[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.
[  122.381529][   T33] kauditd_printk_skb: 4 callbacks suppressed
[  122.381577][   T33] audit: type=1800 audit(1584209830.429:39): pid=11740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0
[  122.431832][   T33] audit: type=1800 audit(1584209830.469:40): pid=11740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [  124.351113][   T33] audit: type=1400 audit(1584209832.399:41): avc:  denied  { map } for  pid=11914 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.0.253' (ECDSA) to the list of known hosts.
2020/03/14 18:17:25 fuzzer started
[  137.199409][   T33] audit: type=1400 audit(1584209845.249:42): avc:  denied  { map } for  pid=11923 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
2020/03/14 18:17:30 dialing manager at 10.128.0.26:39629
2020/03/14 18:17:30 syscalls: 2967
2020/03/14 18:17:30 code coverage: enabled
2020/03/14 18:17:30 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled
2020/03/14 18:17:30 extra coverage: enabled
2020/03/14 18:17:30 setuid sandbox: enabled
2020/03/14 18:17:30 namespace sandbox: enabled
2020/03/14 18:17:30 Android sandbox: /sys/fs/selinux/policy does not exist
2020/03/14 18:17:30 fault injection: enabled
2020/03/14 18:17:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2020/03/14 18:17:30 net packet injection: enabled
2020/03/14 18:17:30 net device setup: enabled
2020/03/14 18:17:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2020/03/14 18:17:30 devlink PCI setup: PCI device 0000:00:10.0 is not available
[  142.632071][   T33] audit: type=1400 audit(1584209850.679:43): avc:  denied  { integrity } for  pid=11938 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1
18:19:43 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00')
sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r1, 0x1, 0x0, 0x0, {0x18}}, 0x14}}, 0x0)

[  275.254895][   T33] audit: type=1400 audit(1584209983.309:44): avc:  denied  { map } for  pid=11941 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17460 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[  275.753042][T11942] IPVS: ftp: loaded support on port[0] = 21
[  275.965980][T11942] chnl_net:caif_netlink_parms(): no params data found
[  276.117979][T11942] bridge0: port 1(bridge_slave_0) entered blocking state
[  276.125741][T11942] bridge0: port 1(bridge_slave_0) entered disabled state
[  276.135122][T11942] device bridge_slave_0 entered promiscuous mode
[  276.150238][T11942] bridge0: port 2(bridge_slave_1) entered blocking state
[  276.157818][T11942] bridge0: port 2(bridge_slave_1) entered disabled state
[  276.167192][T11942] device bridge_slave_1 entered promiscuous mode
[  276.215965][T11942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  276.233991][T11942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  276.283841][T11942] team0: Port device team_slave_0 added
[  276.298649][T11942] team0: Port device team_slave_1 added
[  276.343296][T11942] batman_adv: batadv0: Adding interface: batadv_slave_0
[  276.350358][T11942] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  276.376606][T11942] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  276.394143][T11942] batman_adv: batadv0: Adding interface: batadv_slave_1
[  276.401180][T11942] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  276.427479][T11942] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  276.639649][T11942] device hsr_slave_0 entered promiscuous mode
[  276.893742][T11942] device hsr_slave_1 entered promiscuous mode
[  277.324337][   T33] audit: type=1400 audit(1584209985.379:45): avc:  denied  { create } for  pid=11942 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  277.331389][T11942] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  277.349401][   T33] audit: type=1400 audit(1584209985.379:46): avc:  denied  { write } for  pid=11942 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  277.349498][   T33] audit: type=1400 audit(1584209985.379:47): avc:  denied  { read } for  pid=11942 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  277.482564][T11942] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  277.653822][T11942] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  277.913930][T11942] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  278.410369][T11942] 8021q: adding VLAN 0 to HW filter on device bond0
[  278.448801][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  278.458105][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  278.480807][T11942] 8021q: adding VLAN 0 to HW filter on device team0
[  278.503148][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  278.514162][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  278.523628][ T3903] bridge0: port 1(bridge_slave_0) entered blocking state
[  278.531894][ T3903] bridge0: port 1(bridge_slave_0) entered forwarding state
[  278.586566][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  278.596055][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  278.605829][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  278.615161][ T3903] bridge0: port 2(bridge_slave_1) entered blocking state
[  278.622332][ T3903] bridge0: port 2(bridge_slave_1) entered forwarding state
[  278.631366][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  278.642348][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  278.664449][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  278.674684][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  278.714427][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  278.724524][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  278.734815][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  278.745735][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  278.755273][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  278.788282][T11942] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  278.801833][T11942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  278.826147][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  278.835863][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  278.878766][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  278.889405][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  278.919659][T11942] 8021q: adding VLAN 0 to HW filter on device batadv0
[  278.998880][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  279.009207][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  279.074554][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  279.084125][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  279.110941][T11942] device veth0_vlan entered promiscuous mode
[  279.120434][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  279.129621][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  279.159580][T11942] device veth1_vlan entered promiscuous mode
[  279.175464][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  279.259328][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  279.269669][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  279.293436][T11942] device veth0_macvtap entered promiscuous mode
[  279.318461][T11942] device veth1_macvtap entered promiscuous mode
[  279.375824][T11942] batman_adv: batadv0: Interface activated: batadv_slave_0
[  279.384250][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  279.393736][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  279.402997][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  279.413437][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  279.440382][T11942] batman_adv: batadv0: Interface activated: batadv_slave_1
[  279.450969][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  279.461102][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  279.908624][   T33] audit: type=1400 audit(1584209987.939:48): avc:  denied  { associate } for  pid=11942 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
[  280.185170][   T33] audit: type=1400 audit(1584209988.229:49): avc:  denied  { open } for  pid=11967 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1
[  280.208906][   T33] audit: type=1400 audit(1584209988.239:50): avc:  denied  { kernel } for  pid=11967 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1
18:19:48 executing program 1:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

[  280.233044][   T33] audit: type=1400 audit(1584209988.239:51): avc:  denied  { confidentiality } for  pid=11967 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1
[  280.280399][T11970] tipc: All keys are flushed!
[  280.364775][T11968] tipc: All keys are flushed!
18:19:48 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffff2, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001400)=ANY=[@ANYBLOB="380000002400070500ee30cf7c00000000a2a300", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000004c7609f9a86943f42df39d15d5d8fb034edbe0b2539cf4e52a63860a4da38cea6b6940dd552405dcb09d9ab875dcfcb65029105e59c14961e69ea933222fa74cdc312c427dd691e5cc5400523c9503"], 0x38}}, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0x48, 0x28, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x0, 0xffffffff}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)

18:19:48 executing program 0:
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0)
pipe(0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100)

[  280.839176][T11975] IPVS: ftp: loaded support on port[0] = 21
18:19:49 executing program 0:
setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084)
bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c)
listen(r0, 0x3)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x210, @dev}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98)
creat(&(0x7f0000000340)='./file1/file0\x00', 0x0)
socket(0x25, 0x1, 0x0)
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000000), 0x4)

[  281.080380][T11975] chnl_net:caif_netlink_parms(): no params data found
[  281.375639][T11975] bridge0: port 1(bridge_slave_0) entered blocking state
[  281.383136][T11975] bridge0: port 1(bridge_slave_0) entered disabled state
[  281.392438][T11975] device bridge_slave_0 entered promiscuous mode
[  281.408453][T11975] bridge0: port 2(bridge_slave_1) entered blocking state
[  281.415780][T11975] bridge0: port 2(bridge_slave_1) entered disabled state
[  281.425281][T11975] device bridge_slave_1 entered promiscuous mode
[  281.477859][T11975] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  281.496822][T11975] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  281.547158][T11975] team0: Port device team_slave_0 added
[  281.562260][T11975] team0: Port device team_slave_1 added
[  281.645332][T11975] batman_adv: batadv0: Adding interface: batadv_slave_0
[  281.652537][T11975] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  281.678988][T11975] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  281.695593][    C0] hrtimer: interrupt took 62074 ns
[  281.711484][T11975] batman_adv: batadv0: Adding interface: batadv_slave_1
[  281.718659][T11975] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  281.744999][T11975] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
18:19:49 executing program 0:
setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084)
bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c)
listen(r0, 0x3)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x210, @dev}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98)
creat(&(0x7f0000000340)='./file1/file0\x00', 0x0)
socket(0x25, 0x1, 0x0)
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000000), 0x4)

[  281.851675][T11975] device hsr_slave_0 entered promiscuous mode
[  281.883971][T11975] device hsr_slave_1 entered promiscuous mode
[  281.913878][T11975] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  281.921520][T11975] Cannot create hsr debugfs directory
[  282.398714][T11975] netdevsim netdevsim1 netdevsim0: renamed from eth0
18:19:50 executing program 0:
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"})
r1 = syz_open_pts(r0, 0x0)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2)
read(r1, 0x0, 0x6c00)
dup3(r1, r0, 0x0)

[  282.447198][T11975] netdevsim netdevsim1 netdevsim1: renamed from eth1
[  282.526026][T11975] netdevsim netdevsim1 netdevsim2: renamed from eth2
[  282.578603][T11975] netdevsim netdevsim1 netdevsim3: renamed from eth3
[  282.613848][T12001] serio: Serial port pts0
18:19:50 executing program 0:
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x400)
ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040))
io_setup(0x1ff, &(0x7f00000004c0)=<r1=>0x0)
io_destroy(r1)
io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000, 0x200000}])
r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
read$usbmon(r2, 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_STATUS64(r2, 0x80605414, &(0x7f0000000100))

[  283.030357][T11975] 8021q: adding VLAN 0 to HW filter on device bond0
18:19:51 executing program 0:
r0 = socket$inet6(0xa, 0x6, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
listen(r0, 0x6)
setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1)
connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)
sendmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="fa41030000009af22b8f5e5126a889d61dfe49ff7d7561f1f8793481ed000000000000", 0x2}, {&(0x7f0000000280)="caa2d23dfd7fcbd0d5523488ebb9e2eac0f8998df5f737f8ee9efa08adcf3ba256e2abbfe70822dc4c3530e7b64a0468cc261e12979ebeb724c431a19a84abeb763b5363d5ab37d81a7b9f993076423d83f612d6bc04469f63f2c6f35725ff8e9fb0d11b590ea953e454de73564499cc9d277686b59054ff66b43da678fe983de72ca57ec4511d664077da0041360c0ffe6389c0447367bd1c82841e676190fbf1cabfa03dd0cbca6b454cf7827b657d46bb2f4ed5c0992bca5bea4993b6260bf9979f1870e9823c50"}, {&(0x7f0000000040)="993ca9006258048d432b070260"}], 0x200000cc, 0x0, 0x6}}, {{0x0, 0x0, &(0x7f00000006c0), 0x1}}], 0x2, 0x4)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
read$usbmon(r2, 0x0, 0x0)
ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000140))
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x0, 0x0, 0x0, [@dev, @dev, @empty]}, 0x38)
connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
r3 = dup2(0xffffffffffffffff, r1)
ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f00000000c0)=0x6)

[  283.072195][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  283.081198][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  283.105408][T11975] 8021q: adding VLAN 0 to HW filter on device team0
[  283.202620][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  283.213175][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  283.222398][ T3903] bridge0: port 1(bridge_slave_0) entered blocking state
[  283.229647][ T3903] bridge0: port 1(bridge_slave_0) entered forwarding state
[  283.257597][   T33] audit: type=1400 audit(1584209991.309:52): avc:  denied  { name_bind } for  pid=12012 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1
[  283.268712][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  283.281207][   T33] audit: type=1400 audit(1584209991.309:53): avc:  denied  { node_bind } for  pid=12012 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1
[  283.356994][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  283.367338][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  283.376640][ T3903] bridge0: port 2(bridge_slave_1) entered blocking state
[  283.383910][ T3903] bridge0: port 2(bridge_slave_1) entered forwarding state
[  283.393075][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  283.403993][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
18:19:51 executing program 0:
syz_emit_ethernet(0x22, &(0x7f00000000c0)={@broadcast, @random="140000009c20", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}, 0x0)
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETXW(r1, 0x5435, 0x0)
ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x0, 0x200, 0x6})
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}]}, 0x24}}, 0x0)
ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000040))
r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
read$usbmon(r3, 0x0, 0x0)
ioctl$CAPI_INSTALLED(r3, 0x80024322)
syz_emit_ethernet(0xce, &(0x7f0000000100)={@multicast, @broadcast, @val={@void, {0x8100, 0x0, 0x1, 0x2}}, {@x25={0x805, {0x1, 0x3, 0x1f, "0e98deface791f954896de8e7b6a97bfe7517c247924585af7b84220c8ab3f4b6b48d54526bdda0e4218424a4826ea0a61b0e45bbc12bf806dbadf95c903605ab0e9e14bb13f7e74159df46e3dffa1a8b3ec615e455a7843f04d8cb2fd138b8db8de560eab8eddc0154835e1c49c6569a569a0ce44539ffdde068f25d737112867434c4c62d23d52e72b57ec214520dfa1fa6012d3605dd13455cb7bdd75e9076f9074bb66a4207d393fd133a9386ffa4d58ce46bbb62a9e5a"}}}}, &(0x7f0000000000)={0x0, 0x4, [0xa4b, 0x4a, 0xf12, 0x830]})

