x100) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x4000000) 05:58:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x3c, 0x11, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0x5, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}]}]}, 0x3c}}, 0x0) 05:58:29 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x120) 05:58:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_delneigh={0x28, 0x1d, 0xe05, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x8f}, [@NDA_DST_MAC={0xa, 0x1, @broadcast}]}, 0x28}}, 0x0) 05:58:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000400)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000300)="baec4b844dbc", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 114.725048][ T24] audit: type=1400 audit(1639893509.134:276): avc: denied { setopt } for pid=3857 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 05:58:29 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x2014}) 05:58:29 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@hide}]}) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 05:58:29 executing program 3: open$dir(&(0x7f0000002540)='./file0\x00', 0x40, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x0, 0x0, 0x0, 0x0, 0xc, "291bd7a611491541dcc61d57"}, 0x15, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "28799012e3a711676fefe7c6f86d4bc5445487bb"}, 0x15, 0x0) 05:58:29 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x120) [ 114.846165][ T24] audit: type=1400 audit(1639893509.254:277): avc: denied { mount } for pid=3867 comm="syz-executor.3" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 114.868848][ T24] audit: type=1400 audit(1639893509.254:278): avc: denied { search } for pid=3867 comm="syz-executor.3" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 05:58:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_delneigh={0x28, 0x1d, 0xe05, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x8f}, [@NDA_DST_MAC={0xa, 0x1, @broadcast}]}, 0x28}}, 0x0) 05:58:29 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 05:58:29 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x2014}) [ 114.964741][ T24] audit: type=1400 audit(1639893509.374:279): avc: denied { unmount } for pid=1830 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 05:58:29 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x120) 05:58:29 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@hide}]}) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 05:58:29 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x7, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9020008}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) [ 115.041121][ T3882] loop1: detected capacity change from 0 to 192 [ 115.057031][ T24] audit: type=1400 audit(1639893509.464:280): avc: denied { mount } for pid=3878 comm="syz-executor.1" name="/" dev="loop1" ino=1472 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 05:58:29 executing program 3: open$dir(&(0x7f0000002540)='./file0\x00', 0x40, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x0, 0x0, 0x0, 0x0, 0xc, "291bd7a611491541dcc61d57"}, 0x15, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "28799012e3a711676fefe7c6f86d4bc5445487bb"}, 0x15, 0x0) 05:58:29 executing program 5: open$dir(&(0x7f0000002540)='./file0\x00', 0x40, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x0, 0x0, 0x0, 0x0, 0xc, "291bd7a611491541dcc61d57"}, 0x15, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "28799012e3a711676fefe7c6f86d4bc5445487bb"}, 0x15, 0x0) [ 115.118476][ T3887] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) [ 115.126235][ T24] audit: type=1400 audit(1639893509.534:281): avc: denied { getopt } for pid=3885 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 05:58:29 executing program 0: r0 = syz_io_uring_setup(0x501a, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r3, 0x1f) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) [ 115.150191][ T24] audit: type=1400 audit(1639893509.564:282): avc: denied { unmount } for pid=1828 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 05:58:29 executing program 4: syz_mount_image$msdos(&(0x7f0000001a80), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) close(r0) 05:58:29 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x7, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9020008}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 05:58:29 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@hide}]}) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 05:58:29 executing program 3: open$dir(&(0x7f0000002540)='./file0\x00', 0x40, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x0, 0x0, 0x0, 0x0, 0xc, "291bd7a611491541dcc61d57"}, 0x15, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "28799012e3a711676fefe7c6f86d4bc5445487bb"}, 0x15, 0x0) 05:58:29 executing program 5: open$dir(&(0x7f0000002540)='./file0\x00', 0x40, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x0, 0x0, 0x0, 0x0, 0xc, "291bd7a611491541dcc61d57"}, 0x15, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "28799012e3a711676fefe7c6f86d4bc5445487bb"}, 0x15, 0x0) 05:58:29 executing program 0: r0 = syz_io_uring_setup(0x501a, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r3, 0x1f) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) [ 115.269596][ T3897] loop1: detected capacity change from 0 to 192 05:58:29 executing program 4: syz_mount_image$msdos(&(0x7f0000001a80), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) close(r0) 05:58:29 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x7, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9020008}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) [ 115.341893][ T3904] loop4: detected capacity change from 0 to 87 [ 115.357122][ T24] audit: type=1400 audit(1639893509.764:283): avc: denied { mount } for pid=3902 comm="syz-executor.4" name="/" dev="loop4" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 115.397276][ T24] audit: type=1400 audit(1639893509.804:284): avc: denied { unmount } for pid=1856 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 05:58:29 executing program 0: r0 = syz_io_uring_setup(0x501a, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r3, 0x1f) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 05:58:29 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@hide}]}) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 05:58:29 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x7, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9020008}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 05:58:29 executing program 3: open$dir(&(0x7f0000002540)='./file0\x00', 0x40, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x0, 0x0, 0x0, 0x0, 0xc, "291bd7a611491541dcc61d57"}, 0x15, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "28799012e3a711676fefe7c6f86d4bc5445487bb"}, 0x15, 0x0) 05:58:29 executing program 5: open$dir(&(0x7f0000002540)='./file0\x00', 0x40, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x0, 0x0, 0x0, 0x0, 0xc, "291bd7a611491541dcc61d57"}, 0x15, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "28799012e3a711676fefe7c6f86d4bc5445487bb"}, 0x15, 0x0) [ 115.491092][ T3911] loop1: detected capacity change from 0 to 192 05:58:30 executing program 0: r0 = syz_io_uring_setup(0x501a, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r3, 0x1f) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 05:58:30 executing program 4: syz_mount_image$msdos(&(0x7f0000001a80), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) close(r0) [ 115.568274][ T3919] loop4: detected capacity change from 0 to 87 05:58:30 executing program 2: syz_mount_image$msdos(&(0x7f0000001a80), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) close(r0) 05:58:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) 05:58:30 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, @in, @hci, @generic={0x0, "1a969e69cf66ac4c46aa99dbe3e5"}, 0x5}) 05:58:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x2) 05:58:30 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/ipc\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x500000005}]}, 0x30}}, 0x0) [ 115.654085][ T3927] loop1: detected capacity change from 0 to 192 05:58:30 executing program 4: syz_mount_image$msdos(&(0x7f0000001a80), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) close(r0) 05:58:30 executing program 2: