[ 106.350003][ T46] audit: type=1400 audit(1607878226.808:41): avc: denied { map } for pid=9664 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:8215' (ECDSA) to the list of known hosts. [ 110.470589][ T46] audit: type=1400 audit(1607878230.928:42): avc: denied { map } for pid=9676 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16526 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2020/12/13 16:50:31 fuzzer started 2020/12/13 16:50:31 dialing manager at 10.0.2.10:45643 [ 111.270735][ T46] audit: type=1400 audit(1607878231.728:43): avc: denied { integrity } for pid=9694 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 2020/12/13 16:50:31 syscalls: 3494 2020/12/13 16:50:31 code coverage: enabled 2020/12/13 16:50:31 comparison tracing: enabled 2020/12/13 16:50:31 extra coverage: enabled 2020/12/13 16:50:31 setuid sandbox: enabled 2020/12/13 16:50:31 namespace sandbox: enabled 2020/12/13 16:50:31 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/13 16:50:31 fault injection: enabled 2020/12/13 16:50:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/13 16:50:31 net packet injection: enabled 2020/12/13 16:50:31 net device setup: enabled 2020/12/13 16:50:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/13 16:50:31 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/13 16:50:31 USB emulation: enabled 2020/12/13 16:50:31 hci packet injection: enabled 2020/12/13 16:50:31 wifi device emulation: enabled 16:51:46 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000012c0)={'vxcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000001300)={0x1d, r1}, 0x10) [ 186.137678][ T46] audit: type=1400 audit(1607878306.588:44): avc: denied { map } for pid=9696 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=22 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 16:51:46 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x20) 16:51:46 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00'}) r0 = socket$isdn_base(0x22, 0x3, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000007, 0x11, r0, 0x0) 16:51:47 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000001a40)={@null=' \x00', 0x0, 'veth1_to_hsr\x00'}) [ 187.364797][ T9697] IPVS: ftp: loaded support on port[0] = 21 [ 187.469449][ T9697] chnl_net:caif_netlink_parms(): no params data found [ 187.489955][ T9699] IPVS: ftp: loaded support on port[0] = 21 [ 187.534796][ T9697] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.544639][ T9697] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.554616][ T9697] device bridge_slave_0 entered promiscuous mode [ 187.566871][ T9697] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.576255][ T9697] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.586239][ T9697] device bridge_slave_1 entered promiscuous mode [ 187.611018][ T9697] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.626828][ T9697] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.663525][ T9697] team0: Port device team_slave_0 added [ 187.675309][ T9697] team0: Port device team_slave_1 added [ 187.710487][ T9697] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 187.719790][ T9697] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.753292][ T9697] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 187.770515][ T9697] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 187.779635][ T9697] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.811452][ T9697] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 187.852219][ T9701] IPVS: ftp: loaded support on port[0] = 21 [ 187.869984][ T9697] device hsr_slave_0 entered promiscuous mode [ 187.879236][ T9697] device hsr_slave_1 entered promiscuous mode [ 187.897128][ T9703] IPVS: ftp: loaded support on port[0] = 21 [ 187.899647][ T9699] chnl_net:caif_netlink_parms(): no params data found [ 188.052818][ T9699] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.061807][ T9699] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.071391][ T9699] device bridge_slave_0 entered promiscuous mode [ 188.084120][ T9699] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.092480][ T9699] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.102527][ T9699] device bridge_slave_1 entered promiscuous mode [ 188.125640][ T9699] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.141144][ T9699] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.215147][ T9699] team0: Port device team_slave_0 added [ 188.225076][ T9699] team0: Port device team_slave_1 added [ 188.284258][ T9703] chnl_net:caif_netlink_parms(): no params data found [ 188.311266][ T9699] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 188.321212][ T9699] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.352459][ T9699] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 188.366541][ T9701] chnl_net:caif_netlink_parms(): no params data found [ 188.401691][ T9699] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 188.410376][ T9699] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.442780][ T9699] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 188.574378][ T9699] device hsr_slave_0 entered promiscuous mode [ 188.583357][ T9699] device hsr_slave_1 entered promiscuous mode [ 188.591718][ T9699] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 188.601883][ T9699] Cannot create hsr debugfs directory [ 188.635524][ T46] audit: type=1400 audit(1607878309.078:45): avc: denied { create } for pid=9697 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 188.642165][ T9703] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.682946][ T46] audit: type=1400 audit(1607878309.088:46): avc: denied { write } for pid=9697 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 188.695246][ T9703] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.729381][ T46] audit: type=1400 audit(1607878309.088:47): avc: denied { read } for pid=9697 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 188.739288][ T9703] device bridge_slave_0 entered promiscuous mode [ 188.784002][ T9703] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.794190][ T9703] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.804801][ T9703] device bridge_slave_1 entered promiscuous mode [ 188.815005][ T9697] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 188.845349][ T9701] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.854966][ T9701] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.865495][ T9701] device bridge_slave_0 entered promiscuous mode [ 188.882019][ T9701] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.892403][ T9701] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.905181][ T9701] device bridge_slave_1 entered promiscuous mode [ 188.915316][ T9697] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 188.937703][ T9697] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 188.972386][ T9703] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.992513][ T9697] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 189.016493][ T9703] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.038378][ T9701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.062366][ T9701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.101673][ T9703] team0: Port device team_slave_0 added [ 189.123503][ T9703] team0: Port device team_slave_1 added [ 189.132999][ T9701] team0: Port device team_slave_0 added [ 189.145382][ T9701] team0: Port device team_slave_1 added [ 189.184576][ T9703] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 189.192898][ T9703] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 189.223913][ T9703] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 189.252878][ T9703] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 189.262861][ T9703] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 189.294819][ T9703] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 189.318767][ T9701] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 189.326881][ T9701] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 189.357173][ T9701] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 189.358874][ T67] Bluetooth: hci0: command 0x0409 tx timeout [ 189.371618][ T9701] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 189.385128][ T9701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 189.414546][ T9701] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 189.464468][ T9703] device hsr_slave_0 entered promiscuous mode [ 189.486773][ T9703] device hsr_slave_1 entered promiscuous mode [ 189.501756][ T9703] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 189.522055][ T67] Bluetooth: hci1: command 0x0409 tx timeout [ 189.522390][ T9703] Cannot create hsr debugfs directory [ 189.600336][ T9701] device hsr_slave_0 entered promiscuous mode [ 189.610573][ T9701] device hsr_slave_1 entered promiscuous mode [ 189.621154][ T9701] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 189.635186][ T9701] Cannot create hsr debugfs directory [ 189.748192][ T23] Bluetooth: hci2: command 0x0409 tx timeout [ 189.753612][ T9699] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 189.783026][ T9699] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 189.793351][ T9699] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 189.805942][ T9699] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 189.890066][ T9697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.911954][ T9703] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 189.918164][ T23] Bluetooth: hci3: command 0x0409 tx timeout [ 189.930388][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.945326][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.959026][ T9697] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.969974][ T9703] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 189.994954][ T9703] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 