[  283.431155][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  283.442225][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  283.458915][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  283.498024][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  283.508861][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  283.549755][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  283.559562][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  283.575192][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  283.584272][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  283.602058][T11975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  283.675479][T12017] openvswitch: netlink: Key 0 has unexpected len 4 expected 0
[  283.704445][T12018] openvswitch: netlink: Key 0 has unexpected len 4 expected 0
18:19:51 executing program 0:
syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="602b99f7022f1c5c0a040c996268b81e2a373cca474d206c1b7bc30c1500b5f2a7885233a4e6bc46a31951224756999e89fa498a585546a902504b33254477c78a6b096e10d4e66acc19773bdb084a173e6f70d9d126102d6bb92a2c00f94715cfe9c62b6d046587b15e15e233f6663f3e9c2fbcb86f0223a03af0d3d24a31bb44513db8e5bce5bd55480f6c7fb9123943a712ebcf62774e6172169034caadff68c7212ae0603b3873fbd55f9d34d378b9f97ec4ab4c10c8ccdbae733e6bbf756533bf3a503ca61ef61f4eb0e3dd2cf1d34fe92ce686d7ba8cd3b21dfc999795b507531374a5cf4a38b0351927502cbe95965298e9e6a2ef073b9c1409f4c43258d560ef1024479a76cdde46251561f51e037d8bcacf22fc"])
signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8)

[  283.719208][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  283.727235][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  283.772672][T11975] 8021q: adding VLAN 0 to HW filter on device batadv0
[  283.838090][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  283.848086][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  283.939663][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  283.950603][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  283.975248][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  283.985121][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  283.995951][T11975] device veth0_vlan entered promiscuous mode
[  284.036401][T11975] device veth1_vlan entered promiscuous mode
[  284.120633][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  284.130037][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  284.139844][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  284.149651][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  284.174695][T11975] device veth0_macvtap entered promiscuous mode
[  284.197259][T11975] device veth1_macvtap entered promiscuous mode
[  284.256440][T11975] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  284.268446][T11975] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  284.281888][T11975] batman_adv: batadv0: Interface activated: batadv_slave_0
[  284.290019][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  284.299500][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  284.309390][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  284.319196][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  284.344526][T11975] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  284.355504][T11975] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  284.368922][T11975] batman_adv: batadv0: Interface activated: batadv_slave_1
[  284.379654][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  284.389504][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
18:19:53 executing program 0:
syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"])
signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8)

[  285.566787][   T33] audit: type=1400 audit(1584209993.619:54): avc:  denied  { prog_load } for  pid=12047 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1
[  285.743429][   T33] audit: type=1400 audit(1584209993.789:55): avc:  denied  { prog_run } for  pid=12047 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1
18:19:53 executing program 1:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:19:54 executing program 0:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
r1 = socket$pppl2tp(0x18, 0x1, 0x1)
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r3, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x0, 0x0, 0x0, [@dev, @dev, @empty]}, 0x38)
connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r3, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
setsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x8)
connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e)
connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a)
ioctl$PPPIOCGL2TPSTATS(r0, 0x8004745a, 0x0)

18:19:54 executing program 0:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc)
write$P9_RREMOVE(r0, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f)
fdatasync(r0)

18:19:54 executing program 1:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:19:55 executing program 0:
r0 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
r2 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r3=>0x0}, &(0x7f0000000040)=0x8)
setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20)
setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000000)=r3, 0x4)
syz_read_part_table(0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)="0201a6ffffff0a000000ff45ac0000ffffffa600080000000000000000400000000063000000e1000000887700720030070063000fffff000000008000da55aa", 0x40, 0x1c0}])

[  287.257767][T12066]  loop0: p1 p2 p3 p4
[  287.261917][T12066] loop0: partition table partially beyond EOD, truncated
[  287.269707][T12066] loop0: p1 start 10 is beyond EOD, truncated
[  287.275947][T12066] loop0: p2 size 1073741824 extends beyond EOD, truncated
[  287.293624][T12066] loop0: p3 start 225 is beyond EOD, truncated
[  287.299983][T12066] loop0: p4 start 255 is beyond EOD, truncated
[  287.480618][T12070]  loop0: p1 p2 p3 p4
[  287.484837][T12070] loop0: partition table partially beyond EOD, truncated
[  287.492383][T12070] loop0: p1 start 10 is beyond EOD, truncated
[  287.498952][T12070] loop0: p2 size 1073741824 extends beyond EOD, truncated
[  287.544823][T12070] loop0: p3 start 225 is beyond EOD, truncated
[  287.551145][T12070] loop0: p4 start 255 is beyond EOD, truncated
18:19:55 executing program 1:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:19:55 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = socket(0x10, 0x803, 0x0)
r2 = open(&(0x7f0000000240)='./file0\x00', 0x204400, 0x190)
r3 = socket$inet6_sctp(0xa, 0x5, 0x84)
r4 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r5=>0x0}, &(0x7f0000000040)=0x8)
setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x20)
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000001c0)={r5, 0x401}, &(0x7f0000000340)=0x8)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r6 = socket(0x40000000002, 0x3, 0x2)
utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x6, 0x20})
dup2(r6, r0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
r8 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
getsockopt$inet_sctp_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x6)
sendmmsg$inet(r0, &(0x7f0000000f00)=[{{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x10, 0x0}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x18, 0x0, 0x8, {r7, @empty, @broadcast}}}], 0x18}}], 0x2, 0x0)

18:19:56 executing program 0:
r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x6, 0x48000)
ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000180))
openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0)
setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000440)={0x2e, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x3, 'sed\x00', 0x4, 0x7, 0x53}, 0x2c)
mmap(&(0x7f0000285000/0x4000)=nil, 0x4000, 0x0, 0x110, r0, 0x778f8000)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x440180, 0x0)
r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
read$usbmon(r2, 0x0, 0x0)
ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="bd0000008000000020000000607abe5fc11683d5aa53638cc3d1a2ec3b0d6577cb7e2d365482aff3e0a7316759a4755c78329e2db9386a607c7f8a9e5d749ee9844f3cdc1e19e4ea62cf8bcebac79d99045aa5e0abbb12914c704f4248954fc6ca8f02dbff138b7546dfaff129705e3efef20c15ca911be7f32894648bff377046acb0590632435572aba92f4300db3adf1ab515cb8cc6f6a7c49a6e3421de1069ce3af2de97ca05c1c7097f5d49ca6ac33996d927368a7a333ff45d964f363010991f838f76ac6b46"])
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000340), &(0x7f0000000380)=0xe)
getpeername$l2tp(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10)
r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
read$usbmon(r4, 0x0, 0x0)
r5 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x67, 0x2a3900)
ioctl$BLKROTATIONAL(r5, 0x127e, &(0x7f00000003c0))
ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x5, 0x2, 0x8, 0x5, 'syz0\x00', 0x3})
openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0)

18:19:56 executing program 1:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:19:56 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x2, 0x1, 0x0, 0x4}, {0x20, 0x3, 0x9, 0x8}, {0x887, 0x1f, 0x0, 0x4}, {0x4, 0xff, 0x3, 0xffffffff}, {0xffff, 0x1, 0x62, 0x40}]})
sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="2800000007000300070000002e2f06006c65302e2f66696c653000006e25191b93701eaf27101fc54ac29182f81797f9664c0d53"], 0x28}, 0x1, 0x0, 0x0, 0x44050}, 0x80)
r0 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x9)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000150600000fff52004506000002ffffffd50600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffed1}, 0x48)

18:19:57 executing program 0:
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x141a40, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, r4, 0x42b}, 0x40}}, 0x0)
sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x800, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x401}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20040041}, 0x404c800)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04e2ff1b008111e00f80ecdb4cb9f207c804a011000000880412fb0a0002000a11da1b40d805000373d20083b8", 0x2e}], 0x85, 0x0, 0x0, 0x5865}, 0x0)

18:19:57 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
r1 = open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80)
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0)
sendfile(r1, r2, 0x0, 0x4000000000010046)

18:19:57 executing program 1:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:19:57 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
r1 = open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80)
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0)
sendfile(r1, r2, 0x0, 0x4000000000010046)

18:19:57 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
r1 = open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80)
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0)
sendfile(r1, r2, 0x0, 0x4000000000010046)

18:19:58 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
r1 = open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80)
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0)
sendfile(r1, r2, 0x0, 0x4000000000010046)

18:19:58 executing program 1:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:19:58 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80)
openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0)

18:19:58 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80)

18:19:58 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:19:58 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:19:59 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:19:59 executing program 1:
bpf$PROG_LOAD(0x5, 0x0, 0x0)

18:19:59 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:19:59 executing program 1:
bpf$PROG_LOAD(0x5, 0x0, 0x0)

18:19:59 executing program 2:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:19:59 executing program 1:
bpf$PROG_LOAD(0x5, 0x0, 0x0)

18:19:59 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:19:59 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:19:59 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:19:59 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:00 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:00 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

[  292.203663][T12161] IPVS: ftp: loaded support on port[0] = 21
18:20:00 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:00 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:00 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  292.622737][T12161] chnl_net:caif_netlink_parms(): no params data found
18:20:00 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  292.859634][T12161] bridge0: port 1(bridge_slave_0) entered blocking state
[  292.867026][T12161] bridge0: port 1(bridge_slave_0) entered disabled state
[  292.876795][T12161] device bridge_slave_0 entered promiscuous mode
[  292.909647][T12161] bridge0: port 2(bridge_slave_1) entered blocking state
[  292.917051][T12161] bridge0: port 2(bridge_slave_1) entered disabled state
[  292.927389][T12161] device bridge_slave_1 entered promiscuous mode
[  293.005238][T12161] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  293.044354][T12161] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  293.153975][T12161] team0: Port device team_slave_0 added
[  293.168965][T12161] team0: Port device team_slave_1 added
[  293.213439][T12161] batman_adv: batadv0: Adding interface: batadv_slave_0
[  293.220506][T12161] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  293.246625][T12161] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  293.267825][T12161] batman_adv: batadv0: Adding interface: batadv_slave_1
[  293.274955][T12161] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  293.301114][T12161] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  293.410129][T12161] device hsr_slave_0 entered promiscuous mode
[  293.454821][T12161] device hsr_slave_1 entered promiscuous mode
[  293.523012][T12161] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  293.530659][T12161] Cannot create hsr debugfs directory
[  293.816418][T12161] netdevsim netdevsim2 netdevsim0: renamed from eth0
[  293.942521][T12161] netdevsim netdevsim2 netdevsim1: renamed from eth1
[  294.043078][T12161] netdevsim netdevsim2 netdevsim2: renamed from eth2
[  294.095467][T12161] netdevsim netdevsim2 netdevsim3: renamed from eth3
[  294.533829][T12161] 8021q: adding VLAN 0 to HW filter on device bond0
[  294.578540][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  294.587611][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  294.612363][T12161] 8021q: adding VLAN 0 to HW filter on device team0
[  294.641330][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  294.651318][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  294.661651][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  294.668921][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  294.742502][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  294.752254][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  294.762073][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  294.771309][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[  294.778561][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[  294.787636][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  294.798522][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  294.817335][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  294.827998][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  294.840649][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  294.864675][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  294.875225][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  294.903873][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  294.913925][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  294.948738][T12161] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  294.961924][T12161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  294.974380][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  294.984427][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  295.060089][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  295.067871][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  295.108362][T12161] 8021q: adding VLAN 0 to HW filter on device batadv0
[  295.180221][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  295.191234][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  295.256762][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  295.266399][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  295.290805][T12161] device veth0_vlan entered promiscuous mode
[  295.300295][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  295.310375][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  295.351826][T12161] device veth1_vlan entered promiscuous mode
[  295.436013][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  295.445432][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  295.454662][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  295.464347][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  295.490022][T12161] device veth0_macvtap entered promiscuous mode
[  295.513985][T12161] device veth1_macvtap entered promiscuous mode
[  295.577504][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  295.588933][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  295.599013][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  295.609558][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  295.623395][T12161] batman_adv: batadv0: Interface activated: batadv_slave_0
[  295.632998][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  295.642256][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  295.651587][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  295.661459][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  295.686982][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  295.699084][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  295.709127][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  295.719676][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  295.733516][T12161] batman_adv: batadv0: Interface activated: batadv_slave_1
[  295.746832][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  295.757179][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
18:20:04 executing program 2:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:04 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:04 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:04 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:05 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:05 executing program 2:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:05 executing program 0:
connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040))

18:20:05 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:05 executing program 0:
connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040))

18:20:06 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:06 executing program 2:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:06 executing program 0:
connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040))

18:20:06 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:06 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:06 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:06 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:07 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:07 executing program 2:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:07 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:07 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:07 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:07 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:07 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:08 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:08 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:08 executing program 2:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:08 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:08 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:08 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:08 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:08 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:09 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:09 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:09 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:09 executing program 2:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:09 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:09 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040))