syz_mount_image$msdos(&(0x7f0000001a80), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) close(r0) [ 115.727252][ T3932] loop4: detected capacity change from 0 to 87 [ 115.755229][ T3933] loop2: detected capacity change from 0 to 87 05:58:30 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/ipc\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x500000005}]}, 0x30}}, 0x0) 05:58:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) 05:58:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x2) 05:58:30 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket(0x400000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 05:58:30 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='pagemap\x00') close_range(r0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000280)={0x104800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x2) 05:58:30 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/ipc\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x500000005}]}, 0x30}}, 0x0) 05:58:30 executing program 2: syz_mount_image$msdos(&(0x7f0000001a80), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) close(r0) 05:58:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) 05:58:30 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket(0x400000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) [ 115.901831][ T3947] loop4: detected capacity change from 0 to 87 [ 115.933041][ T3950] loop2: detected capacity change from 0 to 87 05:58:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x2) 05:58:30 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/ipc\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x500000005}]}, 0x30}}, 0x0) 05:58:30 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket(0x400000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 05:58:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) [ 116.105141][ T3962] ================================================================== [ 116.113225][ T3962] BUG: KCSAN: data-race in jbd2_journal_stop / jbd2_journal_stop [ 116.120920][ T3962] [ 116.123270][ T3962] write to 0xffff88810368f4f8 of 4 bytes by task 1830 on cpu 0: [ 116.130871][ T3962] jbd2_journal_stop+0x2e6/0x6a0 [ 116.135789][ T3962] __ext4_journal_stop+0x99/0x110 [ 116.140790][ T3962] ext4_unlink+0x21c/0x3b0 [ 116.145181][ T3962] vfs_unlink+0x257/0x450 [ 116.149615][ T3962] do_unlinkat+0x278/0x540 [ 116.154004][ T3962] __x64_sys_unlink+0x2c/0x30 [ 116.158657][ T3962] do_syscall_64+0x44/0xd0 [ 116.163088][ T3962] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.168958][ T3962] [ 116.171284][ T3962] read to 0xffff88810368f4f8 of 4 bytes by task 3962 on cpu 1: [ 116.178798][ T3962] jbd2_journal_stop+0x297/0x6a0 [ 116.183712][ T3962] __ext4_journal_stop+0x99/0x110 [ 116.188714][ T3962] ext4_symlink+0x4db/0x700 [ 116.193201][ T3962] vfs_symlink+0x241/0x330 [ 116.197598][ T3962] do_symlinkat+0x104/0x380 [ 116.202080][ T3962] __x64_sys_symlink+0x52/0x60 [ 116.206816][ T3962] do_syscall_64+0x44/0xd0 [ 116.211208][ T3962] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.217080][ T3962] [ 116.219530][ T3962] value changed: 0x00000723 -> 0x00000726 [ 116.225222][ T3962] [ 116.227521][ T3962] Reported by Kernel Concurrency Sanitizer on: [ 116.233650][ T3962] CPU: 1 PID: 3962 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0 [ 116.242319][ T3962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:58:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='session=0']) 05:58:30 executing program 2: init_module(&(0x7f0000000100)='\x00Q\xa8\x03\xf2n\x83\xa2\vX2\v$\xa4>L\xdb\x81U\x19M\x85Z\xe0\x7f\x82^\xef\xea\xf6\x1f\xe7\xd0\xf3\xcb\xc7{;\xd5\x00\fh\x18\x1a\x1fIU\r\"@\f\xf4\xc1\xdfpI\xba_\xf4\x00\xdc\xf05\x04\xee\xd0n\xd6\xb0\x98\xf8\xc2\x15\x84-\xac\xa7\r\xb6\xfc\xce\xd5\\0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) write$P9_RMKNOD(r4, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 05:58:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1b) close(r0) 05:58:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='session=0']) [ 116.383427][ T3976] ISOFS: Unable to identify CD-ROM format. 05:58:30 executing program 2: init_module(&(0x7f0000000100)='\x00Q\xa8\x03\xf2n\x83\xa2\vX2\v$\xa4>L\xdb\x81U\x19M\x85Z\xe0\x7f\x82^\xef\xea\xf6\x1f\xe7\xd0\xf3\xcb\xc7{;\xd5\x00\fh\x18\x1a\x1fIU\r\"@\f\xf4\xc1\xdfpI\xba_\xf4\x00\xdc\xf05\x04\xee\xd0n\xd6\xb0\x98\xf8\xc2\x15\x84-\xac\xa7\r\xb6\xfc\xce\xd5\\0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) write$P9_RMKNOD(r4, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 05:58:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1b) close(r0) 05:58:30 executing program 2: init_module(&(0x7f0000000100)='\x00Q\xa8\x03\xf2n\x83\xa2\vX2\v$\xa4>L\xdb\x81U\x19M\x85Z\xe0\x7f\x82^\xef\xea\xf6\x1f\xe7\xd0\xf3\xcb\xc7{;\xd5\x00\fh\x18\x1a\x1fIU\r\"@\f\xf4\xc1\xdfpI\xba_\xf4\x00\xdc\xf05\x04\xee\xd0n\xd6\xb0\x98\xf8\xc2\x15\x84-\xac\xa7\r\xb6\xfc\xce\xd5\\0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) write$P9_RMKNOD(r4, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 05:58:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1b) close(r0) 05:58:31 executing program 2: init_module(&(0x7f0000000100)='\x00Q\xa8\x03\xf2n\x83\xa2\vX2\v$\xa4>L\xdb\x81U\x19M\x85Z\xe0\x7f\x82^\xef\xea\xf6\x1f\xe7\xd0\xf3\xcb\xc7{;\xd5\x00\fh\x18\x1a\x1fIU\r\"@\f\xf4\xc1\xdfpI\xba_\xf4\x00\xdc\xf05\x04\xee\xd0n\xd6\xb0\x98\xf8\xc2\x15\x84-\xac\xa7\r\xb6\xfc\xce\xd5\\0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x126}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vti={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x3}, @IFLA_VTI_IKEY={0x8, 0x2, 0x10000}]]}}}, @IFLA_GROUP={0x8, 0x1b, 0x7}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 05:58:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket$inet6_sctp(0xa, 0x801, 0x84) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffe]}, 0x0, 0x8) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) write$P9_RMKNOD(r4, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) [ 116.760796][ T4010] ISOFS: Unable to identify CD-ROM format. 05:58:31 executing program 1: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="5500000018007f03c0fe15b282a380930a60020200a84302916d0200390009003500ff6c0800000015000500fc060000070b566881b18432119b1100b1df13000000fb0000400014000040970de3b3000000000900", 0x55}], 0x1}, 0x0) 05:58:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='session=0']) 05:58:31 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$getregset(0x4205, r3, 0x1, &(0x7f0000000380)={0x0}) [ 116.801165][ T4015] IPv6: Can't replace route, no match found [ 116.807367][ T4016] Invalid ELF header magic: != ELF 05:58:31 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) dup3(r1, r0, 0x0) 05:58:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x8) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x126}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vti={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x3}, @IFLA_VTI_IKEY={0x8, 0x2, 0x10000}]]}}}, @IFLA_GROUP={0x8, 0x1b, 0x7}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 05:58:31 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$getregset(0x4205, r3, 0x1, &(0x7f0000000380)={0x0}) 05:58:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x8) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x126}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vti={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x3}, @IFLA_VTI_IKEY={0x8, 0x2, 0x10000}]]}}}, @IFLA_GROUP={0x8, 0x1b, 0x7}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 05:58:31 executing program 3: prctl$PR_MCE_KILL(0x21, 0x1, 0x2) [ 116.890740][ T4020] device vti0 entered promiscuous mode [ 116.922731][ T4025] IPv6: Can't replace route, no match found 05:58:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x8) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x126}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vti={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x3}, @IFLA_VTI_IKEY={0x8, 0x2, 0x10000}]]}}}, @IFLA_GROUP={0x8, 0x1b, 0x7}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) [ 116.960553][ T4028] ISOFS: Unable to identify CD-ROM format. 