190.006239][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.020145][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.031257][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.040490][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.056797][ T9703] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 190.068582][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.085958][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.096362][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.109265][ T9714] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.120395][ T9714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.141442][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.163218][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.178471][ T9701] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 190.190591][ T9701] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 190.207818][ T9701] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 190.223713][ T9701] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 190.237501][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.248953][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.261153][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.290321][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.314394][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.330602][ T9699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.344869][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.363714][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.386404][ T9697] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.403573][ T9697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.418665][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.429414][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.449920][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.462405][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.481509][ T9699] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.500420][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.510819][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.532425][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.543292][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.554084][ T9714] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.563182][ T9714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.580779][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.591387][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.602650][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.617912][ T9733] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.630924][ T9733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.650131][ T9697] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.671684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.689077][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.710126][ T9703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.725021][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.736176][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.750093][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.765520][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.779703][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.798976][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.810065][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.834816][ T9703] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.847722][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.859298][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.874539][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.894550][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.916859][ T9699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.930208][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.949503][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.964801][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.973729][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.996322][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.005980][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 191.016570][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.031347][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.046211][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.056910][ T9714] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.065926][ T9714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.088395][ T9701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.099043][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.123180][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.145379][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.155318][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.164982][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.177247][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.187635][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 191.199573][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 191.209116][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.219815][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.230611][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.241928][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.260128][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.277765][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.288718][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.308667][ T9703] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 191.322876][ T9703] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.338765][ T9699] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.347063][ T9697] device veth0_vlan entered promiscuous mode [ 191.358269][ T9701] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.370936][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.384827][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.396223][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.408298][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.429612][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.445795][ T3334] Bluetooth: hci0: command 0x041b tx timeout [ 191.455280][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.468441][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.485084][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.494820][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.507051][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.534830][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.553628][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.574430][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.585138][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.595852][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 191.598065][ T67] Bluetooth: hci1: command 0x041b tx timeout [ 191.606068][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 191.632203][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.659087][ T9697] device veth1_vlan entered promiscuous mode [ 191.687544][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 191.706667][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 191.729136][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.751443][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.791197][ T9703] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.838863][ T23] Bluetooth: hci2: command 0x041b tx timeout [ 191.843207][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.874738][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.888411][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.909588][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.926690][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.942319][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.953528][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.969947][ T9699] device veth0_vlan entered promiscuous mode [ 191.985859][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.998269][ T1710] Bluetooth: hci3: command 0x041b tx timeout [ 192.000357][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.025098][ T9699] device veth1_vlan entered promiscuous mode [ 192.042416][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 192.053438][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.066409][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.088077][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 192.099613][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 192.120702][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 192.130020][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 192.143063][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 192.153460][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.163584][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.176072][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.186574][ T9697] device veth0_macvtap entered promiscuous mode [ 192.201448][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 192.210365][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 192.220292][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.232288][ T9697] device veth1_macvtap entered promiscuous mode [ 192.243473][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 192.253061][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.262937][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.282054][ T9703] device veth0_vlan entered promiscuous mode [ 192.311824][ T9697] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 192.322975][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 192.332764][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 192.342555][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.352763][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.362794][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.376610][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.390012][ T9703] device veth1_vlan entered promiscuous mode [ 192.399406][ T9699] device veth0_macvtap entered promiscuous mode [ 192.413385][ T9697] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 192.424647][ T9699] device veth1_macvtap entered promiscuous mode [ 192.434276][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 192.444376][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 192.454596][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 192.464459][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.475133][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.490209][ T9701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.506422][ T9697] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.518791][ T9697] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.530193][ T9697] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.539778][ T9697] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.587290][ T9699] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 192.603615][ T9699] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.617847][ T9699] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 192.640345][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 192.656275][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.673125][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.716532][ T9699] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.750925][ T9699] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.782775][ T9699] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 192.804475][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 192.820563][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 192.834563][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.852606][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.879688][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 192.904961][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 192.941947][ T9699] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.957320][ T9699] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.971257][ T9699] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.982182][ T9699] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.011461][ T9703] device veth0_macvtap entered promiscuous mode [ 193.038999][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 193.039707][ T9701] device veth0_vlan entered promiscuous mode [ 193.049770][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 193.059147][ T9703] device veth1_macvtap entered promiscuous mode [ 193.076231][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 193.088547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 193.097734][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.108240][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.118090][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 193.127057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.137579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.173344][ T9703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.186100][ T9703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.202236][ T9703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.229273][ T9703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.256077][ T9703] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 193.285995][ T9722] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 193.288595][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 193.297523][ T9722] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 193.318921][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.340015][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 193.355074][ T9703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 193.369773][ T9703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.382321][ T9703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 193.397231][ T9703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.413191][ T9703] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 193.439348][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 193.440952][ T46] audit: type=1400 audit(1607878313.898:48): avc: denied { associate } for pid=9697 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 193.449655][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 193.461493][ T9722] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 193.461526][ T9722] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 193.481954][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 193.509443][ T1710] Bluetooth: hci0: command 0x040f tx timeout [ 193.511120][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 193.541865][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 193.552090][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 193.564534][ T9703] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.575503][ T9703] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.586897][ T9703] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.601754][ T9703] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.616285][ T9701] device veth1_vlan entered promiscuous mode [ 193.634227][ T9697] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 193.651633][ T9701] device veth0_macvtap entered promiscuous mode [ 193.678044][ T1710] Bluetooth: hci1: command 0x040f tx timeout [ 193.680644][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 193.701138][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 193.715679][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 193.735293][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.766794][ T9701] device veth1_macvtap entered promiscuous mode [ 193.789842][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 193.807810][ T3071] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 16:51:54 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) [ 193.870837][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.899619][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.917269][ T1710] Bluetooth: hci2: command 0x040f tx timeout [ 193.918040][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.945834][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.958708][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.973580][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.988784][ T9701] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 194.009294][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 194.023409][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 194.038913][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 16:51:54 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x1a, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 194.053937][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.066789][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.081621][ T1710] Bluetooth: hci3: command 0x040f tx timeout [ 194.088968][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.106395][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.120759][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.134354][ T9701] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 194.165252][ T9701] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.166466][ T46] audit: type=1400 audit(1607878314.618:49): avc: denied { prog_load } for pid=9749 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 194.176598][ T9701] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 16:51:54 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x20}}, 0x0) 16:51:54 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1beb}, 0x40) [ 194.211347][ T46] audit: type=1400 audit(1607878314.618:50): avc: denied { bpf } for pid=9749 comm="syz-executor.1" capability=39 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 194.262324][ T9701] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.300685][ T9751] blkid (9751) used greatest stack depth: 22952 bytes left [ 194.301697][ T46] audit: type=1400 audit(1607878314.618:51): avc: denied { perfmon } for pid=9749 comm="syz-executor.1" capability=38 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 194.318096][ T9701] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.392435][ T9721] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 194.421565][ T9721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:51:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0), 0x4) [ 194.427275][ T46] audit: type=1400 audit(1607878314.878:52): avc: denied { map_create } for pid=9753 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 194.471136][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 194.471136][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 194.610242][ T9721] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 194.619026][ T9757] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 16:51:55 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000000000e20000000000000000000a20000000000a01"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x100000005) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000006) [ 194.662373][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 194.687197][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 194.729648][ T9732] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 194.767547][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 194.794515][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 194.807454][ T9713] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 194.808397][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 194.814574][ T46] audit: type=1804 audit(1607878315.268:53): pid=9763 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir276925915/syzkaller.AKN4DY/4/cgroup.controllers" dev="sda1" ino=16558 res=1 errno=0 [ 194.815281][ T46] audit: type=1804 audit(1607878315.268:54): pid=9763 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir276925915/syzkaller.AKN4DY/4/cgroup.controllers" dev="sda1" ino=16558 