18:20:09 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:09 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:10 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:10 executing program 3:
openat$vhci(0xffffffffffffff9c, 0x0, 0x22000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:10 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:10 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)

18:20:10 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:10 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040))

18:20:10 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)

18:20:10 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:11 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)

18:20:11 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:11 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

[  303.285748][T12356] IPVS: ftp: loaded support on port[0] = 21
18:20:11 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:11 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

[  303.811563][T12356] chnl_net:caif_netlink_parms(): no params data found
[  304.035798][T12356] bridge0: port 1(bridge_slave_0) entered blocking state
[  304.043209][T12356] bridge0: port 1(bridge_slave_0) entered disabled state
[  304.052555][T12356] device bridge_slave_0 entered promiscuous mode
[  304.071214][T12356] bridge0: port 2(bridge_slave_1) entered blocking state
[  304.079124][T12356] bridge0: port 2(bridge_slave_1) entered disabled state
[  304.088876][T12356] device bridge_slave_1 entered promiscuous mode
[  304.150147][T12356] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  304.171638][T12356] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  304.228108][T12356] team0: Port device team_slave_0 added
[  304.245373][T12356] team0: Port device team_slave_1 added
[  304.287329][T12356] batman_adv: batadv0: Adding interface: batadv_slave_0
[  304.294808][T12356] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  304.320875][T12356] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  304.370005][T12356] batman_adv: batadv0: Adding interface: batadv_slave_1
[  304.377218][T12356] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  304.403484][T12356] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  304.500265][T12356] device hsr_slave_0 entered promiscuous mode
[  304.577244][T12356] device hsr_slave_1 entered promiscuous mode
[  304.683064][T12356] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  304.690688][T12356] Cannot create hsr debugfs directory
[  304.977514][T12356] netdevsim netdevsim3 netdevsim0: renamed from eth0
[  305.025767][T12356] netdevsim netdevsim3 netdevsim1: renamed from eth1
[  305.096608][T12356] netdevsim netdevsim3 netdevsim2: renamed from eth2
[  305.185810][T12356] netdevsim netdevsim3 netdevsim3: renamed from eth3
[  305.601234][T12356] 8021q: adding VLAN 0 to HW filter on device bond0
[  305.651051][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  305.660111][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  305.687313][T12356] 8021q: adding VLAN 0 to HW filter on device team0
[  305.722622][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  305.733023][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  305.742266][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  305.749543][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  305.763823][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  305.783122][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  305.792712][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  305.802318][ T3903] bridge0: port 2(bridge_slave_1) entered blocking state
[  305.809581][ T3903] bridge0: port 2(bridge_slave_1) entered forwarding state
[  305.855801][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  305.867017][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  305.903748][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  305.914236][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  305.924579][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  305.935227][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  305.981182][T12356] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  305.991849][T12356] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  306.007131][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  306.017058][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  306.027086][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  306.037215][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  306.046702][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  306.097150][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  306.115952][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  306.124710][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  306.165427][T12356] 8021q: adding VLAN 0 to HW filter on device batadv0
[  306.240732][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  306.250872][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  306.321314][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  306.330985][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  306.357986][T12356] device veth0_vlan entered promiscuous mode
[  306.368017][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  306.377221][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  306.416690][T12356] device veth1_vlan entered promiscuous mode
[  306.503709][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  306.513173][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  306.522489][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  306.532436][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  306.561179][T12356] device veth0_macvtap entered promiscuous mode
[  306.591225][T12356] device veth1_macvtap entered promiscuous mode
[  306.648350][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  306.659673][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  306.669742][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  306.680262][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  306.690205][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  306.700789][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  306.714928][T12356] batman_adv: batadv0: Interface activated: batadv_slave_0
[  306.727033][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  306.737016][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  306.746289][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  306.756222][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  306.780953][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  306.791772][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  306.803554][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  306.814133][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  306.824079][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  306.834595][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  306.848453][T12356] batman_adv: batadv0: Interface activated: batadv_slave_1
[  306.856559][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  306.866507][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
18:20:16 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:16 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040))

18:20:16 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)

18:20:16 executing program 3:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x121440, 0x0)
r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
read$usbmon(r1, 0x0, 0x0)
r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001580)='/dev/uinput\x00', 0x802, 0x0)
pidfd_getfd(r1, r2, 0x0)
r3 = gettid()
tkill(r3, 0x16)
clone3(&(0x7f0000000480)={0x8949000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)=<r4=>0x0, {0x32}, &(0x7f0000000280)=""/133, 0x85, &(0x7f0000000340)=""/207, &(0x7f0000000440)=[r3, 0xffffffffffffffff], 0x2}, 0x50)
prctl$PR_SET_PTRACER(0x59616d61, r4)
bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10)
mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='xfs\x00', 0x8003, 0x0)

18:20:16 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:16 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:16 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:16 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:17 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:17 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:17 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0)

18:20:17 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:17 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:17 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:17 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:19 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:19 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:19 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0)

18:20:19 executing program 4:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10082, 0x0)
ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xe)
ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000040)={0x3, 0x0, 0x4, {0x8, 0x3f, 0x4, 0x3}})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xe4)
bind$xdp(r0, &(0x7f0000000480)={0x2c, 0x8, r1, 0x28, r0}, 0x10)
connect$rxrpc(r0, &(0x7f00000004c0)=@in4={0x21, 0xfffb, 0x2, 0x10, {0x2, 0x4e21, @rand_addr=0x4}}, 0x24)
ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0185647, &(0x7f0000000540)={0x990000, 0xd5f, 0xcbc40000, <r2=>0xffffffffffffffff, 0x0, &(0x7f0000000500)={0x9a090b, 0x10000, [], @ptr=0x80000001}})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000780)=0xe4)
getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x14)
sendmsg$NL80211_CMD_NEW_MPATH(r2, &(0x7f0000000900)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x78, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r1}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xd5, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x78}}, 0xc0)
ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000940)={0x7d36e58d, "31407292b416d55ecee121d59be2178d6a3ea817ffd1fcfafcb554ffbdd73ec1", 0x2})
r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
getsockopt$sock_int(r5, 0x1, 0x20, &(0x7f0000000980), &(0x7f00000009c0)=0x4)
setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000a00)={0xc3b, {{0x2, 0x4e21, @multicast2}}, 0x1, 0x4, [{{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e24, @empty}}]}, 0x28c)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, &(0x7f0000000cc0))
r6 = dup3(r5, 0xffffffffffffffff, 0x80000)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r6, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x50, 0x2, 0x7, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x100}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x5}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xf7}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4048055}, 0x0)
ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0185648, &(0x7f0000000ec0)={0x9f0000, 0x4, 0x5, <r7=>0xffffffffffffffff, 0x0, &(0x7f0000000e80)={0x9c0908, 0x4, [], @p_u32=&(0x7f0000000e40)=0x380000}})
sendmsg$AUDIT_GET_FEATURE(r7, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x10, 0x3fb, 0x300, 0x70bd2d, 0x25dfdbfd, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000001000)=@gcm_128={{0x303}, "67b2183da3bbed25", "0491513e61034e0effbab1ee0cc75bc2", "6be277e6", "0aeaf85237e28791"}, 0x28)

18:20:19 executing program 3:
r0 = socket$inet6(0xa, 0x40000080806, 0x0)
openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80040, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x0, 0x0, 0x0, [@dev, @dev, @empty]}, 0x38)
sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
r2 = socket$inet6_udplite(0xa, 0x2, 0x88)
bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20, 0x8, @empty, 0x4}, 0x1c)
listen(r0, 0x4)
r3 = socket$inet6(0xa, 0x6, 0x0)
connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r4 = accept4(r0, 0x0, 0x0, 0x0)
setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000cf6e7a049700c3567ddfa02e0697a4d7b413fcb7b2999ce2d3317923aa3013eb16f6c08661592c9f60b2b9a5cbccdb0e252d7abf2f7bc9667501060f34f844ac3154f9fd5749c81c"], 0x8)
connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
bind$llc(r5, &(0x7f0000000000)={0x1a, 0x320, 0x6, 0x82, 0x1f, 0x7f, @remote}, 0x10)

18:20:19 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:20 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  312.017514][   T33] audit: type=1400 audit(1584210020.069:56): avc:  denied  { name_connect } for  pid=12453 comm="syz-executor.3" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1
18:20:20 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:20 executing program 3:
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
recvmsg(r1, &(0x7f00000002c0)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/179, 0xb3}], 0x1, &(0x7f0000000300)=""/56, 0x38}, 0x10063)
r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0)
r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
read$usbmon(r3, 0x0, 0x0)
ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000280)={0x2, r3})
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c)
r5 = socket$kcm(0x10, 0x2, 0x10)
syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000022000535d25a80648c63940d0124fc60100002400a000000053582c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

18:20:20 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:20 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:20 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0)

[  312.719412][T12470] netlink: 'syz-executor.3': attribute type 1 has an invalid length.
18:20:20 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:21 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  312.991293][T12470] netlink: 'syz-executor.3': attribute type 1 has an invalid length.
[  313.033898][T12480] IPVS: ftp: loaded support on port[0] = 21
18:20:21 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  313.539987][T12480] chnl_net:caif_netlink_parms(): no params data found
[  313.750468][T12480] bridge0: port 1(bridge_slave_0) entered blocking state
[  313.757774][T12480] bridge0: port 1(bridge_slave_0) entered disabled state
[  313.767274][T12480] device bridge_slave_0 entered promiscuous mode
[  313.803695][T12480] bridge0: port 2(bridge_slave_1) entered blocking state
[  313.810911][T12480] bridge0: port 2(bridge_slave_1) entered disabled state
[  313.820729][T12480] device bridge_slave_1 entered promiscuous mode
[  313.909885][T12480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  313.936715][T12480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  313.985481][T12480] team0: Port device team_slave_0 added
[  314.001065][T12480] team0: Port device team_slave_1 added
[  314.051140][T12480] batman_adv: batadv0: Adding interface: batadv_slave_0
[  314.058923][T12480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  314.085026][T12480] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  314.103637][T12480] batman_adv: batadv0: Adding interface: batadv_slave_1
[  314.110794][T12480] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  314.137023][T12480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  314.300063][T12480] device hsr_slave_0 entered promiscuous mode
[  314.373899][T12480] device hsr_slave_1 entered promiscuous mode
[  314.433016][T12480] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  314.440645][T12480] Cannot create hsr debugfs directory
[  314.753788][T12480] netdevsim netdevsim4 netdevsim0: renamed from eth0
[  314.861647][T12480] netdevsim netdevsim4 netdevsim1: renamed from eth1
[  314.906062][T12480] netdevsim netdevsim4 netdevsim2: renamed from eth2
[  315.002072][T12480] netdevsim netdevsim4 netdevsim3: renamed from eth3
[  315.368123][T12480] 8021q: adding VLAN 0 to HW filter on device bond0
[  315.415581][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  315.424546][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  315.442727][T12480] 8021q: adding VLAN 0 to HW filter on device team0
[  315.469685][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  315.479957][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  315.489243][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  315.496490][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  315.553380][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  315.562612][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  315.572639][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  315.581856][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[  315.589100][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[  315.599663][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  315.619868][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  315.654305][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  315.664491][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  315.694850][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  315.704650][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  315.715155][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  315.734768][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  315.744292][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  315.777371][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  315.786377][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  315.807077][T12480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  315.879856][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  315.888070][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  315.931952][T12480] 8021q: adding VLAN 0 to HW filter on device batadv0
[  316.143882][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  316.154070][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  316.241051][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  316.251051][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  316.280903][T12480] device veth0_vlan entered promiscuous mode
[  316.294901][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  316.304043][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  316.347750][T12480] device veth1_vlan entered promiscuous mode
[  316.431931][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  316.441427][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  316.450638][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  316.459957][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  316.483996][T12480] device veth0_macvtap entered promiscuous mode
[  316.506359][T12480] device veth1_macvtap entered promiscuous mode
[  316.563902][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  316.575005][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  316.588814][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  316.600844][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  316.610853][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  316.621374][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  316.631324][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  316.641850][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  316.651869][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  316.662379][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  316.676467][T12480] batman_adv: batadv0: Interface activated: batadv_slave_0
[  316.686947][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  316.697130][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  316.778035][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  316.789120][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  316.799319][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  316.809863][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  316.820623][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  316.831338][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  316.841299][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  316.851884][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  316.865908][T12480] batman_adv: batadv0: Interface activated: batadv_slave_1
[  316.876975][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  316.887034][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
18:20:25 executing program 4:
ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000040))
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x41187, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff)
openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x200241, 0x0)
ioctl$DRM_IOCTL_GET_STATS(r0, 0x807c6406, &(0x7f0000000180)=""/147)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
set_mempolicy(0x4000, &(0x7f0000000140)=0x7ffe, 0x2)
r1 = socket$rxrpc(0x21, 0x2, 0x2)
ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000080)={0x8, 'veth1_vlan\x00', {'bond0\x00'}})
clone(0x4412c500, 0x0, 0x0, 0x0, 0x0)