05:58:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001380)={0x54, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x54}}, 0x0) 05:58:31 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$getregset(0x4205, r3, 0x1, &(0x7f0000000380)={0x0}) 05:58:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x8) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x126}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vti={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x3}, @IFLA_VTI_IKEY={0x8, 0x2, 0x10000}]]}}}, @IFLA_GROUP={0x8, 0x1b, 0x7}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 05:58:31 executing program 3: prctl$PR_MCE_KILL(0x21, 0x1, 0x2) [ 117.059107][ T4036] device vti0 entered promiscuous mode 05:58:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x8) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x126}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vti={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x3}, @IFLA_VTI_IKEY={0x8, 0x2, 0x10000}]]}}}, @IFLA_GROUP={0x8, 0x1b, 0x7}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 05:58:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001380)={0x54, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x54}}, 0x0) 05:58:31 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$getregset(0x4205, r3, 0x1, &(0x7f0000000380)={0x0}) 05:58:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x8) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x126}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vti={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x3}, @IFLA_VTI_IKEY={0x8, 0x2, 0x10000}]]}}}, @IFLA_GROUP={0x8, 0x1b, 0x7}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 05:58:31 executing program 3: prctl$PR_MCE_KILL(0x21, 0x1, 0x2) 05:58:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001380)={0x54, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x54}}, 0x0) 05:58:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:31 executing program 3: prctl$PR_MCE_KILL(0x21, 0x1, 0x2) 05:58:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001380)={0x54, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x54}}, 0x0) 05:58:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:31 executing program 3: sched_setattr(0x0, &(0x7f0000000140)={0x17, 0x0, 0x0, 0x0, 0x101}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x8a, &(0x7f0000000200)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x12, 0xf989, "5ab971d14f73e13277c8d2c03afe"}, @fastopen={0x22, 0x12, "69450344dd36b51b34916946259540e8"}, @exp_fastopen={0xfe, 0xf, 0xf989, "8f5a000000000000000000"}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "070902", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 05:58:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'erspan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0xc3b, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8}, @IFLA_GRE_ERSPAN_VER={0x5}]}}}]}, 0x48}}, 0x0) 05:58:31 executing program 3: sched_setattr(0x0, &(0x7f0000000140)={0x17, 0x0, 0x0, 0x0, 0x101}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x8a, &(0x7f0000000200)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x12, 0xf989, "5ab971d14f73e13277c8d2c03afe"}, @fastopen={0x22, 0x12, "69450344dd36b51b34916946259540e8"}, @exp_fastopen={0xfe, 0xf, 0xf989, "8f5a000000000000000000"}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "070902", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 05:58:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) [ 117.603789][ T4091] ================================================================== [ 117.611873][ T4091] BUG: KCSAN: data-race in jbd2_journal_dirty_metadata / jbd2_journal_dirty_metadata [ 117.621403][ T4091] [ 117.623706][ T4091] write to 0xffff8881049e35c4 of 4 bytes by task 1830 on cpu 1: [ 117.631314][ T4091] jbd2_journal_dirty_metadata+0x2f6/0x690 [ 117.637214][ T4091] __ext4_handle_dirty_metadata+0xfb/0x5a0 [ 117.643013][ T4091] __ext4_new_inode+0x1f0b/0x2fc0 [ 117.643033][ T4091] ext4_mkdir+0x28a/0x760 05:58:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'erspan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0xc3b, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8}, @IFLA_GRE_ERSPAN_VER={0x5}]}}}]}, 0x48}}, 0x0) [ 117.643049][ T4091] vfs_mkdir+0x2c8/0x3d0 [ 117.643067][ T4091] do_mkdirat+0x12e/0x2c0 [ 117.643081][ T4091] __x64_sys_mkdir+0x40/0x50 [ 117.665453][ T4091] do_syscall_64+0x44/0xd0 [ 117.669868][ T4091] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.669886][ T4091] [ 117.669889][ T4091] read to 0xffff8881049e35c4 of 4 bytes by task 4091 on cpu 0: [ 117.669898][ T4091] jbd2_journal_dirty_metadata+0x16f/0x690 [ 117.669910][ T4091] __ext4_handle_dirty_metadata+0xfb/0x5a0 [ 117.669924][ T4091] __ext4_new_inode+0x1f0b/0x2fc0 05:58:32 executing program 3: sched_setattr(0x0, &(0x7f0000000140)={0x17, 0x0, 0x0, 0x0, 0x101}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x8a, &(0x7f0000000200)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x12, 0xf989, "5ab971d14f73e13277c8d2c03afe"}, @fastopen={0x22, 0x12, "69450344dd36b51b34916946259540e8"}, @exp_fastopen={0xfe, 0xf, 0xf989, "8f5a000000000000000000"}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "070902", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) [ 117.669934][ T4091] ext4_symlink+0x2cc/0x700 [ 117.669944][ T4091] vfs_symlink+0x241/0x330 [ 117.669954][ T4091] do_symlinkat+0x104/0x380 [ 117.669963][ T4091] __x64_sys_symlink+0x52/0x60 [ 117.669973][ T4091] do_syscall_64+0x44/0xd0 [ 117.669984][ T4091] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.669998][ T4091] [ 117.670000][ T4091] value changed: 0x00000000 -> 0x00000001 [ 117.670009][ T4091] [ 117.670011][ T4091] Reported by Kernel Concurrency Sanitizer on: 05:58:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) 05:58:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r1, &(0x7f00000001c0)="c0", 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "38007b7b008f1200000000000052400f1300"}) [ 117.670016][ T4091] CPU: 0 PID: 4091 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0 [ 117.670036][ T4091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.670046][ T4091] ================================================================== 05:58:32 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000018007f01c0fe15b282a380930a50000248a84302916d0200390009002300ff6c0200000015000500fc01ffdd070b566881b38432009b1100b1df13000000fb0009000000000000000de3b3000000000901", 0x55}], 0x1}, 0x0) 05:58:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'erspan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0xc3b, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8}, @IFLA_GRE_ERSPAN_VER={0x5}]}}}]}, 0x48}}, 0x0) 05:58:32 executing program 3: sched_setattr(0x0, &(0x7f0000000140)={0x17, 0x0, 0x0, 0x0, 0x101}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x8a, &(0x7f0000000200)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x12, 0xf989, "5ab971d14f73e13277c8d2c03afe"}, @fastopen={0x22, 0x12, "69450344dd36b51b34916946259540e8"}, @exp_fastopen={0xfe, 0xf, 0xf989, "8f5a000000000000000000"}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "070902", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 05:58:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 05:58:32 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000018007f01c0fe15b282a380930a50000248a84302916d0200390009002300ff6c0200000015000500fc01ffdd070b566881b38432009b1100b1df13000000fb0009000000000000000de3b3000000000901", 0x55}], 0x1}, 0x0) 05:58:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'erspan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0xc3b, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8}, @IFLA_GRE_ERSPAN_VER={0x5}]}}}]}, 0x48}}, 0x0) 05:58:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 05:58:32 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x40187014, &(0x7f0000000080)) [ 117.942560][ T4114] IPv6: NLM_F_CREATE should be specified when creating new route 05:58:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0x6, 0xa, 0x9, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x5, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 05:58:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 05:58:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 05:58:32 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000018007f01c0fe15b282a380930a50000248a84302916d0200390009002300ff6c0200000015000500fc01ffdd070b566881b38432009b1100b1df13000000fb0009000000000000000de3b3000000000901", 0x55}], 0x1}, 0x0) 05:58:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socket$kcm(0x10, 0x2, 0x0) [ 118.085292][ T24] kauditd_printk_skb: 12 callbacks suppressed [ 118.085304][ T24] audit: type=1400 audit(1639893512.494:297): avc: denied { read } for pid=4125 comm="syz-executor.1" name="rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 05:58:32 executing program 4: syz_usbip_server_init(0x2) 05:58:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0x6, 0xa, 0x9, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x5, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 05:58:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) [ 118.114636][ T24] audit: type=1400 audit(1639893512.494:298): avc: denied { open } for pid=4125 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 118.131130][ T4132] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 118.138314][ T24] audit: type=1400 audit(1639893512.504:299): avc: denied { ioctl } for pid=4125 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=219 ioctlcmd=0x7014 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 05:58:32 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000018007f01c0fe15b282a380930a50000248a84302916d0200390009002300ff6c0200000015000500fc01ffdd070b566881b38432009b1100b1df13000000fb0009000000000000000de3b3000000000901", 0x55}], 0x1}, 0x0) 05:58:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 118.291854][ T4142] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.294639][ T4143] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 118.299613][ T4142] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.305451][ T4143] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 118.305552][ T4143] vhci_hcd vhci_hcd.0: Device attached [ 118.316466][ T4142] device bridge0 entered promiscuous mode 05:58:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000480)=""/37, 0x25}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x24}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000001c0), 0xc, &(0x7f00000006c0)={0x0, 0x3a0}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)={0x1c}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000880)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x202}, {&(0x7f0000000fc0)=""/4096, 0x6f}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0xa98}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 05:58:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 05:58:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0x6, 0xa, 0x9, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x5, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) [ 118.323773][ T4144] vhci_hcd: connection closed [ 118.338618][ T1841] vhci_hcd: stop threads [ 118.347674][ T1841] vhci_hcd: release socket [ 118.352196][ T1841] vhci_hcd: disconnect device [ 118.375462][ T4147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 05:58:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x3, 0x6b69}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000180)}, 0x20) 05:58:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000480)=""/37, 0x25}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x24}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000001c0), 0xc, &(0x7f00000006c0)={0x0, 0x3a0}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)={0x1c}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000880)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x202}, {&(0x7f0000000fc0)=""/4096, 0x6f}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0xa98}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 05:58:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000600)={0x0, @in={0x2, 0x0, @empty}, @ethernet={0x0, @random="82eeddb75203"}, @can, 0x5, 0x0, 0x0, 0x0, 0x401}) [ 118.507173][ T4158] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:33 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xcf, 0x0, 0x0) 05:58:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x3, 0x6b69}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000180)}, 0x20) 05:58:33 executing program 2: io_setup(0xfff, &(0x7f0000001540)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001640)=[&(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x2}]) 05:58:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='io.stat\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000500)='f', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000), &(0x7f0000000000)=0x8) 05:58:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0x6, 0xa, 0x9, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x5, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 05:58:33 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000480)=""/37, 0x25}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x24}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000001c0), 0xc, &(0x7f00000006c0)={0x0, 0x3a0}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)={0x1c}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000880)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x202}, {&(0x7f0000000fc0)=""/4096, 0x6f}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0xa98}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 05:58:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x3, 0x6b69}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000180)}, 0x20) 05:58:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000006c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x14, &(0x7f0000000240)={@random="d61898e6cff2", @link_local, @val={@void}, {@mpls_mc={0x8848, {[], @generic="7ae5"}}}}, 0x0) 05:58:33 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000480)=""/37, 0x25}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x24}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000001c0), 0xc, &(0x7f00000006c0)={0x0, 0x3a0}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)={0x1c}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000880)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x202}, {&(0x7f0000000fc0)=""/4096, 0x6f}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0xa98}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 05:58:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='io.stat\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000500)='f', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000), &(0x7f0000000000)=0x8) 05:58:33 executing program 2: io_setup(0xfff, &(0x7f0000001540)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001640)=[&(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x2}]) [ 118.866044][ T4175] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 118.889455][ T24] audit: type=1400 audit(1639893513.304:300): avc: denied { getopt } for pid=4169 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 05:58:33 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xcf, 0x0, 0x0) 05:58:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x3, 0x6b69}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000180)}, 0x20) 05:58:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000006c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x14, &(0x7f0000000240)={@random="d61898e6cff2", @link_local, @val={@void}, {@mpls_mc={0x8848, {[], @generic="7ae5"}}}}, 0x0) 05:58:33 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x6, 0x0, &(0x7f00000015c0)) 05:58:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='io.stat\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000500)='f', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000), &(0x7f0000000000)=0x8) 05:58:33 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xcf, 0x0, 0x0) 05:58:33 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x4000400) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000100)={0x9}, &(0x7f0000000140), 0x0) 05:58:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000006c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x14, &(0x7f0000000240)={@random="d61898e6cff2", @link_local, @val={@void}, {@mpls_mc={0x8848, {[], @generic="7ae5"}}}}, 0x0) 05:58:33 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x6, 0x0, &(0x7f00000015c0)) 05:58:33 executing program 2: io_setup(0xfff, &(0x7f0000001540)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001640)=[&(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x2}]) 05:58:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='io.stat\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000500)='f', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000), &(0x7f0000000000)=0x8) 05:58:33 