res=1 errno=0 [ 194.815574][ T46] audit: type=1400 audit(1607878315.268:55): avc: denied { create } for pid=9762 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 194.816030][ T46] audit: type=1400 audit(1607878315.268:56): avc: denied { write } for pid=9762 comm="syz-executor.1" path="socket:[39409]" dev="sockfs" ino=39409 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 194.824563][ T9713] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 195.051885][ T9764] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 195.053036][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 195.131799][ T9763] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 195.239637][ T46] audit: type=1400 audit(1607878315.698:57): avc: denied { map } for pid=9769 comm="syz-executor.2" path="socket:[36733]" dev="sockfs" ino=36733 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=socket permissive=1 16:51:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x7ff}, 0x40) 16:51:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) select(0x11, &(0x7f0000000000), 0x0, &(0x7f0000000180)={0x8000000008}, 0x0) 16:51:55 executing program 2: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000002680)=0xffffffffffffffff, 0x4) 16:51:55 executing program 0: socket$xdp(0x2c, 0x3, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3}, &(0x7f0000000080)={0x9}, 0x0, 0x0) 16:51:55 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:55 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) 16:51:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001e001906000000000000400007"], 0x20}}, 0x0) [ 195.588071][ T9732] Bluetooth: hci0: command 0x0419 tx timeout 16:51:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000002", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64"], 0x3c}}, 0x0) 16:51:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001e001906000000000000400007"], 0x20}}, 0x0) 16:51:56 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000000000e20000000000000000000a20000000000a01"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x100000005) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000006) [ 195.622654][ T9798] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 195.748560][ T9732] Bluetooth: hci1: command 0x0419 tx timeout [ 195.786348][ T9803] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 195.837657][ T9806] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 195.988035][ T9732] Bluetooth: hci2: command 0x0419 tx timeout [ 196.158397][ T9732] Bluetooth: hci3: command 0x0419 tx timeout 16:51:56 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3e}}, 0x10) 16:51:56 executing program 2: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000000000e20000000000000000000a20000000000a01"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x100000005) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000006) 16:51:56 executing program 0: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000000000e20000000000000000000a20000000000a01"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x100000005) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000006) 16:51:56 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000000000e20000000000000000000a20000000000a01"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x100000005) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000006) 16:51:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) [ 196.271202][ T9813] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 16:51:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00'}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000002d00)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002cc0)={&(0x7f0000002c40)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x67}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x31}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x440a0}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, 0x0, &(0x7f0000000000)) [ 196.292138][ T9812] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 196.314959][ T9818] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 196.320308][ T9817] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 196.346677][ T9819] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:51:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00'}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000002d00)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002cc0)={&(0x7f0000002c40)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x67}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x31}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x440a0}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, 0x0, &(0x7f0000000000)) 16:51:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00'}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000002d00)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002cc0)={&(0x7f0000002c40)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x67}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x31}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x440a0}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, 0x0, &(0x7f0000000000)) 16:51:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000012c0)={0x16}, 0x40) 16:51:57 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x59a1c49e0ae78309, 0x0) 16:51:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0xd, &(0x7f00000022c0)=""/4100, &(0x7f0000001140)=0x1004) 16:51:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 16:51:57 executing program 2: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x20, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a300050000fb", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xe}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x6}]}}, @TCA_BPF_CLASSID={0x8, 0x3, {0x0, 0x4}}]}}]}, 0x4c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 16:51:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x7, 0x6, 0xbd0, 0x0, 0x1}, 0x40) 16:51:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x0, 0x0, 0x7fffffff}, 0x40) 16:51:57 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000400)='SEG6\x00') syz_genetlink_get_family_id$batadv(0x0) 16:51:57 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={0x0, 0x20}}, 0x0) 16:51:57 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x240, 0x0) 16:51:57 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000040)=0x20) 16:51:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000012c0)={0x16, 0xa2c, 0x0, 0x2}, 0x40) 16:51:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05140000000000000000010000000900010073797a300000000058000000160a03000000000000000000010000000900010073797a30000000000900020073797a32000000002c00038018000380140001006d6163736563300000000000000000000800024000000000080001400000000014000000110001"], 0xa0}}, 0x0) 16:51:57 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000040)=0x20) 16:51:57 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000000)=0xdf1) 16:51:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f00000012c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001180)=""/139, 0x28, 0x8b, 0x1}, 0x20) 16:51:57 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x17, 0x3, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000280)=""/194, 0x26, 0xc2, 0x1}, 0x20) 16:51:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:57 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [0x48], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x10}, 0x40) 16:51:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0x7}}}, 0x24}}, 0x0) 16:51:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:51:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}, 0x78) 16:51:57 executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x17, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_ext={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 16:51:58 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x1200800, 0x4) 16:51:58 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={0x0}}, 0x0) 16:51:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000180)={{0x3, @null}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 16:51:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000140)=""/128, 0xa0, 0x80, 0x1}, 0x20) 16:51:58 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0xffffffffffffff01) 16:51:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x548, 0xffffffff, 0x330, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x478, 0x478, 0x478, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@private2, @private0, [], [0xffffff00], 'geneve1\x00', 'geneve0\x00'}, 0x0, 0x238, 0x260, 0x0, {}, [@common=@unspec=@quota={{0x38, 'quota\x00'}}, @common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv6=@ipv4, [], @ipv4=@empty, [], 0x0, 0x3500}, {@ipv4=@multicast1, [], @ipv4=@private}, {@ipv4=@broadcast, [], @ipv4=@remote, [], 0x0, 0x0, 0x0, 0x1}, {@ipv6=@rand_addr=' \x01\x00', [], @ipv6=@dev}]}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@frag={{0x30, 'frag\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "40d4e4606a7b3543243cf578fbee75ae80aeba29ee7d233d1ba11cdd8077"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a8) gettid() 16:51:58 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001180)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20aad, r0}, 0x78) [ 197.772330][ T9948] x_tables: duplicate underflow at hook 2 [ 197.784617][ T9948] x_tables: duplicate underflow at hook 2 16:51:58 executing program 1: socket(0x3, 0x0, 0x10000) 16:51:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 16:51:58 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00'}) 16:51:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}]}}, &(0x7f0000000280)=""/194, 0x32, 0xc2, 0x1}, 0x20) 16:51:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) 