18:20:25 executing program 0 (fault-call:2 fault-nth:0):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:25 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:25 executing program 3:
socket$bt_rfcomm(0x1f, 0x1, 0x3)
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x2a4, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000004200fd03eff904f8ffffffffffffff0000000000"], 0x14}}, 0x0)
r0 = socket(0x10, 0x800000000080003, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x200000000000007}, 0x10)
sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000380)=[@op, @op]}], 0x4924aa4, 0x0)
socket$l2tp(0x2, 0x2, 0x73)

18:20:25 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:26 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:26 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
r1 = socket(0x10, 0x803, 0x0)
syz_open_dev$tty20(0xc, 0x4, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85)
sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x2d3, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000000400000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000005700000004000000040004800900020073797a30000000000900010073797a340000000008000340000000000900020073798530000000000400048004000480080103400000000a140004800900030000f8ffffffffff130000001100000000000000000000000000000a6d69c59862908a"], 0xb8}}, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000014007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xfff0}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r3, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x1, 0x0, 0x0, [@dev, @dev={0xfe, 0x80, [], 0xa}, @empty]}, 0x38)
connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r3, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="0c0100002800000425bd7000fddbdf2500000000", @ANYRES32=r2, @ANYBLOB="f1ff07000e000a00e0ff0500060005001f40000006000500cdc20000060005002000000006000500037f0000080001007265640008000100736662000900010068667363000000002400020010000200000000000800000080000000100001000500000001000100000000800800010061746d0080000200210003002a8baa6d293ec1f25e37c0cba2a00f5ad0ef8036cfd4e003f8f9f6f0af00000008000100", @ANYRES32=r3, @ANYBLOB="080004000e000a00080004000f00f1ff08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="1e0104980a2f589df8b6bf437f5a1ab41d7f44df258ff6d173e5bece73ab000008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4040}, 0x4040000)

18:20:26 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  318.035972][T12539] IPVS: ftp: loaded support on port[0] = 21
[  318.337515][   T33] audit: type=1400 audit(1584210026.389:57): avc:  denied  { create } for  pid=12544 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[  318.355218][T12549] IPVS: ftp: loaded support on port[0] = 21
[  318.456456][T12547] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'.
[  318.488941][   T33] audit: type=1400 audit(1584210026.509:58): avc:  denied  { write } for  pid=12544 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
18:20:26 executing program 5:
ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0185649, &(0x7f0000000080)={0x980000, 0x9840, 0x2, <r0=>0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9b0950, 0x6, [], @p_u16=&(0x7f0000000000)=0x9}})
r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00')
sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, r1, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @broadcast}}, @NLBL_UNLABEL_A_SECCTX={0x21, 0x7, 'system_u:object_r:ld_so_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'gre0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x80}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0x20000004)
ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000280)={0x0, @bt={0x1c800000, 0x3, 0x0, 0x2, 0x8, 0x200, 0x1, 0x2, 0x1000, 0x6, 0x8001, 0x3, 0x7, 0x8001, 0x8, 0x11, {0x0, 0x7}, 0x6, 0x89}})
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)={0x2, [0x0, 0x0]}, &(0x7f0000000380)=0xc)
ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f00000003c0)=0x1000)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0)
bind$rose(r2, &(0x7f0000000440)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @null}, 0x1c)
ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000480)={0x1})
ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000004c0)={0xff, 0xff})
r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/mls\x00', 0x0, 0x0)
write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000006c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10)
openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000700)='/dev/video36\x00', 0x2, 0x0)
r4 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0)
epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r4)
ustat(0x4c, &(0x7f0000000740))
r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000780)='/proc/capi/capi20\x00', 0x400, 0x0)
r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000800)='NLBL_CALIPSO\x00')
sendmsg$NLBL_CALIPSO_C_LIST(r5, &(0x7f0000000900)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x54, r6, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000805}, 0x1)
write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000980)={0x7, 0x7f, 0x2}, 0x7)

18:20:26 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:26 executing program 4:
r0 = syz_open_dev$ttys(0xc, 0x2, 0x1)
ioctl$TIOCGPKT(r0, 0x80045430, 0x0)

[  318.618906][T12551] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'.
18:20:26 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:26 executing program 0:
syz_genetlink_get_family_id$smc(&(0x7f0000000140)='SMC_PNETID\x00')
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
r1 = syz_open_pts(0xffffffffffffffff, 0x10000)
ioctl$TCSETX(r1, 0x5433, &(0x7f0000000100)={0x2, 0x3f, [0xffff, 0x3ff, 0xfeff, 0xffff, 0x7], 0x80})
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2180, 0x0)
ioctl$VIDIOC_G_EDID(r2, 0xc0245628, &(0x7f00000000c0)={0x0, 0x0, 0xff, [], &(0x7f0000000080)})

[  318.843397][    T7] tipc: TX() has been purged, node left!
18:20:27 executing program 3:
syz_mount_image$reiserfs(&(0x7f00000002c0)='reiserfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)={[{@resize={'resize'}, 0x22}]})

18:20:27 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:27 executing program 4:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3)
listen(r0, 0x0)
close(r0)

18:20:27 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74)

[  319.387427][T12578] REISERFS warning (device loop3): super-6507 reiserfs_parse_options: bad value 0x0000000000000000" for -oresize
[  319.387427][T12578] 
[  319.479054][T12578] REISERFS warning (device loop3): super-6507 reiserfs_parse_options: bad value 0x0000000000000000" for -oresize
[  319.479054][T12578] 
18:20:27 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:27 executing program 4:
r0 = fsopen(&(0x7f0000000100)='btrfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0)

18:20:27 executing program 3:
init_module(&(0x7f0000000340)='\x00\x00:\x04\x00\xaaU\x1b~\x0f\xd2\x00\x1c\xe7\xc7=\xc4\x95_!\xf2\xac\xda\xf0\x11\xe0I\x8b\nT\xf8\xdd\xff\xca\xf4\xde\xcc\xea\xfa|\xe1!\x83\xcb5\xf2\x14z\t\xea\xa7\x83\'\xa66\xf7\x8f\xa7X\xb3U{\xc4\xe3\xe4q\x9d\x19m\x9aS0\xa0\xaf\xa6hj\xf7T\xe2\xef\x83@c\xf8\xa4\x03\xb9\xbb \xb0e\x94\x8f\x1c\xfa\xce\x82\xfd\x8b\x14\xfd*cb\x17>\xdb\x19#\xae\xc7\x19\xb2vd\xe3\xdfK\xc4\xa4\xfeB\xe6\xd2\x8cI\xa8\xb2$\x83\xceah\xbfI-{\x15\xdesMr\xc5\xeb\xbd\xbb\xf67\xe4W^\vm\xfd\x82\"\x8a\x92\x1d\x0e\xc32\x0eW\xb0Y \x90\xef\x9d\xda\xe5:\xc9\xe7s\x97\xb1\xfc\xed\x97\x124\x12\\-\xc12\x1f\xf9PCp\xd9\t\x00\x00\x00\x00\x00\x00\x00\x17nf\n\xdb\xc2\x83\x7f\x89\xaa\f+6+\xf6\xd9:o\xc3\x02\x04.O\xd5T\xa36\n\xaf\xd48\xda\xf4\xb5\x85\xe6v_\x11r\x1aC\xa6_Y\xaf\x17\xae\xe0\xc5\xec\x00ODXD\x95H\xa1u\xb8O\xd76\xf0\x16\xb4\xa0\xee\x12\x8a\x99%\x1b\xc9+\x9c\xe6\'\xa2\xb8\x90\xfcI\xb3\xc4\xf6l2\xaak3\xdd3t\x0e\xf0@\xc7\xf6=U\x14*y,\x13\xdf\xe6\x13\xf2ar\x18\xb6\xb6\x1f\x8fK\xf8F\xc6\xa1\xaa\x9b\xdd\xbe#\x03_\xd4\xbe\xc5\x02\x82\x94\xc3Y\xca\x06nSd\xdeQ\xe6\\\xbb\xd7Lu1\xd3K\xdd,\x0f\x8a\xf8s\x97w\x93\"\x94\x96b,M\x99\xbd\xe3\xcd,$B8\xaf+!\x7f\xe3bPe\xc8k?[\x1c\x04\x887(4\xd2\xc0\x1fV\xf2\xe0\x86\xd2\t\nl\xbbe{\\\xa4\f\x15\x95\xe7M\xd0n\x91Y\x8bu\xfa\xcey,%\xe9\r \x02\x85\xb3\xc5\x86M5JX\x89:\xdd/\x13\x10zG\xad\xf3\xfaGf:>n\xc4,.\xa0\xb7\x8d\xdc8\x8e\x9d\x84W\xab\x86\x1e\xa9\xc2\xb4\n\x90_/3\xfe\x0f\xf7\xd9k\xa1\xa3\x02%u\xaf\xbf@\xe7\xae\xb8\xba\x1c\xa2\xc7RNk15E8\xf8\xf3\xa5@\x1a\x19\xc9\x90\b\xe4\x96\xe9\xb9b\xb7\"$!\a\"\xf2a\xeb\xd9\xc4\x9c\x83P,\xf7A\x19\xf7\xd5\xef~\xfa\xcf\x17\xdd,\x12\nG\"\x15s\xa9\xb8)\"\xf5\x13\xe5>N\xa8\xca\x99e\xdd\xc2\x01\xd4', 0xffead, &(0x7f0000000580)='bdev%\x00u\xc7\x87\xc0\'\x86\xbb\xde\xe7\xe5\x15\xc7!\x84\xdd\'uxe9\xebR\xb0B\x0e$\xec\x87K\xff\x17\xc5\xd8\xcc!\xe5\xaf\x0fs\fl\"Vl\xf7BZ\xce6U\x90\x1e\xd8\x04K7_\xc5\xd7\xb3\xbb\xed\x8f5\xa5\xbe\xaa\x84\x1be`bwh\xdb\t(\xe42\xc9j\x81\xe1\x15w\x1d\t\x11=Wt\xa3D\xeb\xb5\xb0\x0f\xd8R\v2Z\x97P[T\xed\xb16\xfc\xb5f5\xb1\xb5\xa6$\xca\x18`\x10\x00\xd6XA\xc4A\x05fz9\xa8\x13\x86&\x1e\xe4\x0e\xf9\xc2\xf3\xc5\x03Q\xef\xf3N\x10\xbf\x1d\xef\x8bPJ\xf7\xfa\xa5F\xc2\x01]Wv\xc3X\xfe\x85\xa6w\xff\xd9\xe2f\x95\xf2\xaf\xf2\xa3\xa0ntO\xfb\xf9A\xc3\xb2:0*\x18\xd8\xfa\xc0\x1c\x80\x93\xdd-\x1d\xd9\x94k\x18\xef\x18\xcd\x9e\xc9\xbd\xeb\xfc\x91\xbco\xb5w=nHw\x93U\x87V\xfc:^D\xe3^dr^e\xc9H\xf0\x96m\x90\x97RK\x96\x1e\xeb=\xca,|\xa4S\x92qje\x9eg\x9dd\xb9\x92\v\x88d')

