Starting sshd: OK syzkaller syzkaller login: [ 14.461019][ T23] kauditd_printk_skb: 59 callbacks suppressed [ 14.461031][ T23] audit: type=1400 audit(1674163924.599:72): avc: denied { transition } for pid=2934 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.465705][ T23] audit: type=1400 audit(1674163924.609:73): avc: denied { write } for pid=2934 comm="sh" path="pipe:[310]" dev="pipefs" ino=310 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 15.512721][ T2937] scp (2937) used greatest stack depth: 11856 bytes left [ 15.522286][ T2935] sshd (2935) used greatest stack depth: 11368 bytes left Warning: Permanently added '10.128.1.97' (ECDSA) to the list of known hosts. 2023/01/19 21:32:11 fuzzer started 2023/01/19 21:32:11 dialing manager at 10.128.0.163:38703 [ 22.388868][ T23] audit: type=1400 audit(1674163932.529:74): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.389672][ T3102] cgroup: Unknown subsys name 'net' [ 22.411629][ T23] audit: type=1400 audit(1674163932.529:75): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.438960][ T23] audit: type=1400 audit(1674163932.559:76): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.555776][ T3102] cgroup: Unknown subsys name 'rlimit' 2023/01/19 21:32:12 syscalls: 2806 2023/01/19 21:32:12 code coverage: enabled 2023/01/19 21:32:12 comparison tracing: enabled 2023/01/19 21:32:12 extra coverage: enabled 2023/01/19 21:32:12 delay kcov mmap: enabled 2023/01/19 21:32:12 setuid sandbox: enabled 2023/01/19 21:32:12 namespace sandbox: enabled 2023/01/19 21:32:12 Android sandbox: enabled 2023/01/19 21:32:12 fault injection: enabled 2023/01/19 21:32:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/01/19 21:32:12 net packet injection: enabled 2023/01/19 21:32:12 net device setup: enabled 2023/01/19 21:32:12 concurrency sanitizer: enabled 2023/01/19 21:32:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/01/19 21:32:12 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/01/19 21:32:12 USB emulation: /dev/raw-gadget does not exist 2023/01/19 21:32:12 hci packet injection: /dev/vhci does not exist 2023/01/19 21:32:12 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/01/19 21:32:12 802.15.4 emulation: enabled [ 22.655564][ T23] audit: type=1400 audit(1674163932.799:77): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.680565][ T23] audit: type=1400 audit(1674163932.829:78): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2023/01/19 21:32:12 suppressing KCSAN reports in functions: 'do_sys_poll' 'io_wq_worker_running' 'ext4_free_inodes_count' 'next_uptodate_page' 'ext4_dio_write_end_io' 'blk_mq_sched_dispatch_requests' 2023/01/19 21:32:12 fetching corpus: 0, signal 0/2000 (executing program) [ 22.704982][ T23] audit: type=1400 audit(1674163932.829:79): avc: denied { create } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.725549][ T23] audit: type=1400 audit(1674163932.829:80): avc: denied { write } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.745946][ T23] audit: type=1400 audit(1674163932.829:81): avc: denied { read } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/01/19 21:32:13 fetching corpus: 50, signal 23277/26574 (executing program) 2023/01/19 21:32:13 fetching corpus: 100, signal 32337/36864 (executing program) 2023/01/19 21:32:13 fetching corpus: 150, signal 38564/44230 (executing program) 2023/01/19 21:32:13 fetching corpus: 200, signal 42698/49488 (executing program) 2023/01/19 21:32:13 fetching corpus: 250, signal 46246/54078 (executing program) 2023/01/19 21:32:13 fetching corpus: 300, signal 49945/58644 (executing program) 2023/01/19 21:32:13 fetching corpus: 350, signal 53595/63053 (executing program) 2023/01/19 21:32:13 fetching corpus: 400, signal 56908/67048 (executing program) 2023/01/19 21:32:13 fetching corpus: 450, signal 58886/69861 (executing program) 2023/01/19 21:32:14 fetching corpus: 500, signal 62149/73639 (executing program) 2023/01/19 21:32:14 fetching corpus: 550, signal 64208/76372 (executing program) 2023/01/19 21:32:14 fetching corpus: 600, signal 66540/79279 (executing program) 2023/01/19 21:32:14 fetching corpus: 650, signal 69830/82787 (executing program) 2023/01/19 21:32:14 fetching corpus: 700, signal 71935/85348 (executing program) 2023/01/19 21:32:14 fetching corpus: 750, signal 74361/88039 (executing program) 2023/01/19 21:32:14 fetching corpus: 798, signal 75944/90040 (executing program) 2023/01/19 21:32:14 fetching corpus: 847, signal 77909/92316 (executing program) 2023/01/19 21:32:15 fetching corpus: 896, signal 79221/94059 (executing program) 2023/01/19 21:32:15 fetching corpus: 946, signal 81805/96600 (executing program) 2023/01/19 21:32:15 fetching corpus: 994, signal 84509/99154 (executing program) 2023/01/19 21:32:15 fetching corpus: 1044, signal 86276/101034 (executing program) 2023/01/19 21:32:15 fetching corpus: 1093, signal 87874/102740 (executing program) 2023/01/19 21:32:15 fetching corpus: 1143, signal 89580/104439 (executing program) 2023/01/19 21:32:15 fetching corpus: 1193, signal 91698/106358 (executing program) 2023/01/19 21:32:16 fetching corpus: 1243, signal 94737/108718 (executing program) 2023/01/19 21:32:16 fetching corpus: 1291, signal 96323/110196 (executing program) 2023/01/19 21:32:16 fetching corpus: 1339, signal 97898/111575 (executing program) 2023/01/19 21:32:16 fetching corpus: 1389, signal 99397/112886 (executing program) 2023/01/19 21:32:16 fetching corpus: 1439, signal 100765/114101 (executing program) 2023/01/19 21:32:16 fetching corpus: 1489, signal 102251/115297 (executing program) 2023/01/19 21:32:16 fetching corpus: 1539, signal 103309/116218 (executing program) 2023/01/19 21:32:16 fetching corpus: 1588, signal 106215/118055 (executing program) 2023/01/19 21:32:17 fetching corpus: 1636, signal 107366/118948 (executing program) 2023/01/19 21:32:17 fetching corpus: 1686, signal 109292/120149 (executing program) 2023/01/19 21:32:17 fetching corpus: 1734, signal 110320/120910 (executing program) 2023/01/19 21:32:17 fetching corpus: 1784, signal 111926/121874 (executing program) 2023/01/19 21:32:17 fetching corpus: 1834, signal 113468/122756 (executing program) 2023/01/19 21:32:17 fetching corpus: 1884, signal 114663/123457 (executing program) 2023/01/19 21:32:17 fetching corpus: 1934, signal 115522/124048 (executing program) 2023/01/19 21:32:18 fetching corpus: 1984, signal 116487/124621 (executing program) 2023/01/19 21:32:18 fetching corpus: 2034, signal 117791/125257 (executing program) 2023/01/19 21:32:18 fetching corpus: 2084, signal 119052/125874 (executing program) 2023/01/19 21:32:18 fetching corpus: 2134, signal 119975/126332 (executing program) 2023/01/19 21:32:18 fetching corpus: 2184, signal 120886/126743 (executing program) 2023/01/19 21:32:18 fetching corpus: 2234, signal 121816/127133 (executing program) 2023/01/19 21:32:18 fetching corpus: 2284, signal 122736/127502 (executing program) 2023/01/19 21:32:19 fetching corpus: 2334, signal 123782/127867 (executing program) 2023/01/19 21:32:19 fetching corpus: 2384, signal 124946/128244 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/128518 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/128569 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/128625 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/128683 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/128739 