16:51:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x17, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) 16:51:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000012c0)={0x2, 0x15, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}]}, 0x18}}, 0x0) 16:51:58 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 16:51:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) 16:51:58 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000014c0)={&(0x7f0000001200), 0xc, &(0x7f0000001480)={0x0}}, 0x0) 16:51:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x0, 0xe2}, 0x40) 16:51:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) 16:51:58 executing program 1: socket(0x2, 0x0, 0xa605) 16:51:58 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) 16:51:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 2: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) 16:51:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000640)=@gcm_256={{}, "6f683e23a26b2998", "c2f8fbef169613580c378ca66a929b6b75e168fa6bdec0a747083e2ea446b58d", "d3a1f56c", "5f1a00ec4335a541"}, 0x38) 16:51:58 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 2: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) 16:51:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x220080, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) 16:51:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@gettfilter={0x24, 0x73, 0x1}, 0x24}}, 0x0) 16:51:58 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0xffffffe1}, 0x8) 16:51:58 executing program 2: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) [ 198.372706][T10033] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=10033 comm=syz-executor.1 16:51:58 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:58 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000a00)=[{}, {}], 0x4000) 16:51:58 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) 16:51:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:58 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:58 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) 16:51:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000008400000084000000040000000100000009000005"], &(0x7f0000000140)=""/128, 0xa0, 0x80, 0x1}, 0x20) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000090001"], 0x84}}, 0x0) 16:51:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {}, [@NETCONFA_PROXY_NEIGH={0x8}]}, 0x1c}}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 16:51:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x4e8, 0xffffffff, 0x330, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x478, 0x478, 0x478, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@private2, @private0, [], [], 'geneve1\x00', 'geneve0\x00'}, 0x0, 0x238, 0x260, 0x0, {}, [@common=@unspec=@quota={{0x38, 'quota\x00'}}, @common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv6=@ipv4, [], @ipv4=@empty}, {@ipv4=@multicast1, [], @ipv4=@private}, {@ipv4=@broadcast, [], @ipv4=@remote}, {@ipv6=@rand_addr=' \x01\x00', [], @ipv6=@dev}]}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "40d4e4606a7b3543243cf578fbee75ae80aeba29ee7d233d1ba11cdd8077"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x548) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 16:51:59 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x548, 0xffffffff, 0x330, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x478, 0x478, 0x478, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x6}, {0x2, 0x2, 0x4}}}}, {{@ipv6={@private2, @private0, [], [], 'geneve1\x00', 'geneve0\x00'}, 0x0, 0x238, 0x260, 0x0, {}, [@common=@unspec=@quota={{0x38, 'quota\x00'}, {0x1}}, @common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv6=@ipv4={[], [], @rand_addr=0x64010100}, [0xff, 0xffffff00, 0xffffffff, 0xff], @ipv4=@empty, [0x0, 0xffffffff, 0xffffffff], 0x0, 0x0, 0x2b, 0x1, 0x3, 0x12}, {@ipv4=@multicast1, [0x0, 0xff000000], @ipv4=@private=0xa010102, [0xffff00, 0xffffffff, 0xffffffff, 0xff000000], 0x4d4}, {@ipv4=@broadcast, [0xffffff00, 0xff, 0x0, 0xffffff00], @ipv4=@remote, [0xff000000, 0x0, 0x0, 0xff000000], 0x4d2, 0x3506, 0x3b, 0x1, 0x10}, {@ipv6=@rand_addr=' \x01\x00', [], @ipv6=@dev={0xfe, 0x80, [], 0x3c}, [0xffffff00, 0xffffffff, 0xff, 0xffffffff], 0x4d5, 0x0, 0x0, 0x0, 0x18, 0x1}], 0xf, 0x3}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@frag={{0x30, 'frag\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "40d4e4606a7b3543243cf578fbee75ae80aeba29ee7d233d1ba11cdd8077"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a8) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) [ 198.784930][T10102] x_tables: duplicate underflow at hook 2 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) 16:51:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64"], 0x3c}}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) 16:51:59 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={0x0, 0x11cc}}, 0x0) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) 16:51:59 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x10, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={0x0, 0x84}}, 0x0) 16:51:59 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 1: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x1d, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:51:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x40010, r0, 0x0) 16:51:59 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={0x0, 0x84}}, 0x0) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={0x0, 0x84}}, 0x0) 16:51:59 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/mnt\x00') 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x4fe, 0x20008000) 16:51:59 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[], 0x84}}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, 0x0, 0x0, 0x20008000) 16:51:59 executing program 3: r0 = socket$inet(0x2, 0x0, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x6, 0x0, &(0x7f0000000100)) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[], 0x84}}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, 0x0, 0x0, 0x20008000) 16:51:59 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[], 0x84}}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, 0x0, 0x0, 0x20008000) 16:51:59 executing program 3: r0 = socket$inet(0x2, 0x0, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x84}}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80), 0x0, 0x20008000) 16:51:59 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000), 0x4) 16:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x84}}, 0x0) 16:51:59 executing program 3: r0 = socket$inet(0x2, 0x0, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:51:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80), 0x0, 0x20008000) 16:51:59 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000002380)={0x0, 0x0, 0x0}, 0x2100) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x84}}, 0x0) 16:52:00 executing program 1: socketpair(0x1d, 0x2, 0x2, &(0x7f0000000540)) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80), 0x0, 0x20008000) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a3000000000"], 0x84}}, 0x0) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008000) 16:52:00 executing program 1: socketpair(0x1d, 0x2, 0x2, &(0x7f0000000540)) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a3000000000"], 0x84}}, 0x0) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008000) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a3000000000"], 0x84}}, 0x0) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008000) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000"], 0x84}}, 0x0) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}], 0x1}}], 0x1, 0x20008000) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000"], 0x84}}, 0x0) 16:52:00 executing program 1: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4010, 0xffffffffffffff9c, 0x0) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}], 0x1}}], 0x1, 0x20008000) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 1: sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200), 0xc, 0x0}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x20}]}, 0x1c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000880), 0xc, 0x0}, 0x40) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, 0x0, 0x0) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000"], 0x84}}, 0x0) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}], 0x1}}], 0x1, 0x20008000) 16:52:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="f4", 0x7ffff000}, {&(0x7f0000000540)='\a', 0x7ffff000}], 0x2}}], 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 200.065920][T10311] __nla_validate_parse: 9 callbacks suppressed [ 200.065927][T10311] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {0x0}], 0x2}}], 0x1, 0x20008000) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, 0x0, 0x0) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff00000000000000000000000008000540000000120900020025642530000000"], 0x84}}, 0x0) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {0x0}], 0x2}}], 0x1, 0x20008000) [ 200.147461][T10325] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {0x0}], 0x2}}], 0x1, 0x20008000) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, 0x0, 0x0) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff00000000000000000000000008000540000000120900020025642530000000"], 0x84}}, 0x0) [ 200.229451][T10335] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="f4", 0x7ffff000}, {&(0x7f0000000540)='\a', 0x7ffff000}], 0x2}}], 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)}], 0x2}}], 0x1, 0x20008000) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff00000000000000000000000008000540000000120900020025642530000000"], 0x84}}, 0x0) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)}], 0x2}}], 0x1, 0x20008000) [ 200.288792][T10346] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff"], 0x84}}, 0x0) [ 