[  320.097734][   T33] audit: type=1400 audit(1584210028.149:59): avc:  denied  { module_load } for  pid=12595 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=1
[  320.349190][T12603] IPVS: ftp: loaded support on port[0] = 21
[  320.658251][T12603] chnl_net:caif_netlink_parms(): no params data found
[  320.785136][T12603] bridge0: port 1(bridge_slave_0) entered blocking state
[  320.792315][T12603] bridge0: port 1(bridge_slave_0) entered disabled state
[  320.801187][T12603] device bridge_slave_0 entered promiscuous mode
[  320.812619][T12603] bridge0: port 2(bridge_slave_1) entered blocking state
[  320.821298][T12603] bridge0: port 2(bridge_slave_1) entered disabled state
[  320.830137][T12603] device bridge_slave_1 entered promiscuous mode
[  320.884969][T12603] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  320.904737][T12603] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  320.937254][T12603] team0: Port device team_slave_0 added
[  320.948969][T12603] team0: Port device team_slave_1 added
[  320.980898][T12603] batman_adv: batadv0: Adding interface: batadv_slave_0
[  320.987929][T12603] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  321.013974][T12603] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  321.028178][T12603] batman_adv: batadv0: Adding interface: batadv_slave_1
[  321.035447][T12603] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  321.062055][T12603] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  321.138771][T12603] device hsr_slave_0 entered promiscuous mode
[  321.194179][T12603] device hsr_slave_1 entered promiscuous mode
[  321.233031][T12603] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  321.240698][T12603] Cannot create hsr debugfs directory
[  321.411160][T12603] netdevsim netdevsim5 netdevsim0: renamed from eth0
[  321.460806][T12603] netdevsim netdevsim5 netdevsim1: renamed from eth1
[  321.528238][T12603] netdevsim netdevsim5 netdevsim2: renamed from eth2
[  321.589721][T12603] netdevsim netdevsim5 netdevsim3: renamed from eth3
[  321.800368][T12603] 8021q: adding VLAN 0 to HW filter on device bond0
[  321.825995][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  321.835349][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  321.853237][T12603] 8021q: adding VLAN 0 to HW filter on device team0
[  321.871658][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  321.880911][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  321.891104][ T3903] bridge0: port 1(bridge_slave_0) entered blocking state
[  321.898336][ T3903] bridge0: port 1(bridge_slave_0) entered forwarding state
[  321.908481][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  321.922366][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  321.932247][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  321.942932][T12566] bridge0: port 2(bridge_slave_1) entered blocking state
[  321.950115][T12566] bridge0: port 2(bridge_slave_1) entered forwarding state
[  321.973173][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  321.994298][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  322.015571][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  322.026534][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  322.037228][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  322.051880][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  322.062237][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  322.085724][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  322.096040][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  322.114707][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  322.124437][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  322.140464][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  322.182085][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  322.189926][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  322.216957][T12603] 8021q: adding VLAN 0 to HW filter on device batadv0
[  322.327113][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  322.339074][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  322.380903][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  322.390502][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  322.403285][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  322.411789][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  322.425935][T12603] device veth0_vlan entered promiscuous mode
[  322.453438][T12603] device veth1_vlan entered promiscuous mode
[  322.505887][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  322.514570][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  322.523734][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  322.532923][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  322.556345][T12603] device veth0_macvtap entered promiscuous mode
[  322.576296][T12603] device veth1_macvtap entered promiscuous mode
[  322.614883][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  322.625665][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.635684][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  322.646176][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.656154][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  322.666794][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.676792][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  322.687324][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.697303][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  322.707816][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.720418][T12603] batman_adv: batadv0: Interface activated: batadv_slave_0
[  322.730074][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  322.738836][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  322.747719][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  322.757043][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  322.780102][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  322.790915][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.800910][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  322.816711][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.826705][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  322.837239][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.847194][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  322.857774][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.867793][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  322.878363][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  322.890867][T12603] batman_adv: batadv0: Interface activated: batadv_slave_1
[  322.902508][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  322.912433][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
18:20:31 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00')
sendmsg$FOU_CMD_GET(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r1, 0x305}, 0x14}}, 0x0)

18:20:31 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74)

18:20:31 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
read$usbmon(r0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a45322, &(0x7f0000000080))
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040))

18:20:31 executing program 4:
r0 = socket$inet(0x2, 0x4000000805, 0x0)
r1 = socket$inet_sctp(0x2, 0x5, 0x84)
r2 = dup3(r0, r1, 0x0)
setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @loopback}}}, 0x90)

18:20:31 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:31 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
getsockopt$inet_int(r1, 0x0, 0xb, 0x0, &(0x7f0000000100))

18:20:31 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:31 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x0)
syz_emit_ethernet(0x96, &(0x7f0000000380)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0x5}, @exp_smc, @generic={0x0, 0x9, "cbd60441fbaca2"}, @sack_perm={0x4, 0x2}, @timestamp, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0)

18:20:31 executing program 4:
timer_create(0x2, &(0x7f0000000040)={0x0, 0x20, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200))
timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000000140)={{0x77359400}, {0x0, 0x9}}, 0x0)

18:20:31 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74)

18:20:31 executing program 5:
mknod(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0)
lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000340)=@sha1={0x1, "e386e5bddd973a32868727937f1095f962c39f31"}, 0x15, 0x0)
open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)

18:20:32 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:32 executing program 3:
getpriority(0x6, 0x0)

18:20:32 executing program 4:
r0 = socket(0x11, 0x2, 0x0)
sendmmsg$nfc_llcp(r0, &(0x7f00000011c0)=[{&(0x7f0000001040)={0x27, 0x3, 0x0, 0xffffff7f, 0x0, 0x0, "c3495523fb8b72782c0836b1fea745247b708a0b9ee19e0b89aff71670af3a21c03057a2c3ea58b7356b25b6d3a24f3ed914846716c9e08a6761d52e977d9e"}, 0x60, 0x0}], 0x1, 0x0)

18:20:32 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x4)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
connect$pptp(r1, &(0x7f00000000c0)={0x18, 0x2, {0x0, @rand_addr=0x6}}, 0x1e)

18:20:32 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r3, 0x0)
listen(r3, 0x0)
syz_init_net_socket$llc(0x1a, 0x1, 0x0)

18:20:32 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4)
connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50)
sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)

18:20:32 executing program 3:
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0)
fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1})
r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fchdir(r1)
truncate(&(0x7f0000002700)='./bus\x00', 0x0)

18:20:32 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:32 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
setsockopt(r0, 0x10e, 0xb, &(0x7f0000000240)="75cc11ec", 0x4)
sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000200007041dfffd946f610500020000001f00000000000800050006000400ff7e", 0x24}], 0x1}, 0x0)

[  325.052099][T12708] llc_conn_state_process: llc_conn_service failed
[  325.057986][T12710] netlink: 'syz-executor.4': attribute type 6 has an invalid length.
18:20:33 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  325.115522][T12712] netlink: 'syz-executor.4': attribute type 6 has an invalid length.
18:20:33 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6)
sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10)
sendmmsg$inet(r0, &(0x7f0000000840)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000140)='K', 0x1}], 0x1}}], 0x1, 0x600d054)
sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000000)="8d", 0x1}], 0x1}, 0x24008040)

[  325.208783][T12701] llc_conn_state_process: llc_conn_service failed
18:20:33 executing program 4:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff})
waitid$P_PIDFD(0x3, r0, 0x0, 0x8, 0x0)

18:20:33 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r3, 0x0)
listen(r3, 0x0)
syz_init_net_socket$llc(0x1a, 0x1, 0x0)

18:20:33 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  325.628530][T12726] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
18:20:33 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=@mpls_newroute={0x24, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x8, 0x4}]}, 0x24}}, 0x0)

18:20:33 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/14, 0xe)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:34 executing program 3:
mkdir(&(0x7f0000000200)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='tracefs\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100028, &(0x7f0000000340)={[{@mode={'mode'}}]})

[  325.981800][T12737] llc_conn_state_process: llc_conn_service failed
18:20:34 executing program 1:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed860e6cb504000000cad7cb69050046b6e50e067f000000000000c1374611c0dd34c12d100ea73cc21c5ed2ac1e4640dd4d226fdc90887e50f948fcf32bab60844794d3f3477681280d8d206bfebd201986fe24352453e388796c27433690fb"], 0x10}}, 0x0)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r1, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}, 0x1, 0xfffff000}, 0x0)

18:20:34 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:34 executing program 4:
r0 = socket(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32, @ANYBLOB="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"/344], 0x170}}, 0x0)
sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0)

18:20:34 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r3, 0x0)
listen(r3, 0x0)
syz_init_net_socket$llc(0x1a, 0x1, 0x0)

18:20:34 executing program 3:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10)
ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x80)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10)
sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf92a1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)

[  326.814609][T12771] llc_conn_state_process: llc_conn_service failed
18:20:35 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:35 executing program 4:
r0 = socket$inet6(0xa, 0x802, 0x73)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c)

18:20:35 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r3, 0x0)
listen(r3, 0x0)
syz_init_net_socket$llc(0x1a, 0x1, 0x0)

18:20:35 executing program 0:
io_setup(0x7, &(0x7f0000000000)=<r0=>0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0006000000000000fe800000004000000000000000000000fe8000"/56], 0x38)
connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
read$usbmon(r2, 0x0, 0x0)
io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x800, r1, &(0x7f0000000080)="6fd05b9f3c807af56c21505afec1957f0ed9562922a95e579c5717e306655ffa750af5fbd1336bc732f1c40ff6befa0a11709b6636182439f0e8ae911696a8a081154619114653faa93de35b6d90baad694edba4e2293e1fd164c6f902ffc9dcb60021745128a236810aa4a21d2cb5a9ad60739a110608c109ad80bcb67ad116789940f057fbf6859333ac5537c951dc471bd033c1745c7e1874899eed9f5541b26860440c4b9cb7bfccbd848970d7584a91fec88683bb47649160", 0xbb, 0x46b2, 0x0, 0x3, r2}, &(0x7f0000000180))
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000040))

18:20:35 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:35 executing program 4:
bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x2, &(0x7f0000000040)=@raw=[@map_val], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)

[  327.583863][T12792] llc_conn_state_process: llc_conn_service failed
18:20:36 executing program 1:
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff)
r0 = inotify_init()
inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000800)
inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x20000000)

18:20:36 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:36 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r3, 0x0)
listen(r3, 0x0)

18:20:36 executing program 3:
r0 = socket(0x10, 0x80002, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x18, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x50}}, 0x0)

18:20:37 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000000040))

18:20:37 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}}, 0x0)

[  329.022281][   T33] audit: type=1400 audit(1584210037.069:60): avc:  denied  { watch } for  pid=12971 comm="syz-executor.1" path="/root/syzkaller-testdir180379221/syzkaller.xqB0rh/61/file0" dev="sda1" ino=16673 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
18:20:37 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="380000001000050700cc58a80100000000000000", @ANYRES32=r3, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r3, @ANYBLOB="8014d350d222f2"], 0x38}}, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x20}}, 0x0)

18:20:37 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  329.364159][T12985] llc_conn_state_process: llc_conn_service failed
18:20:37 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
r1 = fcntl$dupfd(r0, 0x0, r0)
sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)={0x2, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2}]}, 0x20}}, 0x0)

18:20:37 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)={0x2c, 0xb, 0x6, 0xa2fa8f3ae354a9cb, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x2c}}, 0x0)

[  329.557498][T12995] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=12995 comm=syz-executor.0
18:20:37 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r3, 0x0)

18:20:37 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:37 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x64}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)

18:20:38 executing program 4:
r0 = fsopen(&(0x7f0000000200)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0)
fsmount(r0, 0x0, 0x0)
fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='\x00', &(0x7f00000000c0)='\xb6\x00', 0x0)

18:20:38 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00')
writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)='y', 0x1}], 0x1)

18:20:38 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  330.122524][T13016] llc_conn_state_process: llc_conn_service failed
[  330.228764][T13023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=13023 comm=syz-executor.0
18:20:38 executing program 1:
ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x10200000, 0x0, 0x20000dd, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0})
syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0)

18:20:38 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r3, 0x0)

18:20:38 executing program 4:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0)
lseek(r0, 0x1ff, 0x0)

[  330.607160][T13034] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (8000000)
18:20:38 executing program 3:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0xfedd)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4000007, 0x1a013, r1, 0x0)
pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0)

18:20:38 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000680)={'syz_tun\x00', &(0x7f0000000580)=@ethtool_drvinfo={0x4a, "499b190fa52894aed482358bbfab286416b2ca458ec429fbbd9c707d8b8abd69", "7b9f55621402b1d29afeaa439fc1f28ea6d2898daccc348a725fabf96add4706", "02e9c2562220d9889d3fa366118e8c631bc860a1a842cc5445663f32dec4d38d", "ed8d19b95525ed766cc3ee624f7e5f0da8cdb536cb776b40216393bd47eee621", "c013a6add4073b69adee0881006d328e29732d98e7310f409036f1a7f7d9a0ef", "55ee4e5ab909000700"}})

18:20:38 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, r5, 0x42b}, 0x40}}, 0x0)
sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x800, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x10000}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40008841)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:38 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:38 executing program 1:
r0 = socket$vsock_stream(0x28, 0x1, 0x0)
connect$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10)
syz_genetlink_get_family_id$team(0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_int(r1, &(0x7f0000000140), 0xff4d)
setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8)

[  330.939705][T13038] llc_conn_state_process: llc_conn_service failed
18:20:39 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r3, 0x0)

18:20:39 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0)
write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
r2 = dup3(r1, r0, 0x0)
ioctl$sock_SIOCINQ(r2, 0x541b, 0x0)

18:20:39 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b15"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:39 executing program 3:
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r1=>0x0}, &(0x7f0000cab000)=0xc)
setuid(r1)
bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48)

18:20:39 executing program 1:
r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1b8b77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a44f0b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fde"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20)
bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x19, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x2}, 0x3c)

[  331.634884][T13075] llc_conn_state_process: llc_conn_service failed
18:20:39 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b15"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

[  331.857926][   T33] audit: type=1400 audit(1584210039.909:61): avc:  denied  { map_create } for  pid=13084 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1
18:20:40 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
signalfd(r1, &(0x7f0000000080)={[0x1, 0x9]}, 0x8)
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="0006000000000000fe800000000000000000a1460000003e00fe8000000000000000000000004ae2fdb4a2494e08000000000000000000000004000000000000"], 0x38)
connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000))
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:40 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
listen(r3, 0x0)
listen(r3, 0x0)

18:20:40 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x4c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xe6c}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x1c, 0x2, [@TCA_CGROUP_ACT={0x18, 0x1, [@m_ipt={0x14, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x4c}}, 0x0)

18:20:40 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:40 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
listen(r3, 0x0)
listen(r3, 0x0)

18:20:40 executing program 1:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8)