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/128797 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/128850 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/128907 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/128954 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/129005 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/129050 (executing program) [ 29.214703][ T0] ================================================================== [ 29.222784][ T0] BUG: KCSAN: data-race in tick_nohz_next_event / tick_nohz_stop_tick [ 29.231624][ T0] [ 29.233926][ T0] write to 0xffffffff85ed5170 of 4 bytes by task 0 on cpu 0: [ 29.241270][ T0] tick_nohz_stop_tick+0xa0/0x400 [ 29.246295][ T0] tick_nohz_idle_stop_tick+0x174/0x2c0 [ 29.251827][ T0] do_idle+0x18a/0x250 [ 29.255879][ T0] cpu_startup_entry+0x15/0x20 [ 29.260619][ T0] rest_init+0xe8/0xf0 [ 29.264669][ T0] arch_call_rest_init+0x5/0x10 [ 29.269508][ T0] start_kernel+0x59e/0x630 [ 29.273992][ T0] secondary_startup_64_no_verify+0xcf/0xdb [ 29.279865][ T0] [ 29.282170][ T0] read to 0xffffffff85ed5170 of 4 bytes by task 0 on cpu 1: [ 29.289433][ T0] tick_nohz_next_event+0x1ee/0x2c0 [ 29.294622][ T0] tick_nohz_get_sleep_length+0x15b/0x250 [ 29.300330][ T0] menu_select+0x347/0x1010 [ 29.304810][ T0] cpuidle_select+0x3d/0x50 [ 29.309299][ T0] do_idle+0x173/0x250 [ 29.313344][ T0] cpu_startup_entry+0x15/0x20 [ 29.318086][ T0] start_secondary+0x78/0x80 [ 29.322658][ T0] secondary_startup_64_no_verify+0xcf/0xdb [ 29.328531][ T0] [ 29.330829][ T0] value changed: 0x00000000 -> 0xffffffff [ 29.336523][ T0] [ 29.338823][ T0] Reported by Kernel Concurrency Sanitizer on: [ 29.344948][ T0] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.2.0-rc4-syzkaller-00069-g081edded9b38-dirty #0 [ 29.355072][ T0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/129111 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/129157 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/129207 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/129247 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/129277 (executing program) 2023/01/19 21:32:19 fetching corpus: 2424, signal 125828/129277 (executing program) [ 29.365103][ T0] ================================================================== 2023/01/19 21:32:21 starting 6 fuzzer processes 21:32:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)="c7e7bf060739f94172302e24d2eb0590c9b1fda24a5be201a0e7d46a3afa43adcbb3bccf87bb159d", 0x28}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@hopopts_2292={{0x18, 0x29, 0x5}}], 0x18}}], 0x2, 0x0) 21:32:21 executing program 5: set_mempolicy(0x5, &(0x7f0000000080)=0x3, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x45}, {0x6}]}) 21:32:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x3b}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xa3, &(0x7f00000002c0)=""/163, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:32:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:32:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x44, 0x0, 0x0, "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", 0x0, "00902c31f5a714453bc167430e1edf2f39ec9cd1"}}, @CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "d45e178f55e3b8c0"}, 0x3}}]}, 0x14c}}, 0x0) 21:32:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) [ 31.405864][ T23] audit: type=1400 audit(1674163941.539:82): avc: denied { execmem } for pid=3109 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 31.516526][ T23] audit: type=1400 audit(1674163941.659:83): avc: denied { read } for pid=3120 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.588973][ T23] audit: type=1400 audit(1674163941.659:84): avc: denied { open } for pid=3120 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.612399][ T23] audit: type=1400 audit(1674163941.659:85): avc: denied { mounton } for pid=3120 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 31.633948][ T23] audit: type=1400 audit(1674163941.659:86): avc: denied { module_request } for pid=3120 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 31.655765][ T23] audit: type=1400 audit(1674163941.699:87): avc: denied { sys_module } for pid=3120 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 31.866416][ T3120] chnl_net:caif_netlink_parms(): no params data found [ 31.966986][ T3122] chnl_net:caif_netlink_parms(): no params data found [ 31.999722][ T3120] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.006901][ T3120] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.014438][ T3120] device bridge_slave_0 entered promiscuous mode [ 32.026461][ T3120] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.033574][ T3120] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.041240][ T3120] device bridge_slave_1 entered promiscuous mode [ 32.081340][ T3123] chnl_net:caif_netlink_parms(): no params data found [ 32.096796][ T3120] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.128461][ T3120] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.168370][ T3122] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.175483][ T3122] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.182949][ T3122] device bridge_slave_0 entered promiscuous mode [ 32.216613][ T3122] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.223662][ T3122] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.231249][ T3122] device bridge_slave_1 entered promiscuous mode [ 32.238866][ T3120] team0: Port device team_slave_0 added [ 32.248323][ T3129] chnl_net:caif_netlink_parms(): no params data found [ 32.265654][ T3126] chnl_net:caif_netlink_parms(): no params data found [ 32.274439][ T3120] team0: Port device team_slave_1 added [ 32.282652][ T3123] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.289842][ T3123] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.297567][ T3123] device bridge_slave_0 entered promiscuous mode [ 32.319576][ T3123] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.326790][ T3123] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.334251][ T3123] device bridge_slave_1 entered promiscuous mode [ 32.341912][ T3122] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.357436][ T3146] chnl_net:caif_netlink_parms(): no params data found [ 32.374355][ T3122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.388167][ T3120] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.395122][ T3120] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.421018][ T3120] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.450725][ T3120] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.457808][ T3120] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.485764][ T3120] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.503055][ T3123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.516253][ T3122] team0: Port device team_slave_0 added [ 32.538242][ T3123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.552069][ T3122] team0: Port device team_slave_1 added [ 32.566839][ T3129] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.573872][ T3129] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.581740][ T3129] device bridge_slave_0 entered promiscuous mode [ 32.605838][ T3122] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.612825][ T3122] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.638793][ T3122] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.651653][ T3129] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.658718][ T3129] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.666350][ T3129] device bridge_slave_1 entered promiscuous mode [ 32.673529][ T3123] team0: Port device team_slave_0 added [ 32.679289][ T3126] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.686338][ T3126] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.694012][ T3126] device bridge_slave_0 entered promiscuous mode [ 32.709980][ T3122] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.716924][ T3122] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.742869][ T3122] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.761498][ T3123] team0: Port device team_slave_1 added [ 32.767168][ T3126] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.774206][ T3126] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.781831][ T3126] device bridge_slave_1 entered promiscuous mode [ 32.790232][ T3120] device hsr_slave_0 entered promiscuous mode [ 32.796734][ T3120] device hsr_slave_1 entered promiscuous mode [ 32.830040][ T3146] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.837168][ T3146] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.844958][ T3146] device bridge_slave_0 entered promiscuous mode [ 32.852600][ T3129] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.862011][ T3123] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.869027][ T3123] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.895011][ T3123] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.919000][ T3126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.929002][ T3126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.938289][ T3146] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.945413][ T3146] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.952925][ T3146] device bridge_slave_1 entered promiscuous mode [ 32.960280][ T3129] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.969525][ T3123] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.976482][ T3123] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.003339][ T3123] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.016069][ T3122] device hsr_slave_0 entered promiscuous mode [ 33.023322][ T3122] device hsr_slave_1 entered promiscuous mode [ 33.029675][ T3122] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.037543][ T3122] Cannot create hsr debugfs directory [ 33.076415][ T3146] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.086441][ T3146] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.112396][ T3126] team0: Port device team_slave_0 added [ 33.122250][ T3129] team0: Port device team_slave_0 added [ 33.131605][ T3123] device hsr_slave_0 entered promiscuous mode [ 33.138103][ T3123] device hsr_slave_1 entered promiscuous mode [ 33.144412][ T3123] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.152683][ T3123] Cannot create hsr debugfs directory [ 33.158618][ T3126] team0: Port device team_slave_1 added [ 33.169418][ T3129] team0: Port device team_slave_1 added [ 33.189320][ T3146] team0: Port device team_slave_0 added [ 33.204797][ T3126] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.211760][ T3126] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.237728][ T3126] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.248978][ T3146] team0: Port device team_slave_1 added [ 33.270491][ T3126] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.277542][ T3126] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.303472][ T3126] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.318573][ T3129] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.325595][ T3129] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.351568][ T3129] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.375807][ T3129] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.382749][ T3129] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.408708][ T3129] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.434820][ T3146] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.441783][ T3146] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.467775][ T3146] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.479334][ T3146] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.486295][ T3146] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.512188][ T3146] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.538184][ T3126] device hsr_slave_0 entered promiscuous mode [ 33.546153][ T3126] device hsr_slave_1 entered promiscuous mode [ 33.552549][ T3126] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.560250][ T3126] Cannot create hsr debugfs directory [ 33.619691][ T3129] device hsr_slave_0 entered promiscuous mode [ 33.635118][ T3129] device hsr_slave_1 entered promiscuous mode [ 33.642187][ T3129] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.651112][ T3129] Cannot create hsr debugfs directory [ 33.676285][ T3146] device hsr_slave_0 entered promiscuous mode [ 33.682998][ T3146] device hsr_slave_1 entered promiscuous mode [ 33.690921][ T3146] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.698567][ T3146] Cannot create hsr debugfs directory [ 33.726633][ T3122] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 33.735578][ T3122] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 33.750937][ T3122] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 33.767294][ T3122] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 33.794813][ T3120] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 33.810295][ T3120] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 33.818886][ T3120] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 33.828693][ T3120] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 33.860429][ T3123] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 33.869179][ T3123] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 33.877640][ T3123] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 33.892574][ T3123] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 33.921167][ T3126] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 33.937350][ T3126] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 33.953348][ T3126] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 33.971090][ T3126] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 33.984228][ T3122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.993232][ T3129] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 34.002642][ T3129] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 34.009964][ T23] audit: type=1400 audit(1674163944.159:88): avc: denied { remove_name } for pid=2718 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.032416][ T23] audit: type=1400 audit(1674163944.159:89): avc: denied { rename } for pid=2718 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.060357][ T3122] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.080740][ T3129] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 34.095254][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.102723][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.110664][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.119335][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.127762][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.134809][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.147854][ T3146] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 