200.365166][T10356] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff"], 0x84}}, 0x0) [ 200.444942][T10361] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:00 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x1) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)}], 0x2}}], 0x1, 0x20008000) 16:52:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff"], 0x84}}, 0x0) 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 16:52:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000540)='\a', 0x1}], 0x1}}], 0x1, 0x20008000) [ 200.512324][T10369] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:00 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, 0x0, 0x0) 16:52:01 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) bind$can_raw(r0, &(0x7f0000001300), 0x10) 16:52:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000"], 0x84}}, 0x0) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, 0x0, 0x0) [ 200.605685][T10384] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000540)='\a', 0x1}], 0x1}}], 0x1, 0x20008000) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, 0x0, 0x0) 16:52:01 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x7, &(0x7f0000000000), 0x4) 16:52:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000"], 0x84}}, 0x0) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={0x0, 0x0, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000540)='\a', 0x1}], 0x1}}], 0x1, 0x20008000) 16:52:01 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000}}, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 200.696143][T10406] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={0x0, 0x0, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x1, 0x20008000) 16:52:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff010000"], 0x84}}, 0x0) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={0x0, 0x0, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 16:52:01 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x1, 0x20008000) [ 200.800112][T10418] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff0100000900"], 0x84}}, 0x0) 16:52:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000140)=""/128, 0xa0, 0x80, 0x1}, 0x20) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x1, 0x20008000) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x1, 0x20008000) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 16:52:01 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x6, 0x0, 0xfffffffffffffffe) 16:52:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff0100000900"], 0x84}}, 0x0) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 16:52:01 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x6, 0x0, 0xfffffffffffffffe) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x1, 0x20008000) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)}, 0x0) 16:52:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff000000000000000000000000080005400000001209000200256425300000000008000a40ff0100000900"], 0x84}}, 0x0) 16:52:01 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x6, 0x0, 0xfffffffffffffffe) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)}, 0x0) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x1, 0x20008000) 16:52:01 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x6, 0x0, 0xfffffffffffffffe) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)}, 0x0) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x1, 0x0) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x1, 0x0) 16:52:01 executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 16:52:01 executing program 1: getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x6, 0x0, 0xfffffffffffffffe) 16:52:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x1}], 0x2}}], 0x1, 0x0) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{0x0}], 0x1}, 0x0) 16:52:01 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x3, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{0x0}], 0x1}, 0x0) 16:52:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x330, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x478, 0x478, 0x478, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@private2, @private0, [], [], 'geneve1\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "40d4e4606a7b3543243cf578fbee75ae80aeba29ee7d233d1ba11cdd8077"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:52:01 executing program 1: getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x6, 0x0, 0xfffffffffffffffe) 16:52:01 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{0x0}], 0x1}, 0x0) 16:52:01 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_lsm={0x3, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:52:01 executing program 1: getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x6, 0x0, 0xfffffffffffffffe) 16:52:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0x8, 0x5, 0x12, @local, @dev={0xfe, 0x80, [], 0x3b}, 0x20, 0x0, 0x4, 0x9}}) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="440100001000130729bd700000000000fe800000f1b6000800000000000000aaff02000000000000000000000000000100000006000000000000000004000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000000000000000000000000000000000000000000061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000910000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000002dbd7000000000000a000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001c00", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x144}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = socket(0x5, 0x2, 0xfffffffe) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x20, r6, 0xdc25c0f278defbaf, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x6}]}]}, 0x20}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000400)=""/154, &(0x7f00000004c0)=0x9a) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="090000007000ffdbdf2516000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r7, 0x0, 0xf03b0000) sendfile(r3, r2, 0x0, 0x8000000000004) r8 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b7f03e3f7000e0000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf242ab0f8381ad6e74703c48f939a5a7378bc7a581eb886a5e54e8ff51700", 0x4c}], 0x1}, 0x0) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 16:52:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000540)='nl80211\x00') sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x4}]}]}, 0x28}}, 0x0) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 16:52:01 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x6, 0x0, 0xfffffffffffffffe) 16:52:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7}]}]}}, &(0x7f00000002c0)=""/188, 0x32, 0xbc, 0x1}, 0x20) 16:52:01 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 16:52:01 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x6, 0x0, 0xfffffffffffffffe) [ 201.437578][T10519] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 202.183996][T10552] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:52:02 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x6, 0x0, 0xfffffffffffffffe) 16:52:02 executing program 0: r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x15, &(0x7f0000000800)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:52:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0x8, 0x5, 0x12, @local, @dev={0xfe, 0x80, [], 0x3b}, 0x20, 0x0, 0x4, 0x9}}) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="440100001000130729bd700000000000fe800000f1b6000800000000000000aaff02000000000000000000000000000100000006000000000000000004000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000000000000000000000000000000000000000000061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000910000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000002dbd7000000000000a000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001c00", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x144}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = socket(0x5, 0x2, 0xfffffffe) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x20, r6, 0xdc25c0f278defbaf, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x6}]}]}, 0x20}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000400)=""/154, &(0x7f00000004c0)=0x9a) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="090000007000ffdbdf2516000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r7, 0x0, 0xf03b0000) sendfile(r3, r2, 0x0, 0x8000000000004) r8 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b7f03e3f7000e0000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf242ab0f8381ad6e74703c48f939a5a7378bc7a581eb886a5e54e8ff51700", 0x4c}], 0x1}, 0x0) 16:52:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/188, 0x1a, 0xbc, 0x1}, 0x20) 16:52:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0x8, 0x5, 0x12, @local, @dev={0xfe, 0x80, [], 0x3b}, 0x20, 0x0, 0x4, 0x9}}) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="440100001000130729bd700000000000fe800000f1b6000800000000000000aaff02000000000000000000000000000100000006000000000000000004000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000000000000000000000000000000000000000000061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000910000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000002dbd7000000000000a000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001c00", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x144}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = socket(0x5, 0x2, 0xfffffffe) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x20, r6, 0xdc25c0f278defbaf, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x6}]}]}, 0x20}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000400)=""/154, &(0x7f00000004c0)=0x9a) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="090000007000ffdbdf2516000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r7, 0x0, 0xf03b0000) sendfile(r3, r2, 0x0, 0x8000000000004) r8 