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xcf, 0x0, 0x0) 05:58:33 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x4000400) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000100)={0x9}, &(0x7f0000000140), 0x0) 05:58:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000006c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x14, &(0x7f0000000240)={@random="d61898e6cff2", @link_local, @val={@void}, {@mpls_mc={0x8848, {[], @generic="7ae5"}}}}, 0x0) 05:58:33 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x6, 0x0, &(0x7f00000015c0)) 05:58:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x5414, &(0x7f0000000040)=""/146) 05:58:33 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x4000400) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000100)={0x9}, &(0x7f0000000140), 0x0) 05:58:33 executing program 2: io_setup(0xfff, &(0x7f0000001540)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001640)=[&(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x2}]) 05:58:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x44, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x19}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}]}]}, 0x44}}, 0x0) 05:58:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') preadv(r0, &(0x7f0000000880)=[{&(0x7f0000000180)=""/58, 0x3a}], 0x1, 0x101, 0x0) 05:58:33 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x6, 0x0, &(0x7f00000015c0)) 05:58:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000780)='./bus\x00', 0x4c03e, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)={'b', ' *:* ', 'rw\x00'}, 0x9) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x401ffc000) 05:58:33 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x4000400) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000100)={0x9}, &(0x7f0000000140), 0x0) 05:58:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') preadv(r0, &(0x7f0000000880)=[{&(0x7f0000000180)=""/58, 0x3a}], 0x1, 0x101, 0x0) 05:58:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x44, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x19}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}]}]}, 0x44}}, 0x0) 05:58:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) mount$bind(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x801412, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, 0x0) move_mount(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x130) 05:58:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="66530700ae897094e7b126b097eaa769be6d05c01bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d63c6551b0e2982f736a462ecd44157684e3dae4b5877341e0e15aa18c9228183b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed9626cdca137eb0e4a074eb04a348a6ec0100003ac4edcce4eba2da6015c9e780296d12245deacb1f630e651d2bf3bd4004c672e42292efe7072b104951d60a70381691f296d588ee40d58160fa80f4e9461303", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 05:58:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000780)='./bus\x00', 0x4c03e, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)={'b', ' *:* ', 'rw\x00'}, 0x9) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x401ffc000) 05:58:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') preadv(r0, &(0x7f0000000880)=[{&(0x7f0000000180)=""/58, 0x3a}], 0x1, 0x101, 0x0) 05:58:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080006007c05e8fe55a10a000400e558f03051950e1208000f0000000401a8000900a4000400e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef409cc54060c986893955ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bf7ece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 119.485856][ T4232] loop4: detected capacity change from 0 to 16 05:58:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x44, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x19}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}]}]}, 0x44}}, 0x0) 05:58:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="66530700ae897094e7b126b097eaa769be6d05c01bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d63c6551b0e2982f736a462ecd44157684e3dae4b5877341e0e15aa18c9228183b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed9626cdca137eb0e4a074eb04a348a6ec0100003ac4edcce4eba2da6015c9e780296d12245deacb1f630e651d2bf3bd4004c672e42292efe7072b104951d60a70381691f296d588ee40d58160fa80f4e9461303", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 05:58:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) mount$bind(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x801412, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, 0x0) move_mount(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x130) [ 119.575201][ T24] audit: type=1400 audit(1639893513.984:301): avc: denied { mount } for pid=4238 comm="syz-executor.1" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 05:58:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') preadv(r0, &(0x7f0000000880)=[{&(0x7f0000000180)=""/58, 0x3a}], 0x1, 0x101, 0x0) [ 119.634607][ T24] audit: type=1400 audit(1639893514.044:302): avc: denied { unmount } for pid=1828 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 05:58:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x44, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x19}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}]}]}, 0x44}}, 0x0) 05:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080006007c05e8fe55a10a000400e558f03051950e1208000f0000000401a8000900a4000400e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef409cc54060c986893955ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bf7ece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 05:58:34 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="66530700ae897094e7b126b097eaa769be6d05c01bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d63c6551b0e2982f736a462ecd44157684e3dae4b5877341e0e15aa18c9228183b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed9626cdca137eb0e4a074eb04a348a6ec0100003ac4edcce4eba2da6015c9e780296d12245deacb1f630e651d2bf3bd4004c672e42292efe7072b104951d60a70381691f296d588ee40d58160fa80f4e9461303", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 05:58:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000780)='./bus\x00', 0x4c03e, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)={'b', ' *:* ', 'rw\x00'}, 0x9) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x401ffc000) [ 119.687428][ T4249] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 119.715824][ T4252] loop4: detected capacity change from 0 to 16 05:58:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) mount$bind(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x801412, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, 0x0) move_mount(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x130) 05:58:34 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/cgroup.procs\x00', &(0x7f0000000040)={0x0, 0x0, 0x9}, 0x18) 05:58:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x23, 0x0, "2682c5abbc32b6a018402b25a8cf85ac4efaf2505c655277186caf8466bc2fd033ac0933498ed8892b2d9fb519df49fca7e67dee7bf6cf73b97b21db3cfa2afa01df13db04b13ef9183885476deefcbc"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) 05:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080006007c05e8fe55a10a000400e558f03051950e1208000f0000000401a8000900a4000400e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef409cc54060c986893955ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bf7ece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 05:58:34 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="66530700ae897094e7b126b097eaa769be6d05c01bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d63c6551b0e2982f736a462ecd44157684e3dae4b5877341e0e15aa18c9228183b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed9626cdca137eb0e4a074eb04a348a6ec0100003ac4edcce4eba2da6015c9e780296d12245deacb1f630e651d2bf3bd4004c672e42292efe7072b104951d60a70381691f296d588ee40d58160fa80f4e9461303", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 119.818918][ T4263] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 05:58:34 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/cgroup.procs\x00', &(0x7f0000000040)={0x0, 0x0, 0x9}, 0x18) 05:58:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x23, 0x0, "2682c5abbc32b6a018402b25a8cf85ac4efaf2505c655277186caf8466bc2fd033ac0933498ed8892b2d9fb519df49fca7e67dee7bf6cf73b97b21db3cfa2afa01df13db04b13ef9183885476deefcbc"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) 05:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080006007c05e8fe55a10a000400e558f03051950e1208000f0000000401a8000900a4000400e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef409cc54060c986893955ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bf7ece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 05:58:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000780)='./bus\x00', 0x4c03e, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)={'b', ' *:* ', 'rw\x00'}, 0x9) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x401ffc000) 05:58:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) mount$bind(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x801412, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, 0x0) move_mount(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x130) [ 119.925853][ T4272] loop4: detected capacity change from 0 to 16 [ 119.937093][ T4274] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 05:58:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() sendmmsg$unix(r0, &(0x7f0000008100)=[{{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000065c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}}], 0x1, 0x0) 05:58:34 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/cgroup.procs\x00', &(0x7f0000000040)={0x0, 0x0, 0x9}, 0x18) 05:58:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x23, 0x0, "2682c5abbc32b6a018402b25a8cf85ac4efaf2505c655277186caf8466bc2fd033ac0933498ed8892b2d9fb519df49fca7e67dee7bf6cf73b97b21db3cfa2afa01df13db04b13ef9183885476deefcbc"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) 05:58:34 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000040)) 05:58:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000005, 0x80011, r0, 0x8000000) syz_io_uring_setup(0x2d8, &(0x7f0000000100), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000180)) [ 120.074417][ T4285] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 05:58:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x20180) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 05:58:34 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x4}}}}}}, 0x0) 05:58:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x23, 0x0, "2682c5abbc32b6a018402b25a8cf85ac4efaf2505c655277186caf8466bc2fd033ac0933498ed8892b2d9fb519df49fca7e67dee7bf6cf73b97b21db3cfa2afa01df13db04b13ef9183885476deefcbc"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) [ 120.115372][ T4289] loop4: detected capacity change from 0 to 16 05:58:34 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/cgroup.procs\x00', &(0x7f0000000040)={0x0, 0x0, 0x9}, 0x18) 05:58:34 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000040)) [ 120.207462][ T24] audit: type=1400 audit(1639893514.614:303): avc: denied { ioctl } for pid=4295 comm="syz-executor.2" path="socket:[25120]" dev="sockfs" ino=25120 ioctlcmd=0x89ea scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 05:58:34 executing program 0: sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="14010000007774683000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRESHEX=0x0], 0x1cc}}, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140000000000ffffff850000000000000080000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 120.240026][ T24] audit: type=1400 audit(1639893514.654:304): avc: denied { map } for pid=4296 comm="syz-executor.0" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 120.263413][ T24] audit: type=1400 audit(1639893514.654:305): avc: denied { execute } for pid=4296 comm="syz-executor.0" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 05:58:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x20180) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 05:58:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x81000000}, {}]}]}}, &(0x7f0000000100)=""/130, 0x46, 0x82, 0x8}, 0x20) 05:58:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227c, &(0x7f0000000400)) 05:58:34 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x5b, 0x0) 05:58:34 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000040)) [ 120.433597][ T4310] loop0: detected capacity change from 0 to 264192 [ 120.494141][ T1909] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 120.499074][ T1909] loop0: p4 size 2097152 extends beyond EOD, truncated 05:58:35 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227c, &(0x7f0000000400)) 05:58:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x81000000}, {}]}]}}, &(0x7f0000000100)=""/130, 0x46, 0x82, 0x8}, 0x20) 05:58:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x5b, 0x0) 05:58:35 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000040)) [ 120.606767][ T4319] BPF:[2] INT (anon) [ 120.610800][ T4319] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 120.617587][ T4319] BPF: [ 120.620369][ T4319] BPF:Invalid btf_info kind_flag [ 120.625367][ T4319] BPF: [ 120.625367][ T4319] 05:58:35 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227c, &(0x7f0000000400)) 05:58:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x5b, 0x0) [ 120.746609][ T4327] BPF:[2] INT (anon) [ 120.750647][ T4327] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 120.757317][ T4327] BPF: [ 120.760097][ T4327] BPF:Invalid btf_info kind_flag [ 120.765020][ T4327] BPF: [ 120.765020][ T4327] [ 120.890014][ T4310] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 120.890959][ T4310] loop0: p4 size 2097152 extends beyond EOD, truncated 05:58:35 executing program 0: sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="14010000007774683000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRESHEX=0x0], 0x1cc}}, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140000000000ffffff850000000000000080000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 05:58:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x81000000}, {}]}]}}, &(0x7f0000000100)=""/130, 0x46, 0x82, 0x8}, 0x20) 05:58:35 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RFSYNC(r0, &(0x7f0000000500)={0x7}, 0x7ffff000) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 05:58:35 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227c, &(0x7f0000000400)) 05:58:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x5b, 0x0) 05:58:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x20180) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 05:58:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x20180) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 05:58:35 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_delrule={0x28, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {0xffffffffffffffff}}]}, 0x28}}, 0x0) 05:58:35 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x5c}, {0x1c}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 121.186395][ T4350] BPF:[2] INT (anon) [ 121.190487][ T4350] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 121.197155][ T4350] BPF: [ 121.199932][ T4350] BPF:Invalid btf_info kind_flag [ 121.204864][ T4350] BPF: [ 121.204864][ T4350] 05:58:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x81000000}, {}]}]}}, &(0x7f0000000100)=""/130, 0x46, 0x82, 0x8}, 0x20) 05:58:35 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 05:58:35 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_delrule={0x28, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {0xffffffffffffffff}}]}, 0x28}}, 0x0) [ 121.299360][ T4339] udevd[4339]: inotify_add_watch(7, /dev/loop0p12, 10) failed: No such file or directory [ 121.302779][ T1912] udevd[1912]: inotify_add_watch(7, /dev/loop0p18, 10) failed: No such file or directory [ 121.310128][ T1909] udevd[1909]: inotify_add_watch(7, /dev/loop0p17, 10) failed: No such file or directory [ 121.330171][ T4334] udevd[4334]: inotify_add_watch(7, /dev/loop0p7, 10) failed: No such file or directory [ 121.342254][ T2839] udevd[2839]: inotify_add_watch(7, /dev/loop0p20, 10) failed: No such file or directory [ 121.349341][ T2840] udevd[2840]: inotify_add_watch(7, /dev/loop0p21, 10) failed: No such file or directory [ 121.353452][ T4338] udevd[4338]: inotify_add_watch(7, /dev/loop0p11, 10) failed: No such file or directory [ 121.369941][ T1912] udevd[1912]: inotify_add_watch(7, /dev/loop0p22, 10) failed: No such file or directory [ 121.374810][ T4336] udevd[4336]: inotify_add_watch(7, /dev/loop0p9, 10) failed: No such file or directory [ 121.383728][ T4337] udevd[4337]: inotify_add_watch(7, /dev/loop0p10, 