18:20:41 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:41 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c)
setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4)
sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x21, &(0x7f00000004c0)=[{&(0x7f0000000500), 0x4ad}], 0x1}}], 0x75d, 0x0)

18:20:41 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
listen(r3, 0x0)
listen(r3, 0x0)

18:20:41 executing program 3:
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb0dfa6905c3ca5e5, 0x0)

18:20:41 executing program 1:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8)

18:20:41 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$OSF_MSG_REMOVE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x175c, 0x1, 0x5, 0x401, 0x0, 0x0, {0x7, 0x0, 0xa}, [{{0x254, 0x1, {{0x1, 0x6}, 0x80, 0x1f, 0x1, 0xc68c, 0xb, 'syz0\x00', "19c314e052e8579b9c40e5831b9e7b85c69ba67777c092d038e870d11b0e051c", "7f49c7334dd6fba70f5b47e663c3d10e765c6b6011e064e07f601812634853bd", [{0xcb, 0x1f, {0x0, 0x4}}, {0x9, 0x1, {0x0, 0x7}}, {0x5, 0x6, {0x0, 0x800}}, {0x0, 0x6, {0x2, 0x3}}, {0x7, 0x4be, {0x0, 0x1}}, {0x5, 0xbaec, {0x2, 0x6}}, {0x101, 0xffff}, {0x0, 0x4, {0x0, 0x8001}}, {0x3, 0x6, {0x1, 0x85}}, {0x2, 0x3, {0x0, 0x8047}}, {0x7, 0xb76, {0x3, 0xfffffffe}}, {0x7, 0x1, {0x1, 0x7ff}}, {0x5909, 0x3, {0x2, 0x3}}, {0x0, 0x3f, {0x3, 0x101}}, {0x6, 0x3, {0x2, 0x8}}, {0x91a, 0x2, {0x2, 0xffff0000}}, {0x78, 0xfba4, {0x1, 0x5a3}}, {0x6, 0x9, {0x0, 0x850d}}, {0xb0d4, 0x3, {0x1, 0xfffffe01}}, {0x0, 0x9, {0x3}}, {0x2, 0x0, {0x3, 0x7ff}}, {0x7, 0x1ff, {0x0, 0x1}}, {0x7, 0x0, {0x3, 0x7ff}}, {0x0, 0x32, {0x2, 0xe6}}, {0x100, 0x3741, {0x2, 0xffffffc0}}, {0x40, 0x1f, {0x1, 0x9}}, {0x1, 0xfffd, {0x1, 0x6}}, {0x800, 0xaf, {0x3, 0x106d19d8}}, {0xbe, 0x9, {0x2, 0x29c6}}, {0x101, 0x985, {0x3}}, {0x3ff, 0x7fff, {0x0, 0x1}}, {0x1ff, 0x79, {0x1, 0xdc4}}, {0x7f, 0x1f, {0x2, 0x6}}, {0x1, 0x5, {0x0, 0xacf}}, {0xfff, 0x6, {0x0, 0x101}}, {0x3ff, 0x5, {0x0, 0x6}}, {0x8, 0x9, {0x1, 0x5}}, {0x2, 0x6, {0x3, 0x4}}, {0x0, 0x2, {0x2, 0x401}}, {0x9, 0x1, {0x1, 0x6}}]}}}, {{0x254, 0x1, {{0x2, 0x401}, 0x3, 0x7, 0x7, 0x3, 0x0, 'syz0\x00', "10cb2bb5392d1f73ee4a4615486293257174afb56e4e4ca24c303910a57fca3b", "bd8032effb374a655ebeb89b9e3d34aa797f095967b61cb594575077284f6500", [{0x20, 0x4, {0x0, 0x8}}, {0x8, 0x80, {0x3, 0x1}}, {0x6, 0x3800, {0x3, 0x3}}, {0xf19, 0x878, {0x1, 0x7fff}}, {0xc1, 0x40, {0x2, 0x9}}, {0x0, 0x4, {0x0, 0xf0}}, {0x4, 0x63d, {0x0, 0x7}}, {0xa7, 0x5, {0x0, 0xffffffff}}, {0x8001, 0x6, {0x3, 0xffffffc1}}, {0x4, 0x2, {0x3, 0xeec3}}, {0x2, 0x80, {0x0, 0x3}}, {0xa0, 0x1, {0x3, 0x1}}, {0x81, 0x546, {0x3, 0x7fff}}, {0x3, 0x3ff, {0x2, 0x5e05802b}}, {0x2206, 0x5, {0x1, 0x2}}, {0x2546, 0x7b24}, {0x6, 0x2, {0x2, 0x9}}, {0x2, 0x96, {0x1, 0x9}}, {0x4, 0xff76, {0x0, 0x49}}, {0x9c8e, 0x6, {0x3}}, {0x7, 0x8, {0x2, 0x9}}, {0x4, 0x6, {0x0, 0x7f}}, {0x434e, 0x5, {0x1}}, {0x4, 0x7, {0x0, 0x3}}, {0x1, 0x9, {0x1, 0x7fffffff}}, {0x95, 0x4, {0x0, 0xfffffff9}}, {0x3, 0x7fff, {0x3, 0x9}}, {0x3, 0x4, {0x3}}, {0x0, 0x7d, {0x2, 0x7}}, {0x401, 0x7, {0x1, 0x2}}, {0x324f, 0x6, {0x2, 0x45}}, {0x3, 0x2f, {0x3, 0x1}}, {0x1, 0x80, {0x1, 0x7}}, {0xfffd, 0x7ff, {0x2}}, {0x9, 0x81, {0x3, 0x7}}, {0x2, 0x3f, {0x2, 0x9}}, {0x8, 0x40, {0x1, 0x6}}, {0x3f, 0x101, {0x0, 0x534315e6}}, {0x50, 0x5, {0x0, 0x9}}, {0x5, 0x8, {0x0, 0x91}}]}}}, {{0x254, 0x1, {{0x0, 0x40000}, 0xe3, 0x5, 0x6, 0x7, 0x11, 'syz0\x00', "4e7b06a742b64e23fac92dce5c1a5949996fad147d02def69b57e625e5647c59", "9bc8f60d3fcf2b2a2581a14f1d4d73a4f8949f060bfe65fc3e19322469be374a", [{0x7, 0x4, {0x1, 0x9}}, {0x8000, 0x800, {0x3, 0x5}}, {0xab0, 0x7, {0x1, 0x7fffffff}}, {0x1, 0x7, {0x1, 0x400}}, {0x9, 0x9, {0x0, 0x9}}, {0x5, 0xb5, {0x3, 0x4a4}}, {0x7ff, 0x8, {0x3, 0x101}}, {0xff, 0x7fff, {0x0, 0x7}}, {0x1000, 0x8000, {0x3, 0x2}}, {0x175b, 0x2, {0x3, 0x7}}, {0x9, 0x0, {0x3, 0x1}}, {0x8, 0x1, {0x3, 0x2}}, {0x8, 0x9, {0x0, 0x5}}, {0x401, 0x6, {0x3, 0x1eefe7db}}, {0xffff, 0x4, {0x3}}, {0x7ff, 0x0, {0x3, 0x7}}, {0x1, 0x40, {0x1, 0x1}}, {0x1000, 0x73fa, {0x3, 0x7}}, {0x40, 0x0, {0x1, 0x100}}, {0xb, 0x8, {0x3, 0x1}}, {0x9, 0x8, {0x2, 0x1000}}, {0x81, 0x8, {0x3, 0x3}}, {0xffff, 0x20, {0x0, 0x2}}, {0x3ff, 0x9, {0x0, 0x6}}, {0x1, 0xdab, {0x0, 0x1947}}, {0x9, 0x7ff, {0x0, 0xff}}, {0x800, 0x40a, {0x2, 0x80000000}}, {0x1, 0x7, {0x2, 0x98}}, {0x4f80, 0x0, {0x2}}, {0x80, 0x3, {0x0, 0xfd2}}, {0x1, 0x7ff, {0x1, 0x80000001}}, {0x3f, 0x4, {0x3, 0x1d04}}, {0xff, 0x3, {0x1, 0x4}}, {0x1, 0xfffd, {0x2, 0x7}}, {0x3, 0x6, {0x183b282102b7c565, 0x7fff}}, {0x7, 0x132, {0x0, 0x4}}, {0x5, 0x81, {0x3, 0x80000000}}, {0x9, 0xfff, {0x2, 0x6}}, {0x1fa, 0x0, {0x1, 0x10001}}, {0x1000, 0x8, {0x2, 0xfffe0000}}]}}}, {{0x254, 0x1, {{0x1, 0xfffffffc}, 0xc1, 0x7, 0xfff, 0x5, 0x18, 'syz1\x00', "8de5f706c897e50568c091bfb8565c0c6ab70cb0ed45c1dff44d2e4686b898bc", "25725d19ca81e928890e859bed9b9a559383d914cf76cbbffa06730c6fd489cb", [{0x4, 0x3, {0x3, 0x7}}, {0x0, 0x5, {0x3, 0x6}}, {0x1000, 0x6, {0x0, 0x1}}, {0x565b, 0x2, {0x3, 0x1f}}, {0x2, 0x20, {0x0, 0xffff}}, {0x9, 0x5a, {0x3, 0x1fe}}, {0x8, 0x4, {0x0, 0xff}}, {0x1, 0x1000, {0x3, 0x8001}}, {0x7fff, 0x8, {0x1, 0x5}}, {0x7, 0x9, {0x1, 0x2}}, {0x0, 0x2, {0x3, 0x2}}, {0xfff, 0x2, {0x0, 0x7f}}, {0x4, 0x20, {0x1}}, {0x100, 0x0, {0x0, 0x40}}, {0x1, 0x9, {0x1, 0x19}}, {0x81, 0x6, {0x3, 0xfffffffb}}, {0x400, 0x0, {0x0, 0xe781}}, {0x1, 0xff00, {0x3, 0x5}}, {0x9, 0x400, {0x2, 0x7fff}}, {0x2, 0x979, {0x2, 0xfffffff7}}, {0x1, 0x8, {0x2, 0x1}}, {0x8000, 0xee, {0x1, 0x8}}, {0x7f, 0x40, {0x1, 0xffffffff}}, {0x3, 0x7df, {0x0, 0x1}}, {0x8011, 0x3, {0x3, 0x8}}, {0x7ff, 0x1f, {0x1, 0x2}}, {0x401, 0x5, {0x0, 0x8}}, {0xc, 0xa9, {0x0, 0x300}}, {0xffff, 0x32, {0x2, 0x1ea6b126}}, {0x8, 0x2, {0x1, 0xeb2}}, {0x2, 0x2, {0x0, 0x10001}}, {0x33bd, 0x7, {0x3, 0xffff0001}}, {0x2, 0x400, {0x2, 0x18da}}, {0x81, 0xfffd, {0x3, 0x8000}}, {0x0, 0x6, {0x1, 0x800}}, {0x72e, 0x0, {0x0, 0x6}}, {0x8, 0x81, {0x2, 0x40}}, {0x6, 0x7f, {0x1, 0x6}}, {0x549, 0x3, {0x2, 0x3}}, {0x0, 0x1, {0x2, 0x1020000}}]}}}, {{0x254, 0x1, {{0x0, 0xffffffff}, 0xfe, 0xf5, 0x1, 0x9, 0x1c, 'syz1\x00', "2c9dd21baad892336d98747f66852a1ee68f6ed328b1408c47fbaa4684408d89", "be49c8abdfdcd9971adc71941f78ddc389830e98f8bf4a725386939bb770c7e7", [{0xdb, 0x3, {0x2, 0x1f}}, {0x5, 0x400, {0x3, 0x7fffffff}}, {0x7f, 0x200, {0x2, 0xe8}}, {0x401, 0x3ff, {0x2, 0x3f}}, {0x6, 0x101, {0x0, 0x200}}, {0x8, 0x8001, {0x2, 0x400}}, {0x7, 0x3f, {0x2, 0x2d}}, {0x3, 0x8001, {0x1, 0x8}}, {0x8, 0x9, {0x3, 0x6}}, {0x4, 0x100, {0x0, 0x20}}, {0x6ba, 0x0, {0x3, 0xe92}}, {0x81, 0x2, {0x2, 0x7}}, {0x3, 0x3, {0x2, 0x40000000}}, {0x4, 0xa05}, {0x101, 0x4e, {0x3, 0x8a12}}, {0x9a, 0x5f, {0x0, 0x2}}, {0xe90, 0xa39, {0x1, 0x6}}, {0x9, 0x6, {0x1, 0x7fff}}, {0x1, 0x9, {0x1, 0x9}}, {0x4, 0x8e, {0x0, 0x2}}, {0x101, 0x2, {0x2, 0xab}}, {0x2, 0x6, {0x0, 0x400}}, {0x6, 0x40, {0x0, 0x3ff}}, {0x81, 0x20c, {0x0, 0x6}}, {0x0, 0x1, {0x1, 0xc9e5}}, {0x23, 0x400, {0x2, 0x5b0}}, {0x8fe, 0xf000, {0x2, 0x1}}, {0x3f, 0x7, {0x1, 0x1}}, {0x4, 0x6, {0x3, 0x2}}, {0x3, 0x9, {0x0, 