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b7f03e3f7000e0000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf242ab0f8381ad6e74703c48f939a5a7378bc7a581eb886a5e54e8ff51700", 0x4c}], 0x1}, 0x0) 16:52:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0x8, 0x5, 0x12, @local, @dev={0xfe, 0x80, [], 0x3b}, 0x20, 0x0, 0x4, 0x9}}) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="440100001000130729bd700000000000fe800000f1b6000800000000000000aaff02000000000000000000000000000100000006000000000000000004000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000000000000000000000000000000000000000000061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000910000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000002dbd7000000000000a000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001c00", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x144}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = socket(0x5, 0x2, 0xfffffffe) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x20, r6, 0xdc25c0f278defbaf, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x6}]}]}, 0x20}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000400)=""/154, &(0x7f00000004c0)=0x9a) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="090000007000ffdbdf2516000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r7, 0x0, 0xf03b0000) sendfile(r3, r2, 0x0, 0x8000000000004) r8 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b7f03e3f7000e0000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf242ab0f8381ad6e74703c48f939a5a7378bc7a581eb886a5e54e8ff51700", 0x4c}], 0x1}, 0x0) 16:52:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x17, &(0x7f0000001a40)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in6=@local}}, 0xe8) [ 202.289823][T10566] [ 202.302620][T10566] ============================= [ 202.315563][T10562] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 202.323649][T10570] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 202.323758][T10570] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 202.323767][T10570] CPU: 3 PID: 10570 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 202.323773][T10570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 202.326561][T10570] RIP: 0010:bond_ipsec_add_sa+0x9e/0x240 [ 202.326765][T10570] Code: 04 31 ff 89 c3 89 c6 e8 f0 2c d8 fc 85 db 0f 85 f6 00 00 00 e8 93 34 d8 fc 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 5f 01 00 00 48 8d bd d0 02 00 00 49 8b 5d 00 48 [ 202.326770][T10570] RSP: 0018:ffffc90002e47498 EFLAGS: 00010246 [ 202.326823][T10570] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc90006ee9000 [ 202.326828][T10570] RDX: 0000000000000000 RSI: ffffffff8497d16d RDI: 0000000000000001 [ 202.326833][T10570] RBP: ffff888016539c00 R08: 0000000000000000 R09: 0000000000000000 [ 202.326839][T10570] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88806c230000 [ 202.326844][T10570] R13: 0000000000000000 R14: ffff888016539ee0 R15: ffff888016539ee4 [ 202.326905][T10570] FS: 00007f5eca4f9700(0000) GS:ffff88802cd00000(0000) knlGS:0000000000000000 [ 202.327218][T10570] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.327223][T10570] CR2: 00000000007120d0 CR3: 0000000050d1d000 CR4: 0000000000350ee0 [ 202.327229][T10570] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.327234][T10570] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 202.327236][T10570] Call Trace: [ 202.327436][T10570] xfrm_dev_state_add+0x2da/0x7b0 [ 202.327518][T10570] xfrm_add_sa+0x2166/0x34f0 [ 202.327534][T10570] ? xfrm_send_report+0x510/0x510 [ 202.327544][T10570] ? bpf_lsm_capable+0x5/0x10 [ 202.327554][T10570] ? security_capable+0x8f/0xc0 [ 202.327563][T10570] ? __nla_parse+0x3d/0x50 [ 202.327571][T10570] ? xfrm_send_report+0x510/0x510 [ 202.327579][T10570] xfrm_user_rcv_msg+0x42f/0x8b0 [ 202.327591][T10570] ? xfrm_do_migrate+0x800/0x800 [ 202.327602][T10570] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.327616][T10570] ? __mutex_lock+0x626/0x10e0 [ 202.327625][T10570] netlink_rcv_skb+0x153/0x420 [ 202.327708][T10570] ? xfrm_do_migrate+0x800/0x800 [ 202.327715][T10570] ? netlink_ack+0xaa0/0xaa0 [ 202.327726][T10570] xfrm_netlink_rcv+0x6b/0x90 [ 202.327734][T10570] netlink_unicast+0x533/0x7d0 [ 202.327743][T10570] ? netlink_attachskb+0x810/0x810 [ 202.327752][T10570] netlink_sendmsg+0x856/0xd90 [ 202.327761][T10570] ? netlink_unicast+0x7d0/0x7d0 [ 202.327776][T10570] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 202.327783][T10570] ? netlink_unicast+0x7d0/0x7d0 [ 202.327791][T10570] sock_sendmsg+0xcf/0x120 [ 202.327798][T10570] ____sys_sendmsg+0x6e8/0x810 [ 202.327805][T10570] ? kernel_sendmsg+0x50/0x50 [ 202.327815][T10570] ? do_recvmmsg+0x6c0/0x6c0 [ 202.327826][T10570] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.327834][T10570] ___sys_sendmsg+0xf3/0x170 [ 202.327842][T10570] ? sendmsg_copy_msghdr+0x160/0x160 [ 202.327851][T10570] ? __fget_files+0x272/0x400 [ 202.327857][T10570] ? lock_downgrade+0x6d0/0x6d0 [ 202.327865][T10570] ? find_held_lock+0x2d/0x110 [ 202.327873][T10570] ? __fget_files+0x294/0x400 [ 202.327881][T10570] ? __fget_light+0xea/0x280 [ 202.327889][T10570] __sys_sendmsg+0xe5/0x1b0 [ 202.327897][T10570] ? __sys_sendmsg_sock+0xb0/0xb0 [ 202.327905][T10570] ? __do_sys_futex+0x2a2/0x470 [ 202.327915][T10570] ? syscall_enter_from_user_mode+0x1d/0x50 [ 202.327925][T10570] do_syscall_64+0x2d/0x70 [ 202.327934][T10570] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 202.328016][T10570] RIP: 0033:0x45dcd9 [ 202.328025][T10570] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.328029][T10570] RSP: 002b:00007f5eca4f8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.328038][T10570] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045dcd9 [ 202.328043][T10570] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 202.328048][T10570] RBP: 00000000004aae00 R08: 0000000000000000 R09: 0000000000000000 [ 202.328053][T10570] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf40 [ 202.328058][T10570] R13: 00007ffcc1582edf R14: 00007f5eca4d9000 R15: 0000000000000003 [ 202.328063][T10570] Modules linked in: [ 202.329726][T10570] ---[ end trace f71849d5db08409b ]--- [ 202.329738][T10570] RIP: 0010:bond_ipsec_add_sa+0x9e/0x240 [ 202.329747][T10570] Code: 04 31 ff 89 c3 89 c6 e8 f0 2c d8 fc 85 db 0f 85 f6 00 00 00 e8 93 34 d8 fc 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 5f 01 00 00 48 8d bd d0 02 00 00 49 8b 5d 00 48 [ 202.329753][T10570] RSP: 0018:ffffc90002e47498 EFLAGS: 00010246 [ 202.329762][T10570] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc90006ee9000 [ 202.329772][T10570] RDX: 0000000000000000 RSI: ffffffff8497d16d RDI: 0000000000000001 [ 202.329778][T10570] RBP: ffff888016539c00 R08: 0000000000000000 R09: 0000000000000000 [ 202.329784][T10570] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88806c230000 [ 202.329789][T10570] R13: 0000000000000000 R14: ffff888016539ee0 R15: ffff888016539ee4 [ 202.329804][T10570] FS: 00007f5eca4f9700(0000) GS:ffff88802cd00000(0000) knlGS:0000000000000000 [ 202.331317][T10570] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.333468][T10566] WARNING: suspicious RCU usage [ 202.333475][T10566] 5.10.0-rc7-syzkaller #0 Tainted: G D [ 202.333478][T10566] ----------------------------- [ 202.333484][T10566] drivers/net/bonding/bond_main.c:395 suspicious rcu_dereference_check() usage! [ 202.333488][T10566] [ 202.333488][T10566] other info that might help us debug this: [ 202.333488][T10566] [ 202.333493][T10566] [ 202.333493][T10566] rcu_scheduler_active = 2, debug_locks = 0 [ 202.333498][T10566] 1 lock held by syz-executor.1/10566: [ 202.333500][T10566] #0: ffff888050dbdae8 (&net->xfrm.xfrm_cfg_mutex){+.+.}-{3:3}, at: xfrm_netlink_rcv+0x5c/0x90 [ 202.333546][T10566] [ 202.333546][T10566] stack backtrace: [ 202.333555][T10566] CPU: 0 PID: 10566 Comm: syz-executor.1 Tainted: G D 5.10.0-rc7-syzkaller #0 [ 202.333561][T10566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 202.333563][T10566] Call Trace: [ 202.333578][T10566] dump_stack+0x107/0x163 [ 202.333588][T10566] bond_ipsec_add_sa+0x1dc/0x240 [ 202.333596][T10566] xfrm_dev_state_add+0x2da/0x7b0 [ 202.333605][T10566] xfrm_add_sa+0x2166/0x34f0 [ 202.333615][T10566] ? xfrm_send_report+0x510/0x510 [ 202.333624][T10566] ? bpf_lsm_capable+0x5/0x10 [ 202.333637][T10566] ? security_capable+0x8f/0xc0 [ 202.333646][T10566] ? __nla_parse+0x3d/0x50 [ 202.333653][T10566] ? xfrm_send_report+0x510/0x510 [ 202.333662][T10566] xfrm_user_rcv_msg+0x42f/0x8b0 [ 202.333674][T10566] ? xfrm_do_migrate+0x800/0x800 [ 202.333686][T10566] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.333700][T10566] ? __mutex_lock+0x626/0x10e0 [ 202.333709][T10566] netlink_rcv_skb+0x153/0x420 [ 202.333717][T10566] ? xfrm_do_migrate+0x800/0x800 [ 202.333724][T10566] ? netlink_ack+0xaa0/0xaa0 [ 202.333734][T10566] xfrm_netlink_rcv+0x6b/0x90 [ 202.333741][T10566] netlink_unicast+0x533/0x7d0 [ 202.333754][T10566] ? netlink_attachskb+0x810/0x810 [ 202.333763][T10566] netlink_sendmsg+0x856/0xd90 [ 202.333772][T10566] ? netlink_unicast+0x7d0/0x7d0 [ 202.333787][T10566] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 202.333794][T10566] ? netlink_unicast+0x7d0/0x7d0 [ 202.333802][T10566] sock_sendmsg+0xcf/0x120 [ 202.333809][T10566] ____sys_sendmsg+0x6e8/0x810 [ 202.333817][T10566] ? kernel_sendmsg+0x50/0x50 [ 202.333828][T10566] ? do_recvmmsg+0x6c0/0x6c0 [ 202.333838][T10566] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.333846][T10566] ___sys_sendmsg+0xf3/0x170 [ 202.333854][T10566] ? sendmsg_copy_msghdr+0x160/0x160 [ 202.333863][T10566] ? __fget_files+0x272/0x400 [ 202.333869][T10566] ? lock_downgrade+0x6d0/0x6d0 [ 202.333876][T10566] ? find_held_lock+0x2d/0x110 [ 202.333885][T10566] ? __fget_files+0x294/0x400 [ 202.333893][T10566] ? __fget_light+0xea/0x280 [ 202.333906][T10566] __sys_sendmsg+0xe5/0x1b0 [ 202.333914][T10566] ? __sys_sendmsg_sock+0xb0/0xb0 [ 202.333922][T10566] ? __do_sys_futex+0x2a2/0x470 [ 202.333931][T10566] ? syscall_enter_from_user_mode+0x1d/0x50 [ 202.333941][T10566] do_syscall_64+0x2d/0x70 [ 202.333949][T10566] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 202.333955][T10566] RIP: 0033:0x45dcd9 [ 202.333964][T10566] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.333969][T10566] RSP: 002b:00007f7285549c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.333977][T10566] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045dcd9 [ 202.333986][T10566] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 202.333991][T10566] RBP: 00000000004aae00 R08: 0000000000000000 R09: 0000000000000000 [ 202.333996][T10566] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf40 [ 202.334001][T10566] R13: 00007ffe854c3f2f R14: 00007f728552a000 R15: 0000000000000003 [ 202.334083][T10566] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#2] PREEMPT SMP KASAN [ 202.334088][T10566] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 202.334097][T10566] CPU: 0 PID: 10566 Comm: syz-executor.1 Tainted: G D 5.10.0-rc7-syzkaller #0 [ 202.334102][T10566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 202.334111][T10566] RIP: 0010:bond_ipsec_add_sa+0x9e/0x240 [ 202.334119][T10566] Code: 04 31 ff 89 c3 89 c6 e8 f0 2c d8 fc 85 db 0f 85 f6 00 00 00 e8 93 34 d8 fc 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 5f 01 00 00 48 8d bd d0 02 00 00 49 8b 5d 00 48 [ 202.334124][T10566] RSP: 0018:ffffc90002e27498 EFLAGS: 00010246 [ 202.334131][T10566] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90020202000 [ 202.334136][T10566] RDX: 0000000000000000 RSI: ffffffff8497d16d RDI: ffffffff88b6f4b0 [ 202.334141][T10566] RBP: ffff888020823440 R08: 0000000000000000 R09: 0000000000000000 [ 202.334146][T10566] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88801e07c000 [ 202.334151][T10566] R13: 0000000000000000 R14: ffff888020823720 R15: ffff888020823724 [ 202.334169][T10566] FS: 00007f728554a700(0000) GS:ffff88802ca00000(0000) knlGS:0000000000000000 [ 202.334506][T10566] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.334591][T10566] CR2: 00000000007120d0 CR3: 000000004f9df000 CR4: 0000000000350ef0 [ 202.334596][T10566] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.334601][T10566] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 202.334603][T10566] Call Trace: [ 202.334614][T10566] xfrm_dev_state_add+0x2da/0x7b0 [ 202.334622][T10566] xfrm_add_sa+0x2166/0x34f0 [ 202.334631][T10566] ? xfrm_send_report+0x510/0x510 [ 202.334638][T10566] ? bpf_lsm_capable+0x5/0x10 [ 202.334648][T10566] ? security_capable+0x8f/0xc0 [ 202.334656][T10566] ? __nla_parse+0x3d/0x50 [ 202.334668][T10566] ? xfrm_send_report+0x510/0x510 [ 202.334676][T10566] xfrm_user_rcv_msg+0x42f/0x8b0 [ 202.334683][T10566] ? xfrm_do_migrate+0x800/0x800 [ 202.334692][T10566] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.334705][T10566] ? __mutex_lock+0x626/0x10e0 [ 202.334714][T10566] netlink_rcv_skb+0x153/0x420 [ 202.334721][T10566] ? xfrm_do_migrate+0x800/0x800 [ 202.334728][T10566] ? netlink_ack+0xaa0/0xaa0 [ 202.334738][T10566] xfrm_netlink_rcv+0x6b/0x90 [ 202.334745][T10566] netlink_unicast+0x533/0x7d0 [ 202.334753][T10566] ? netlink_attachskb+0x810/0x810 [ 202.334762][T10566] netlink_sendmsg+0x856/0xd90 [ 202.334774][T10566] ? netlink_unicast+0x7d0/0x7d0 [ 202.334785][T10566] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 202.334792][T10566] ? netlink_unicast+0x7d0/0x7d0 [ 202.334799][T10566] sock_sendmsg+0xcf/0x120 [ 202.334806][T10566] ____sys_sendmsg+0x6e8/0x810 [ 202.334813][T10566] ? kernel_sendmsg+0x50/0x50 [ 202.334820][T10566] ? do_recvmmsg+0x6c0/0x6c0 [ 202.334829][T10566] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.334838][T10566] ___sys_sendmsg+0xf3/0x170 [ 202.334846][T10566] ? sendmsg_copy_msghdr+0x160/0x160 [ 202.334854][T10566] ? __fget_files+0x272/0x400 [ 202.334860][T10566] ? lock_downgrade+0x6d0/0x6d0 [ 202.334868][T10566] ? find_held_lock+0x2d/0x110 [ 202.334876][T10566] ? __fget_files+0x294/0x400 [ 202.334888][T10566] ? __fget_light+0xea/0x280 [ 202.334896][T10566] __sys_sendmsg+0xe5/0x1b0 [ 202.334904][T10566] ? __sys_sendmsg_sock+0xb0/0xb0 [ 202.334912][T10566] ? __do_sys_futex+0x2a2/0x470 [ 202.334921][T10566] ? syscall_enter_from_user_mode+0x1d/0x50 [ 202.334931][T10566] do_syscall_64+0x2d/0x70 [ 202.334939][T10566] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 202.334944][T10566] RIP: 0033:0x45dcd9 [ 202.334956][T10566] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.334961][T10566] RSP: 002b:00007f7285549c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.334973][T10566] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045dcd9 [ 202.334978][T10566] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 202.334982][T10566] RBP: 00000000004aae00 R08: 0000000000000000 R09: 0000000000000000 [ 202.334987][T10566] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf40 [ 202.334995][T10566] R13: 00007ffe854c3f2f R14: 00007f728552a000 R15: 0000000000000003 [ 202.335001][T10566] Modules linked in: [ 202.335539][T10566] ---[ end trace f71849d5db08409c ]--- [ 202.335551][T10566] RIP: 0010:bond_ipsec_add_sa+0x9e/0x240 [ 202.335563][T10566] Code: 04 31 ff 89 c3 89 c6 e8 f0 2c d8 fc 85 db 0f 85 f6 00 00 00 e8 93 34 d8 fc 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 5f 01 00 00 48 8d bd d0 02 00 00 49 8b 5d 00 48 [ 202.335568][T10566] RSP: 0018:ffffc90002e47498 EFLAGS: 00010246 [ 202.335577][T10566] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc90006ee9000 [ 202.335582][T10566] RDX: 0000000000000000 RSI: ffffffff8497d16d RDI: 0000000000000001 [ 202.335588][T10566] RBP: ffff888016539c00 R08: 0000000000000000 R09: 0000000000000000 [ 202.335593][T10566] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88806c230000 [ 202.335599][T10566] R13: 0000000000000000 R14: ffff888016539ee0 R15: ffff888016539ee4 [ 202.335611][T10566] FS: 00007f728554a700(0000) GS:ffff88802ca00000(0000) knlGS:0000000000000000 [ 202.335724][T10566] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.335730][T10566] CR2: 00007f7285528db8 CR3: 000000004f9df000 CR4: 0000000000350ef0 [ 202.335735][T10566] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.335740][T10566] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 202.335745][T10566] Kernel panic - not syncing: Fatal exception [ 202.338223][T10566] Kernel Offset: disabled [ 202.338223][T10566] Rebooting in 86400 seconds.. VM DIAGNOSIS: 16:52:03 Registers: info registers vcpu 0 RAX=0000000000000031 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff840f3901 RDI=ffffffff8faf1940 RBP=ffffffff8faf1900 RSP=ffffc90002e26f60 R8 =0000000000000000 R9 =ffffffff8cecd04f R10=0000000000000000 R11=000000004153414b R12=0000000000000031 R13=0000000000000031 R14=ffffffff8faf1900 R15=dffffc0000000000 RIP=ffffffff840f3958 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 00007f728554a700 ffffffff 00c00000 GS =0000 ffff88802ca00000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7285528db8 CR3=000000004f9df000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000007369680000000000736980 XMM02=00000000007369600000000000736968 XMM03=00000000007369800000000000736960 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000003200000000 XMM06=00000061000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=001c000c000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ae03000200000121 RBX=ffff88802cb19460 RCX=ffffffff8127d0c8 RDX=dffffc0000000000 RSI=0000000000000008 RDI=ffffffff8cecb838 RBP=0000000000000001 RSP=ffffc900004e8f68 R8 =0000000000000000 R9 =ffffffff8cecb83f R10=fffffbfff19d9707 R11=0000000000000000 R12=0000000000000000 R13=0000000000000000 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff8127d100 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 00007fa72d3b7700 ffffffff 00c00000 GS =0000 ffff88802cb00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b32032000 CR3=00000000681f7000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffff000000000000ff000000000000 XMM01=ffffff00ffffffffffffffffffffffff XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffff00ffffffff XMM04=0000000000000000000000ff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 2 RAX=ae03000200000121 RBX=ffff88802cc19460 RCX=ffffffff8127d0c8 RDX=dffffc0000000000 RSI=0000000000000008 RDI=ffffffff8cecb838 RBP=0000000000000002 RSP=ffffc90000540f68 R8 =0000000000000000 R9 =ffffffff8cecb83f R10=fffffbfff19d9707 R11=0000000000000000 R12=0000000000000000 R13=0000000000000000 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff8127d100 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cc00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe0000079000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000077000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffe01f78f68 CR3=000000006acf5000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffff0000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 3 RAX=ae03000200000121 RBX=ffff88802cd19460 RCX=ffffffff8127d0c8 RDX=dffffc0000000000 RSI=0000000000000008 RDI=ffffffff8cecb838 RBP=0000000000000003 RSP=ffffc90000598f68 R8 =0000000000000000 R9 =ffffffff8cecb83f R10=fffffbfff19d9707 R11=0000000000000000 R12=0000000000000000 R13=0000000000000000 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff8127d100 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 00007f5eca4f9700 ffffffff 00c00000 GS =0000 ffff88802cd00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe00000b4000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe00000b2000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000007120d0 CR3=0000000050d1d000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000001280000000000000005 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=00000000000000000000000000000000 XMM05=00000000000001280000000000000005 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000