10) failed: No such file or directory [ 121.419029][ T4360] loop0: detected capacity change from 0 to 264192 [ 121.474466][ T1909] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 121.481107][ T4365] BPF:[2] INT (anon) [ 121.572003][ T4365] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 121.578768][ T4365] BPF: [ 121.581123][ T1909] loop0: p4 size 2097152 extends beyond EOD, truncated [ 121.581556][ T4365] BPF:Invalid btf_info kind_flag [ 121.581564][ T4365] BPF: [ 121.581564][ T4365] [ 121.738966][ T4360] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 05:58:36 executing program 0: sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="14010000007774683000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRESHEX=0x0], 0x1cc}}, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140000000000ffffff850000000000000080000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 05:58:36 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 05:58:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x5c}, {0x1c}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 05:58:36 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_delrule={0x28, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {0xffffffffffffffff}}]}, 0x28}}, 0x0) 05:58:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) 05:58:36 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 05:58:36 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_delrule={0x28, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {0xffffffffffffffff}}]}, 0x28}}, 0x0) 05:58:36 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 05:58:36 executing program 3: set_mempolicy(0x0, &(0x7f0000000040)=0x7fffffff, 0x9) 05:58:36 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 05:58:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x5c}, {0x1c}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 121.839636][ T24] audit: type=1400 audit(1639893516.244:306): avc: denied { read write } for pid=4370 comm="syz-executor.3" name="rdma_cm" dev="devtmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 05:58:36 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) [ 122.040599][ T4388] loop0: detected capacity change from 0 to 264192 [ 122.074491][ T1909] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 122.076047][ T1909] loop0: p4 size 2097152 extends beyond EOD, truncated [ 122.323293][ T4388] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 122.324253][ T4388] loop0: p4 size 2097152 extends beyond EOD, truncated 05:58:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@can_delroute={0x14c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "759b80c6661e67bf"}, 0x4}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x7a, 0x0, 0x0, 0x0, "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", 0x0, "193c9079425e50270d8c0d1a1907f90c4cb1f3ba"}}]}, 0x14c}}, 0x0) 05:58:37 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 05:58:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180), 0x8) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000080)) 05:58:37 executing program 0: sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="14010000007774683000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRESHEX=0x0], 0x1cc}}, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140000000000ffffff850000000000000080000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 05:58:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x5c}, {0x1c}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 05:58:37 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 05:58:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@can_delroute={0x14c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "759b80c6661e67bf"}, 0x4}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x7a, 0x0, 0x0, 0x0, "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", 0x0, "193c9079425e50270d8c0d1a1907f90c4cb1f3ba"}}]}, 0x14c}}, 0x0) 05:58:37 executing program 2: set_mempolicy(0x8005, &(0x7f00000000c0)=0x1763, 0x7f) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x1d, r0) 05:58:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180), 0x8) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000080)) 05:58:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004fc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) pipe2$9p(&(0x7f00000011c0)={0xffffffffffffffff}, 0x0) fstat(r3, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492846, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) 05:58:37 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000000640)={0x10}, 0x10}, {&(0x7f0000000680)={0x10, 0x3f2}, 0x10}], 0x2}, 0x0) 05:58:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180), 0x8) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000080)) 05:58:37 executing program 2: set_mempolicy(0x8005, &(0x7f00000000c0)=0x1763, 0x7f) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x1d, r0) 05:58:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@can_delroute={0x14c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "759b80c6661e67bf"}, 0x4}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x7a, 0x0, 0x0, 0x0, "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", 0x0, "193c9079425e50270d8c0d1a1907f90c4cb1f3ba"}}]}, 0x14c}}, 0x0) 05:58:37 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000000640)={0x10}, 0x10}, {&(0x7f0000000680)={0x10, 0x3f2}, 0x10}], 0x2}, 0x0) [ 122.967696][ T4410] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4410 comm=syz-executor.4 [ 123.012870][ T4412] loop0: detected capacity change from 0 to 264192 [ 123.086980][ T1909] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 123.090693][ T1909] loop0: p4 size 2097152 extends beyond EOD, truncated [ 123.259427][ T4422] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4422 comm=syz-executor.4 [ 123.424944][ T4412] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 123.425794][ T4412] loop0: p4 size 2097152 extends beyond EOD, truncated 05:58:38 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180), 0x8) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000080)) 05:58:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004fc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) pipe2$9p(&(0x7f00000011c0)={0xffffffffffffffff}, 0x0) fstat(r3, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492846, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) 05:58:38 executing program 2: set_mempolicy(0x8005, &(0x7f00000000c0)=0x1763, 0x7f) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x1d, r0) 05:58:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@can_delroute={0x14c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "759b80c6661e67bf"}, 0x4}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x7a, 0x0, 0x0, 0x0, "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", 0x0, "193c9079425e50270d8c0d1a1907f90c4cb1f3ba"}}]}, 0x14c}}, 0x0) 05:58:38 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000000640)={0x10}, 0x10}, {&(0x7f0000000680)={0x10, 0x3f2}, 0x10}], 0x2}, 0x0) 05:58:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004fc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) pipe2$9p(&(0x7f00000011c0)={0xffffffffffffffff}, 0x0) fstat(r3, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492846, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) 05:58:38 executing program 5: socketpair(0xa, 0x1, 0x106, &(0x7f0000000000)) 05:58:38 executing program 2: set_mempolicy(0x8005, &(0x7f00000000c0)=0x1763, 0x7f) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x1d, r0) 05:58:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@allocspi={0xf8, 0x22, 0x1, 0x0, 0x0, {{{@in6=@private0, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @in6=@loopback}}}, 0xf8}}, 0x0) 05:58:38 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000000640)={0x10}, 0x10}, {&(0x7f0000000680)={0x10, 0x3f2}, 0x10}], 0x2}, 0x0) [ 123.746995][ T4431] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4431 comm=syz-executor.4 05:58:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:58:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@allocspi={0xf8, 0x22, 0x1, 0x0, 0x0, {{{@in6=@private0, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @in6=@loopback}}}, 0xf8}}, 0x0) [ 123.832370][ T4437] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.3'. [ 123.841982][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 