0x6}}, {0xdf, 0x3, {0x3}}, {0x5, 0x2, {0x2, 0x1}}, {0x9, 0x200, {0x3, 0x2}}, {0x8000, 0x200, {0x2, 0x4}}, {0x61, 0x4, {0x2, 0x9}}, {0x1000, 0x8, {0x2, 0x4}}, {0x200, 0x1000, {0x0, 0x20000}}, {0x202, 0x7f, {0x0, 0x7}}, {0x6, 0xffff, {0x0, 0xb47}}, {0x4, 0xc3c, {0x3, 0x8}}]}}}, {{0x254, 0x1, {{0x0, 0x8000}, 0x6, 0x81, 0x1000, 0x2, 0x22, 'syz1\x00', "e67eb62a29888aa466556ecab8ad321ca9d138db21f92629c52d712b098e72aa", "5edce2b71dd198adb7f6f0e1a6f7d3e3013090f4d2efa84ef1be5943bad93e55", [{0x5, 0x9, {0x3, 0x4}}, {0xff, 0x5, {0x3, 0x8}}, {0x7, 0xb08b, {0x0, 0x6591a7d7}}, {0x3, 0xff, {0x1, 0xfd}}, {0xbe82, 0x401, {0x1, 0x2}}, {0x9e8e, 0x731d, {0x3, 0x32}}, {0x1000, 0x190a, {0x1}}, {0xffff, 0x0, {0x3, 0x3}}, {0x82, 0xab05, {0x3, 0x3}}, {0x24c1, 0x3, {0x3, 0x81}}, {0xff, 0x5, {0x3, 0x2}}, {0x9a, 0x9, {0x0, 0x9}}, {0x3, 0x5, {0x2}}, {0x5dac, 0x8, {0x0, 0x4}}, {0x4, 0x1, {0x3, 0x7}}, {0x36e, 0x6, {0x2, 0x9}}, {0x60b9, 0x4, {0x2, 0x200}}, {0x3ff, 0x1b9, {0x1, 0x5d5}}, {0x7f, 0x1, {0x1}}, {0x100, 0x7ff, {0x1, 0x6}}, {0x7ff6, 0xf, {0x1, 0x6}}, {0x8, 0xff7f, {0x1, 0x6}}, {0xff9a, 0x8000, {0x1, 0x80000001}}, {0xaf, 0x8d, {0x1, 0x7}}, {0x0, 0x20, {0x1, 0x6}}, {0x6, 0x3f, {0x1, 0x5}}, {0x9, 0x8000, {0x3, 0x6}}, {0x40, 0x542, {0x3, 0x414e}}, {0x8, 0x6, {0x2, 0x5}}, {0x6, 0xfff9, {0x3, 0xd936}}, {0x9, 0x401, {0x2, 0x7}}, {0xff00, 0x8001, {0x2, 0x6}}, {0x8000, 0x1, {0x1, 0x6}}, {0x8, 0x1ff, {0x1, 0x5}}, {0xf46, 0x2, {0x0, 0x9b}}, {0x8001, 0x3, {0x3, 0x8}}, {0x200, 0x3, {0x2, 0xfffffffd}}, {0x44f, 0x5, {0x1, 0x2}}, {0x4, 0x0, {0x0, 0x88}}, {0x9, 0xfffd, {0x2, 0x5}}]}}}, {{0x254, 0x1, {{0x1}, 0x7, 0x2, 0xa349, 0x0, 0xc, 'syz0\x00', "2457eb11d11e39f5e8618cbecdd64d91816308d616da46a714be2e7797e903ca", "1fe4ddf8101dab888434f2e76ee3fadaafaade32b39e778638e3ae650467f7c8", [{0x1f, 0x28, {0x3, 0x12}}, {0x1, 0x1, {0x0, 0x2}}, {0xfffd, 0xfffc, {0x0, 0x2}}, {0xff, 0x6, {0x2, 0x1}}, {0x7fff, 0x7, {0x0, 0xffffffe1}}, {0x7f, 0x1, {0x1, 0x1f}}, {0x0, 0x2, {0x2, 0xff}}, {0x400, 0x9, {0x1, 0x7}}, {0x6, 0x1f, {0x0, 0x86a3}}, {0x6, 0x68, {0x3, 0xc9}}, {0x5, 0xfff, {0x1, 0x7ff}}, {0x1ff, 0x52, {0x2, 0x3}}, {0x40, 0x9, {0x1, 0x1}}, {0x7ff, 0x4, {0x3, 0x4b6a3aa0}}, {0x5, 0x5, {0x0, 0x2695}}, {0x7f, 0x3e, {0x3}}, {0x0, 0x8, {0x3, 0x8001}}, {0xae40, 0x8000, {0x0, 0x2}}, {0x7, 0x0, {0x3, 0xba}}, {0xe9e, 0x64ae, {0x0, 0x8}}, {0xfff8, 0x37d, {0x3, 0xffffffff}}, {0x65, 0x800, {0x3, 0x40000000}}, {0x1, 0x101, {0x0, 0x5fe}}, {0x8, 0x4, {0x0, 0xff}}, {0x3, 0x101, {0x2, 0x7}}, {0x7, 0x3, {0x2, 0x2}}, {0x0, 0x81, {0x0, 0x7}}, {0x1, 0x9, {0x0, 0x5}}, {0x3, 0x4, {0x3, 0x7}}, {0xfcf4, 0x40, {0x2, 0xf201}}, {0x1, 0x81, {0x1, 0x1249}}, {0x8000, 0x5, {0x1, 0x40}}, {0x1, 0x7, {0x2, 0x9}}, {0x9, 0x81, {0x1, 0x100}}, {0xef80, 0x2, {0x3, 0x3}}, {0x2, 0x3, {0x2, 0x20}}, {0x8f, 0x9, {0x1, 0x3}}, {0x3ff, 0x2}, {0xffff, 0xfff, {0x2, 0x9}}, {0xffff, 0xffff, {0x3, 0x400}}]}}}, {{0x254, 0x1, {{0x1, 0x5f}, 0x3f, 0x6, 0x4, 0x7, 0xe, 'syz0\x00', "cb1da44adf2fb8fa8f58e1af431e88c10df4baedb1978a447145abe04b3f985d", "d7ce982b9fa1479e38acd1f32e7c4d8b74300ab1f5b5f9a6064704d426141f4a", [{0x4, 0x55, {0x0, 0xb27a}}, {0x4, 0x401, {0x1, 0x2c7}}, {0x1, 0xc56, {0x3, 0x800}}, {0x6, 0x400, {0x0, 0x80000001}}, {0xffff, 0xcd35, {0x2, 0x3f}}, {0x6, 0x4, {0x2, 0x80000001}}, {0x4, 0x1, {0x3}}, {0x1, 0xce4, {0x3, 0x5}}, {0x8, 0xdf, {0x2, 0x7}}, {0x5, 0x6, {0x3, 0x5}}, {0x6, 0x6, {0x1, 0x7}}, {0x7, 0xfffb, {0x1, 0x6}}, {0x101, 0x6, {0x3, 0x24}}, {0x1000, 0xecb0, {0x3, 0xff000000}}, {0x3, 0xff, {0x0, 0x7}}, {0x3, 0x20, {0x3, 0x4}}, {0x8000, 0x807, {0x2, 0x8001}}, {0xfe00, 0x401, {0x0, 0x1000}}, {0x35b, 0xe3, {0x1, 0x8}}, {0x200, 0x0, {0x1, 0x3}}, {0x7c4, 0x5, {0x1, 0x2}}, {0x5, 0xfeff, {0x3, 0x10001}}, {0x4, 0x22, {0x3, 0x5}}, {0x40, 0x2, {0x3, 0x7}}, {0x25e, 0x800, {0x2, 0x7ff}}, {0x1, 0x1, {0x1, 0x401}}, {0x3d21, 0x4, {0x3, 0x200}}, {0x6, 0x6, {0x1, 0x6}}, {0x3ff, 0xfff8, {0x1, 0xffffffff}}, {0x8, 0x7fff, {0x0, 0x100}}, {0x1, 0x100, {0x1, 0xff}}, {0x3, 0xf801, {0x2}}, {0x5, 0x4, {0x1}}, {0x8, 0x7ff, {0x3}}, {0x40, 0x5, {0x0, 0x7}}, {0x200, 0x3f, {0x3}}, {0x39c7, 0xf801, {0x2, 0x4}}, {0x80, 0x8000, {0x3, 0x10000}}, {0xdd, 0x93d0, {0x4, 0x4}}, {0x303, 0xfffd, {0x3, 0x6}}]}}}, {{0x254, 0x1, {{0x3, 0x8}, 0x2, 0x5, 0x6, 0x3000, 0x7, 'syz0\x00', "14f1fc8ae5360efc794fabebe4976a662f2ebaa46cd8973eeec66e2572f295db", "063d82131880cc9e78445d5f0a9ac65026050614cfb0665d0d85f055f214f42a", [{0x8, 0x5, {0x2, 0x81}}, {0x3e6, 0xff00, {0x2, 0x9}}, {0x8, 0x7, {0x3, 0x8}}, {0x3f, 0x9, {0x1, 0x2}}, {0x1000, 0x9, {0x3, 0xffffffff}}, {0x3, 0xfff9, {0x0, 0x1}}, {0x3, 0x0, {0x2, 0x1}}, {0x20, 0x0, {0x2, 0x2}}, {0x80, 0xfff, {0x0, 0x8}}, {0x8001, 0x400, {0x1, 0x7}}, {0x7fff, 0x901, {0x3, 0x4de}}, {0x3, 0x3, {0x0, 0x6}}, {0x0, 0x1, {0x1, 0x4}}, {0xff31, 0x7f, {0x1, 0x1}}, {0x3, 0x3, {0x3, 0x4}}, {0x401, 0xf33, {0x3, 0xc84}}, {0x40, 0x9, {0x3, 0x7}}, {0xb7, 0x3, {0x2, 0x8001}}, {0x8, 0x4, {0x1, 0xfffff562}}, {0x7, 0x2, {0x1, 0x2}}, {0x26c, 0x0, {0x1, 0x2}}, {0x6, 0x0, {0x0, 0x10001}}, {0x1, 0x8, {0x3, 0x9}}, {0x1, 0x7f, {0x0, 0x2}}, {0xf765, 0xd36, {0x0, 0x400}}, {0x7, 0x5, {0x0, 0x9}}, {0x2, 0xad81, {0x1, 0xfffff7f8}}, {0x101, 0x3, {0x0, 0x5}}, {0x401, 0x6, {0x1, 0x6}}, {0x6, 0x8, {0x3, 0x49}}, {0x8000, 0x6, {0x2, 0x4b}}, {0x7, 0x8000, {0x1, 0x98d}}, {0x6, 0xfb3, {0x3, 0x2}}, {0xbe2d, 0x102, {0x3, 0x3}}, {0x3, 0xff, {0x1, 0xffff}}, {0x1, 0x3, {0x1, 0x1}}, {0x36fa, 0x0, {0x2, 0x200}}, {0x400, 0x7cf, {0x2, 0x8}}, {0x8, 0x7, {0x1, 0x8}}, {0xfffc, 0x1, {0x1, 0x800}}]}}}, {{0x254, 0x1, {{0x2, 0x6}, 0xff, 0x8a, 0xabf, 0x401, 0x17, 'syz1\x00', "7b9d8f1000298adff1b5976cdedfe89bd7e8e49575823115e40d405e206f49b6", "9cb9f794f280d36db3e93dca031456b015236a3e530647225967adda1416d4e8", [{0x5, 0x0, {0x0, 0x101}}, {0x5, 0xfff, {0x3, 0x8000}}, {0x0, 0x9, {0x1, 0x62}}, {0x401, 0x6, {0x2, 0x476018d8}}, {0x6, 0xea9, {0x2, 0x8}}, {0x5, 0x400, {0x1, 0x901}}, {0x9, 0x9, {0x3, 0x3ff}}, {0x4, 0x2, {0x2, 0x800}}, {0x7ff, 0xfffc, {0x0, 0x6}}, {0x8, 0x8001, {0x0, 0x9}}, {0x1a, 0x2, {0x0, 0x3}}, {0x800, 0x2, {0x2, 0xfffffffd}}, {0xfffb, 0x8000, {0x0, 0xff}}, {0x401, 0x6, {0x2, 0x7}}, {0x8, 0x9, {0x3, 0xfffffffa}}, {0x6, 0x0, {0x1, 0x6}}, {0x5, 0xcb3b, {0x1, 0x4}}, {0xfff8, 0x401}, {0xfff7, 0x7, {0x2, 0x1}}, {0x4, 0x100, {0x1, 0x9}}, {0x5, 0x7f, {0x2}}, {0x3, 0xff80, {0x2, 0xeb9}}, {0x8, 0x7f, {0x1, 0x8}}, {0x9, 0x20, {0x1, 0x3}}, {0x6, 0x6, {0x1, 0x6}}, {0x9, 0x6, {0x0, 0x4}}, {0x4db, 0x1, {0x1, 0x200}}, {0x1, 0x400, {0x0, 0x8001}}, {0x4, 0x2, {0x1, 0x401}}, {0x1, 0xfe4b, {0x1, 0xffffffff}}, {0xffff, 0x5, {0x2}}, {0x40b5, 0x3}, {0x6, 0x0, {0x3, 0xbb83}}, {0x866, 0x3, {0x3, 0x101}}, {0x101, 0xb6b6, {0x2, 0x20}}, {0xffbe, 0x7, {0x3, 0x9}}, {0x3ff, 0x5, {0x0, 0x20}}, {0x8, 0x0, {0x3}}, {0x100, 0xfff, {0x3, 0xfffff801}}, {0x9, 0x2, {0x0, 0x5}}]}}}]}, 0x175c}, 0x1, 0x0, 0x0, 0x40000d1}, 0x0)
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:41 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:41 executing program 1:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8)