34.160290][ T3120] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.167527][ T3129] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 34.195452][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.203297][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.212202][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.220618][ T3218] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.227652][ T3218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.235541][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.244109][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.252845][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 34.261526][ T3146] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 34.274302][ T3120] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.300898][ T3120] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.311323][ T3120] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.322782][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 34.330703][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.338324][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.345895][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 34.354462][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.363109][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.371264][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.378392][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.386197][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.394621][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.402910][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.409953][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.417671][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.426368][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.434989][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 34.443652][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 34.452284][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.460466][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.468748][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.477253][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.487663][ T3122] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.498008][ T3122] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.510049][ T3146] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 34.518236][ T3146] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 34.538258][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.546406][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 34.554632][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 34.562237][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.570725][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.579442][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.587748][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.596131][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 34.605371][ T3123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.628152][ T3129] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.647065][ T3123] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.660831][ T3126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.669572][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.677300][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.689989][ T3129] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.706721][ T3126] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.714613][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.722263][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.730129][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.738658][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.746951][ T3224] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.753979][ T3224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.761753][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.770262][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.778611][ T3224] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.785647][ T3224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.793317][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.801078][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.808621][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 34.816084][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 34.842408][ T3122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.850166][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.858165][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.866905][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.875327][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.882371][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.890015][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.898529][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.906976][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.914029][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.921675][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.930192][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.938870][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 34.947670][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 34.956344][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.965093][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.973657][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 34.982272][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 34.989768][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 34.997205][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.005837][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.014048][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.022633][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.030597][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.038605][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.049150][ T3123] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.060797][ T3123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.077566][ T3120] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.092518][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.100966][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.109342][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.117539][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.125721][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.133891][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.142121][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.150671][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.158949][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.166092][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.173756][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.182357][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.190776][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.197820][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.205486][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.213927][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.222584][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.231093][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 35.240293][ T3129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.256690][ T3146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.270254][ T3126] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 35.280755][ T3126] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.291905][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.300149][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 35.309358][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.318043][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.326330][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.334555][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.342788][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.352150][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.360060][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.372674][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.381234][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.395563][ T3146] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.402491][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.411177][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.454552][ T3123] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.477495][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.486070][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.494357][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.501468][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.509232][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.517694][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.525926][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.532997][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.540788][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.549338][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 35.557996][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 35.566571][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.573910][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.581282][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.589897][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.598247][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.606464][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.614699][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.634665][ T3146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.663375][ T3129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.674028][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.681875][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.690363][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.698948][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.707511][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.715612][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.724132][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.731553][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.739066][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.747137][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.757738][ T3120] device veth0_vlan entered promiscuous mode [ 35.764520][ T3122] device veth0_vlan entered promiscuous mode [ 35.775684][ T3126] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.783031][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.791246][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.807806][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.819964][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.828084][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.835591][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.846194][ T3120] device veth1_vlan entered promiscuous mode [ 35.854808][ T3122] device veth1_vlan entered promiscuous mode [ 35.866294][ T3146] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.873623][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 35.881826][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 35.889805][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.897560][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.921069][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 35.930730][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 35.939048][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.948906][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.957880][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.966552][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.981643][ T3123] device veth0_vlan entered promiscuous mode [ 35.990421][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.999326][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.015931][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.024161][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.033897][ T3120] device veth0_macvtap entered promiscuous mode [ 36.041030][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.049091][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.056863][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.065483][ T3123] device veth1_vlan entered promiscuous mode [ 36.076350][ T3122] device veth0_macvtap entered promiscuous mode [ 36.087035][ T3120] device veth1_macvtap entered promiscuous mode [ 36.094826][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.106907][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.119573][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.127634][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.137411][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.145917][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.154373][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.169290][ T3120] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.177923][ T3120] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.192511][ T3129] device veth0_vlan entered promiscuous mode [ 36.206035][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.216443][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.225369][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.233841][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.242691][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.250906][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.259428][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.268224][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.276970][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.284676][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.292826][ T3122] device veth1_macvtap entered promiscuous mode [ 36.301240][ T3120] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.310086][ T3120] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.318845][ T3120] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.327566][ T3120] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.338314][ T3123] device veth0_macvtap entered promiscuous mode [ 36.348463][ T3129] device veth1_vlan entered promiscuous mode [ 36.358422][ T3122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.368964][ T3122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.381152][ T3122] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.395452][ T3123] device veth1_macvtap entered promiscuous mode [ 36.402743][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.410935][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.419137][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.427259][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.435782][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.450203][ T3126] device veth0_vlan entered promiscuous mode [ 36.460461][ T3126] device veth1_vlan entered promiscuous mode [ 36.473868][ T3146] device veth0_vlan entered promiscuous mode [ 36.481568][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 36.489684][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.497914][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.506434][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.514255][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.522419][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.531355][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.539233][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.546941][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.554450][ T3220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.569313][ T3129] device veth0_macvtap entered promiscuous mode [ 36.570724][ T23] audit: type=1400 audit(1674163946.709:90): avc: denied { mounton } for pid=3120 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 36.580368][ T3123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.609069][ T3123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.618956][ T3123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.629376][ T3123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.642335][ T3123] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.652649][ T3146] device veth1_vlan entered promiscuous mode [ 36.660503][ T3122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.671021][ T3122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.682111][ T3122] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.691210][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 36.699286][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.708409][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.717031][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.725999][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.734537][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.743371][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.752947][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.762983][ T3129] device veth1_macvtap entered promiscuous mode [ 36.770677][ T3123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 21:32:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)="c7e7bf060739f94172302e24d2eb0590c9b1fda24a5be201a0e7d46a3afa43adcbb3bccf87bb159d", 0x28}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@hopopts_2292={{0x18, 0x29, 0x5}}], 0x18}}], 0x2, 0x0) 21:32:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)="c7e7bf060739f94172302e24d2eb0590c9b1fda24a5be201a0e7d46a3afa43adcbb3bccf87bb159d", 0x28}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@hopopts_2292={{0x18, 0x29, 0x5}}], 0x18}}], 0x2, 0x0) [ 36.781137][ T3123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.790993][ T3123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.801533][ T3123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.810835][ T23] audit: type=1400 audit(1674163946.919:91): avc: denied { read write } for pid=3120 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.819836][ T3123] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.835575][ T23] audit: type=1400 audit(1674163946.919:92): avc: denied { open } for pid=3120 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.862266][ T3146] device veth0_macvtap entered promiscuous mode [ 36.866821][ T23] audit: type=1400 audit(1674163946.919:93): avc: denied { ioctl } for pid=3120 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.888350][ T3146] device veth1_macvtap entered promiscuous mode [ 36.898509][ T23] audit: type=1400 audit(1674163946.919:94): avc: denied { create } for pid=3299 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 21:32:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)="c7e7bf060739f94172302e24d2eb0590c9b1fda24a5be201a0e7d46a3afa43adcbb3bccf87bb159d", 0x28}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@hopopts_2292={{0x18, 0x29, 0x5}}], 0x18}}], 0x2, 0x0) 21:32:27 executing program 0: r0 = io_uring_setup(0x4c5f, &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x10000000) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}], 0x8) [ 36.910809][ T3146] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.924497][ T23] audit: type=1400 audit(1674163946.919:95): avc: denied { connect } for pid=3299 comm="syz-executor.0" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 36.924517][ T23] audit: type=1400 audit(1674163946.919:96): avc: denied { write } for pid=3299 comm="syz-executor.0" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 36.934937][ T3146] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.981900][ T23] audit: type=1400 audit(1674163947.119:97): avc: denied { create } for pid=3307 comm="syz-executor.0" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 36.987646][ T3146] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.987665][ T3146] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:32:27 executing program 0: r0 = io_uring_setup(0x4c5f, &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x10000000) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}], 0x8) [ 36.987675][ T3146] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.987686][ T3146] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.992612][ T3146] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.015683][ T23] audit: type=1400 audit(1674163947.159:98): avc: denied { map } for pid=3307 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 21:32:27 executing program 0: r0 = io_uring_setup(0x4c5f, &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x10000000) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}], 0x8) 21:32:27 executing program 0: r0 = io_uring_setup(0x4c5f, &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x10000000) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}], 0x8) [ 37.049377][ T3126] device veth0_macvtap entered promiscuous mode [ 37.049618][ T23] audit: type=1400 audit(1674163947.159:99): avc: denied { read } for pid=3307 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 37.064016][ T3126] device veth1_macvtap entered promiscuous mode [ 37.122593][ T3122] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.131455][ T3122] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.140156][ T3122] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.148838][ T3122] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.159425][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 37.167909][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.175851][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.183678][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.192183][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.200710][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.208986][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.217436][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.225300][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.233636][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.242271][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.250677][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.259198][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.269881][ T3123] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.278693][ T3123] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.287404][ T3123] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.296256][ T3123] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.307116][ T3146] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.317829][ T3146] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.327765][ T3146] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.338248][ T3146] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.348092][ T3146] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.358571][ T3146] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.369598][ T3146] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.379518][ T3146] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.388404][ T3146] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.397131][ T3146] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.405833][ T3146] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.419486][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.427515][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.435463][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.443983][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.464486][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.474999][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.484863][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.495311][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.505134][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.515554][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.525361][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.535897][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.546819][ T3126] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.556322][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.566900][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.576703][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.587134][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.596998][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.607436][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.617310][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.627888][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.639023][ T3126] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.647518][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.657968][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.667769][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.678302][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.688179][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.698600][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.708520][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.719118][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.728930][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.739346][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.750390][ T3129] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.759174][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.769649][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.779671][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.790110][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.800016][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.810457][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.820276][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.831628][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.841484][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.851894][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.863287][ T3129] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.870916][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.879655][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.888415][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.897066][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.905732][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.914205][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.922997][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.931536][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.966079][ T3129] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.974833][ T3129] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.983534][ T3129] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.992331][ T3129] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.006337][ T3126] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.015112][ T3126] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.023866][ T3126] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.032553][ T3126] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 21:32:28 executing program 5: set_mempolicy(0x5, &(0x7f0000000080)=0x3, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x45}, {0x6}]}) 21:32:28 executing program 0: r0 = io_uring_setup(0x4c5f, &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x10000000) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}], 0x8) 21:32:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x3b}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xa3, &(0x7f00000002c0)=""/163, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:32:28 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 21:32:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x44, 0x0, 0x0, "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", 0x0, "00902c31f5a714453bc167430e1edf2f39ec9cd1"}}, @CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "d45e178f55e3b8c0"}, 0x3}}]}, 0x14c}}, 0x0) 21:32:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 38.149575][ T3331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3331 comm=syz-executor.2 21:32:28 executing program 0: r0 = io_uring_setup(0x4c5f, &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x10000000) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}], 0x8) 21:32:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x3b}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xa3, &(0x7f00000002c0)=""/163, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:32:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x44, 0x0, 0x0, "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", 0x0, "00902c31f5a714453bc167430e1edf2f39ec9cd1"}}, @CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "d45e178f55e3b8c0"}, 0x3}}]}, 0x14c}}, 0x0) 21:32:28 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 21:32:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x44, 0x0, 0x0, "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", 0x0, "00902c31f5a714453bc167430e1edf2f39ec9cd1"}}, @CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "d45e178f55e3b8c0"}, 0x3}}]}, 0x14c}}, 0x0) 21:32:28 executing program 0: r0 = io_uring_setup(0x4c5f, &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x10000000) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}], 0x8) 21:32:28 executing program 5: set_mempolicy(0x5, &(0x7f0000000080)=0x3, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x45}, {0x6}]}) 21:32:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x3b}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xa3, &(0x7f00000002c0)=""/163, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:32:28 