123.841993][ T24] audit: type=1400 audit(1639893518.244:309): avc: denied { nlmsg_read } for pid=4434 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 05:58:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004fc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) pipe2$9p(&(0x7f00000011c0)={0xffffffffffffffff}, 0x0) fstat(r3, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492846, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) 05:58:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x16}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 05:58:38 executing program 4: unshare(0x400) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb702, 0x0) [ 123.944302][ T4444] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4444 comm=syz-executor.4 05:58:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004fc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) pipe2$9p(&(0x7f00000011c0)={0xffffffffffffffff}, 0x0) fstat(r3, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492846, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) 05:58:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:58:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@allocspi={0xf8, 0x22, 0x1, 0x0, 0x0, {{{@in6=@private0, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @in6=@loopback}}}, 0xf8}}, 0x0) [ 124.090410][ T24] audit: type=1400 audit(1639893518.504:310): avc: denied { setopt } for pid=4449 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 124.112010][ T4455] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:38 executing program 4: unshare(0x400) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb702, 0x0) 05:58:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004fc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) pipe2$9p(&(0x7f00000011c0)={0xffffffffffffffff}, 0x0) fstat(r3, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492846, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) 05:58:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x16}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 05:58:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:58:38 executing program 4: unshare(0x400) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb702, 0x0) 05:58:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@allocspi={0xf8, 0x22, 0x1, 0x0, 0x0, {{{@in6=@private0, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @in6=@loopback}}}, 0xf8}}, 0x0) 05:58:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x16}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 05:58:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004fc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) pipe2$9p(&(0x7f00000011c0)={0xffffffffffffffff}, 0x0) fstat(r3, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492846, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) [ 124.310188][ T4469] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:58:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='fd\x00') getdents64(r1, &(0x7f0000000f80)=""/4096, 0x1000) 05:58:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x16}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 05:58:38 executing program 4: unshare(0x400) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb702, 0x0) 05:58:38 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440), 0xfffffc41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130005470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) [ 124.457685][ T4482] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.3'. 05:58:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x4, 0xff}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 05:58:39 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x2b0400, 0x0) 05:58:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='fd\x00') getdents64(r1, &(0x7f0000000f80)=""/4096, 0x1000) 05:58:39 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) [ 124.612923][ T24] audit: type=1400 audit(1639893519.014:311): avc: denied { read } for pid=4488 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 05:58:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40000000000000063114000000000008510000002000000850000000800000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 05:58:39 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440), 0xfffffc41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130005470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 05:58:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x4, 0xff}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 05:58:39 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440), 0xfffffc41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130005470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) [ 124.713388][ T4497] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 124.743092][ T4500] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 05:58:39 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) 05:58:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='fd\x00') getdents64(r1, &(0x7f0000000f80)=""/4096, 0x1000) 05:58:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40000000000000063114000000000008510000002000000850000000800000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 05:58:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x4, 0xff}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 05:58:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='fd\x00') getdents64(r1, &(0x7f0000000f80)=""/4096, 0x1000) 05:58:39 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) 05:58:39 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440), 0xfffffc41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130005470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) [ 124.930225][ T4517] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 124.960021][ T4517] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 05:58:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40000000000000063114000000000008510000002000000850000000800000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 05:58:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x4, 0xff}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) [ 125.018122][ T4520] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 125.052426][ T4522] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 05:58:39 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) 05:58:39 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440), 0xfffffc41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130005470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 05:58:39 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440), 0xfffffc41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130005470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 05:58:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40000000000000063114000000000008510000002000000850000000800000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 05:58:39 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440), 0xfffffc41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130005470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 05:58:39 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440), 0xfffffc41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130005470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) [ 125.200044][ T4536] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 05:58:39 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440), 0xfffffc41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130005470fbb65e1c3e4ffff06006000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) [ 125.249139][ T4536] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 125.336096][ T4541] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 05:58:39 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0x0, 0x1, 0x7, 0x0, 0x718, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7e49a336, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x0, 0x20, 0x6, 0x0, 0x0, 0x7e3c, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff060000000100000045000000250000001900040004", 0x25}, {&(0x7f0000000080)="89126626d6fb07e613d79d0b6d58348a37000000", 0x14}], 0x2) r3 = epoll_create(0x5) ioctl$INCFS_IOC_PERMIT_FILL(r3, 0x40046721, &(0x7f0000000180)={r1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x26540, 0x0) write$UHID_INPUT(r4, &(0x7f0000