18:20:41 executing program 3:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0)
bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6)

[  333.842994][T13147] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=13147 comm=syz-executor.0
18:20:42 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(0xffffffffffffffff, 0x0)
listen(0xffffffffffffffff, 0x0)

18:20:42 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:42 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:42 executing program 3:
r0 = socket$inet6(0xa, 0x80002, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)
sendto$inet6(r0, &(0x7f00000009c0)="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", 0x48b, 0xc001, 0x0, 0x0)
sendto$inet6(r0, &(0x7f0000000280)="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", 0x122, 0x400c020, 0x0, 0x0)
setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200)=0x3, 0x4)
setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000580), 0x4)

[  334.531189][T13170] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=13170 comm=syz-executor.0
18:20:43 executing program 4:
r0 = socket$packet(0x11, 0x2, 0x300)
getsockopt$packet_buf(r0, 0x107, 0x13, 0x0, &(0x7f0000000080))

18:20:43 executing program 1:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8)

18:20:43 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(0xffffffffffffffff, 0x0)
listen(0xffffffffffffffff, 0x0)

18:20:43 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:43 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000780)={'bond_slave_1\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}})

18:20:43 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b)
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x0, 0x0, 0x0, [@dev, @dev, @empty]}, 0x38)
connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f00000000c0)='u32\x00', 0x0, 0xffffffffffffffff)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000014007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0)
sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xfff0}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00', r6})
connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))

18:20:43 executing program 1:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8)

18:20:43 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:43 executing program 4:
add_key(&(0x7f0000000240)='rxrpc\x00', 0x0, &(0x7f00000002c0)="d4", 0x1, 0xfffffffffffffffc)

18:20:43 executing program 5:
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0)
socket(0x10, 0x80002, 0x0)
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
r1 = socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}})
ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85})
connect$can_bcm(r0, 0x0, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0)
close(r0)
r2 = socket(0x10, 0x802, 0x0)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}})
socket(0x10, 0x802, 0x0)
connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(0xffffffffffffffff, 0x0)
listen(0xffffffffffffffff, 0x0)

18:20:43 executing program 3:
socket$kcm(0x11, 0x2, 0x0)
r0 = socket$kcm(0x10, 0x80000000000002, 0x4)
sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0)
recvmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0)

18:20:44 executing program 2:
openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74)

18:20:44 executing program 1:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8)

18:20:44 executing program 4:
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0)
ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})

[  336.330221][T13224] =====================================================
[  336.337206][T13224] BUG: KMSAN: kernel-infoleak in kmsan_copy_to_user+0x81/0x90
[  336.344671][T13224] CPU: 0 PID: 13224 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0
[  336.353335][T13224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  336.363390][T13224] Call Trace:
[  336.366764][T13224]  dump_stack+0x1c9/0x220
[  336.371122][T13224]  kmsan_report+0xf7/0x1e0
[  336.375563][T13224]  kmsan_internal_check_memory+0x238/0x3d0
[  336.381406][T13224]  kmsan_copy_to_user+0x81/0x90
[  336.386373][T13224]  _copy_to_user+0x15a/0x1f0
[  336.390989][T13224]  tty_compat_ioctl+0x1482/0x1850
[  336.396027][T13224]  ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[  336.401869][T13224]  ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[  336.407689][T13224]  ? tty_poll+0x4b0/0x4b0
[  336.412028][T13224]  __se_compat_sys_ioctl+0x57c/0xed0
[  336.417329][T13224]  ? kmsan_get_metadata+0x4f/0x180
[  336.422441][T13224]  __ia32_compat_sys_ioctl+0xd9/0x110
[  336.427810][T13224]  ? compat_ptr_ioctl+0x150/0x150
[  336.432827][T13224]  do_fast_syscall_32+0x3c7/0x6e0
[  336.437911][T13224]  entry_SYSENTER_compat+0x68/0x77
[  336.443015][T13224] RIP: 0023:0xf7f8dd99
[  336.447077][T13224] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90
[  336.466758][T13224] RSP: 002b:00000000f5d880cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  336.475157][T13224] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000541e
[  336.483126][T13224] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000
[  336.491084][T13224] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  336.499040][T13224] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  336.506996][T13224] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  336.514975][T13224] 
[  336.517289][T13224] Local variable ----v32.i105@tty_compat_ioctl created at:
[  336.524474][T13224]  tty_compat_ioctl+0xf12/0x1850
[  336.529422][T13224]  tty_compat_ioctl+0xf12/0x1850
[  336.534335][T13224] 
[  336.536645][T13224] Bytes 50-51 of 60 are uninitialized
[  336.541996][T13224] Memory access of size 60 starts at ffff968bc13dbce0
[  336.548842][T13224] Data copied to user address 0000000020000040
[  336.554984][T13224] =====================================================
[  336.561902][T13224] Disabling lock debugging due to kernel taint
[  336.568042][T13224] Kernel panic - not syncing: panic_on_warn set ...
[  336.574630][T13224] CPU: 0 PID: 13224 Comm: syz-executor.4 Tainted: G    B             5.6.0-rc2-syzkaller #0
[  336.584673][T13224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  336.594715][T13224] Call Trace:
[  336.598002][T13224]  dump_stack+0x1c9/0x220
[  336.602326][T13224]  panic+0x3d5/0xc3e
[  336.606240][T13224]  kmsan_report+0x1df/0x1e0
[  336.610736][T13224]  kmsan_internal_check_memory+0x238/0x3d0
[  336.616546][T13224]  kmsan_copy_to_user+0x81/0x90
[  336.621382][T13224]  _copy_to_user+0x15a/0x1f0
[  336.625974][T13224]  tty_compat_ioctl+0x1482/0x1850
[  336.630987][T13224]  ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[  336.636811][T13224]  ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[  336.642604][T13224]  ? tty_poll+0x4b0/0x4b0
[  336.646923][T13224]  __se_compat_sys_ioctl+0x57c/0xed0
[  336.652203][T13224]  ? kmsan_get_metadata+0x4f/0x180
[  336.657315][T13224]  __ia32_compat_sys_ioctl+0xd9/0x110
[  336.662679][T13224]  ? compat_ptr_ioctl+0x150/0x150
[  336.667694][T13224]  do_fast_syscall_32+0x3c7/0x6e0
[  336.672718][T13224]  entry_SYSENTER_compat+0x68/0x77
[  336.677818][T13224] RIP: 0023:0xf7f8dd99
[  336.681887][T13224] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90
[  336.701521][T13224] RSP: 002b:00000000f5d880cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  336.709934][T13224] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000541e
[  336.717903][T13224] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000
[  336.725881][T13224] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  336.733858][T13224] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  336.741834][T13224] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  336.750551][T13224] ------------[ cut here ]------------
[  336.755995][T13224] kernel BUG at mm/kmsan/kmsan.h:87!
[  336.761272][T13224] invalid opcode: 0000 [#1] SMP
[  336.766116][T13224] CPU: 0 PID: 13224 Comm: syz-executor.4 Tainted: G    B             5.6.0-rc2-syzkaller #0
[  336.776153][T13224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  336.786200][T13224] RIP: 0010:kmsan_internal_check_memory+0x3c0/0x3d0
[  336.792765][T13224] Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b 48 c7 c7 06 4c 88 98 31 c0 e8 e1 70 48 ff 0f 0b 0f 0b 0f 0b 0f 0b e8 02 8f 48 ff 0f 0b <0f> 0b 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 83 ff
[  336.812351][T13224] RSP: 0018:ffff968bc13db748 EFLAGS: 00010046
[  336.818393][T13224] RAX: 0000000000000002 RBX: 0000000006ef00b3 RCX: 0000000006ef00b3
[  336.826377][T13224] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff968bc13db824
[  336.834337][T13224] RBP: ffff968bc13db7f0 R08: 0000000000000000 R09: ffff926fafc28ed0
[  336.842284][T13224] R10: 0000000000000000 R11: ffffffff8f616f70 R12: 0000000000000000
[  336.850380][T13224] R13: 0000000000000001 R14: 0000000000000002 R15: 0000000000000001
[  336.858330][T13224] FS:  0000000000000000(0000) GS:ffff926fafc00000(0063) knlGS:00000000f5d88b40
[  336.867251][T13224] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[  336.873811][T13224] CR2: 0000000008158000 CR3: 00000000319d8000 CR4: 00000000001406f0
[  336.881761][T13224] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  336.889722][T13224] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  336.897680][T13224] Call Trace:
[  336.900974][T13224]  kmsan_check_memory+0xd/0x10
[  336.905719][T13224]  iowrite8+0x99/0x2e0
[  336.909775][T13224]  pvpanic_panic_notify+0x99/0xc0
[  336.914862][T13224]  ? pvpanic_mmio_remove+0x60/0x60
[  336.919966][T13224]  atomic_notifier_call_chain+0x12a/0x240
[  336.925717][T13224]  panic+0x468/0xc3e
[  336.929613][T13224]  kmsan_report+0x1df/0x1e0
[  336.934100][T13224]  kmsan_internal_check_memory+0x238/0x3d0
[  336.939907][T13224]  kmsan_copy_to_user+0x81/0x90
[  336.944749][T13224]  _copy_to_user+0x15a/0x1f0
[  336.949346][T13224]  tty_compat_ioctl+0x1482/0x1850
[  336.954352][T13224]  ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[  336.960161][T13224]  ? kmsan_get_shadow_origin_ptr+0x81/0xb0
[  336.965957][T13224]  ? tty_poll+0x4b0/0x4b0
[  336.970270][T13224]  __se_compat_sys_ioctl+0x57c/0xed0
[  336.975592][T13224]  ? kmsan_get_metadata+0x4f/0x180
[  336.980695][T13224]  __ia32_compat_sys_ioctl+0xd9/0x110
[  336.986097][T13224]  ? compat_ptr_ioctl+0x150/0x150
[  336.991109][T13224]  do_fast_syscall_32+0x3c7/0x6e0
[  336.996137][T13224]  entry_SYSENTER_compat+0x68/0x77
[  337.001242][T13224] RIP: 0023:0xf7f8dd99
[  337.005294][T13224] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90
[  337.024899][T13224] RSP: 002b:00000000f5d880cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  337.033311][T13224] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000541e
[  337.041322][T13224] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000
[  337.049283][T13224] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  337.057243][T13224] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  337.065203][T13224] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  337.073171][T13224] Modules linked in:
[  337.077060][T13224] ---[ end trace 7046023676196b68 ]---
[  337.082514][T13224] RIP: 0010:kmsan_internal_check_memory+0x3c0/0x3d0
[  337.089088][T13224] Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b 48 c7 c7 06 4c 88 98 31 c0 e8 e1 70 48 ff 0f 0b 0f 0b 0f 0b 0f 0b e8 02 8f 48 ff 0f 0b <0f> 0b 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 83 ff
[  337.108682][T13224] RSP: 0018:ffff968bc13db748 EFLAGS: 00010046
[  337.114733][T13224] RAX: 0000000000000002 RBX: 0000000006ef00b3 RCX: 0000000006ef00b3
[  337.122698][T13224] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff968bc13db824
[  337.131472][T13224] RBP: ffff968bc13db7f0 R08: 0000000000000000 R09: ffff926fafc28ed0
[  337.139424][T13224] R10: 0000000000000000 R11: ffffffff8f616f70 R12: 0000000000000000
[  337.147378][T13224] R13: 0000000000000001 R14: 0000000000000002 R15: 0000000000000001
[  337.155358][T13224] FS:  0000000000000000(0000) GS:ffff926fafc00000(0063) knlGS:00000000f5d88b40
[  337.164302][T13224] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[  337.170919][T13224] CR2: 0000000008158000 CR3: 00000000319d8000 CR4: 00000000001406f0
[  337.178885][T13224] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  337.186847][T13224] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  337.194804][T13224] Kernel panic - not syncing: Fatal exception
[  337.201500][T13224] Kernel Offset: 0x9400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[  337.213030][T13224] Rebooting in 86400 seconds..