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 21:32:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 38.226816][ T3343] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3343 comm=syz-executor.2 21:32:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:32:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:32:28 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 21:32:28 executing program 5: set_mempolicy(0x5, &(0x7f0000000080)=0x3, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x45}, {0x6}]}) 21:32:28 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) [ 38.309545][ T3364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3364 comm=syz-executor.2 [ 38.323859][ T3362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3362 comm=syz-executor.3 21:32:28 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 21:32:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:32:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:32:28 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) [ 38.359393][ T3367] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3367 comm=syz-executor.0 21:32:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 38.411789][ T3378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3378 comm=syz-executor.3 [ 38.433104][ T3382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3382 comm=syz-executor.2 21:32:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @buffer={0x82, 0x0, 0x0}, &(0x7f0000000200)="94f0ffffff7f", 0x0, 0x0, 0x0, 0x0, 0x0}) 21:32:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:32:28 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 21:32:28 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$cgroup2(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8000, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 21:32:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000024000b0f0000008bfbbc6e0060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001007072696f000000001800020004"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x84, 0x0, 0x1, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0xe5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x69bae4f4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xe93d}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xa2fc}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008890) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x8}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xf, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000006000000000000010002c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffb}, 0x45) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:32:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @buffer={0x82, 0x0, 0x0}, &(0x7f0000000200)="94f0ffffff7f", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 38.451584][ T3385] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3385 comm=syz-executor.0 21:32:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x3f0, 0x1f8, 0x1f8, 0x0, 0x1f8, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@multicast}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'lo\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@local, @multicast1, @multicast2}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) 21:32:28 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x3, &(0x7f0000001980)="3e9665daacaac3eb0add2f703c6d9684", 0x10) 21:32:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @buffer={0x82, 0x0, 0x0}, &(0x7f0000000200)="94f0ffffff7f", 0x0, 0x0, 0x0, 0x0, 0x0}) 21:32:28 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x400, 0x108, 0x108, 0x0, 0x318, 0x318, 0x318, 0x4, 0x0, {[{{@arp={@multicast2, @remote, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'ip_vti0\x00'}, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x7fff, 'syz0\x00'}}}, {{@uncond, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@uncond, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x2}}}}, 0x450) 21:32:28 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x3, &(0x7f0000001980)="3e9665daacaac3eb0add2f703c6d9684", 0x10) 21:32:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x0, 0x0) r1 = dup(r0) open(&(0x7f0000000100)='./bus\x00', 0x48542, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 21:32:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x3f0, 0x1f8, 0x1f8, 0x0, 0x1f8, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@multicast}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'lo\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@local, @multicast1, @multicast2}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) [ 38.526226][ T3395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3395 comm=syz-executor.3 [ 38.554819][ T3399] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3399 comm=syz-executor.0 21:32:28 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x400, 0x108, 0x108, 0x0, 0x318, 0x318, 0x318, 0x4, 0x0, {[{{@arp={@multicast2, @remote, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'ip_vti0\x00'}, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x7fff, 'syz0\x00'}}}, {{@uncond, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@uncond, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x2}}}}, 0x450) 21:32:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @buffer={0x82, 0x0, 0x0}, &(0x7f0000000200)="94f0ffffff7f", 0x0, 0x0, 0x0, 0x0, 0x0}) 21:32:28 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x3, &(0x7f0000001980)="3e9665daacaac3eb0add2f703c6d9684", 0x10) 21:32:28 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x48, 0x14, 0x1, 0x0, 0x0, {0x2, 0x88}, [@INET_DIAG_REQ_BYTECODE={0x31, 0x1, "fd2929bf64daedcfeb488e63463d8554add1da6e87f783980a4d1634c6450559443c29240956451306cf1fb0e1"}]}, 0x48}}, 0x0) 21:32:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x3f0, 0x1f8, 0x1f8, 0x0, 0x1f8, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@multicast}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'lo\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@local, @multicast1, @multicast2}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) 21:32:28 executing program 5: setreuid(0xee01, 0xee01) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004b40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[@cred={{0x1c}}], 0x20}}], 0x2, 0x0) 21:32:28 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x400, 0x108, 0x108, 0x0, 0x318, 0x318, 0x318, 0x4, 0x0, {[{{@arp={@multicast2, @remote, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'ip_vti0\x00'}, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x7fff, 'syz0\x00'}}}, {{@uncond, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@uncond, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x2}}}}, 0x450) 21:32:28 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x3, &(0x7f0000001980)="3e9665daacaac3eb0add2f703c6d9684", 0x10) 21:32:28 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x48, 0x14, 0x1, 0x0, 0x0, {0x2, 0x88}, [@INET_DIAG_REQ_BYTECODE={0x31, 0x1, "fd2929bf64daedcfeb488e63463d8554add1da6e87f783980a4d1634c6450559443c29240956451306cf1fb0e1"}]}, 0x48}}, 0x0) 21:32:28 executing program 5: setreuid(0xee01, 0xee01) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004b40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[@cred={{0x1c}}], 0x20}}], 0x2, 0x0)