last executing test programs: 1.922452765s ago: executing program 4 (id=22): unshare(0x20000400) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000240)=0x11, 0x4) 1.809757995s ago: executing program 4 (id=23): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000001c0)='sched_process_wait\x00'}, 0x10) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r0}, 0x8) close(r1) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(r3, &(0x7f00000024c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x101, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a800000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r5 = socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) unshare(0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000180)=[{r6}, {r5}], 0x2, &(0x7f0000000100)={r8}, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x30}}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{r2}, 0x0, &(0x7f0000000480)='%-010d \x00'}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000007f00850000006100000085000000d000000195000000000004"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x0, 0xe80, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.809558055s ago: executing program 0 (id=24): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x4000, &(0x7f0000000380)={[{@test_dummy_encryption}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@stripe={'stripe', 0x3d, 0x7}}, {@commit={'commit', 0x3d, 0x5}}, {@orlov}, {@barrier_val={'barrier', 0x3d, 0x5}}, {@max_batch_time}, {@data_err_abort}]}, 0xd, 0x5e8, &(0x7f00000030c0)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUeNa2Y7U7rtbMuWdqd0P59k6cy8Hd53uv32vX19bzaAtjWY/lOJ2BsR00lEfzK/WNYZWeHgwvPu/f3J6fSRRLX6xp9JJNmx/PlJ9rUvO7knIn7+KYk9HSvrnZm7cn58amrycrY/PHthenhm7srBcxfGz06enbw4+tLosaNHjh4bObSu67pacOzk9fc/7P9s7O3vvvknGfn+t7Ekjser2ROXXsdGGYzB2vckWVnUd2yjKytJR/ZzsvQlTjpLDIim5K9fV0Q8Ff3REfdfvP749LVSgwM2VTWJqAJtKpH/0KbyfkD+3n75++BKKb0SoBXunlgYAFiZ/50LY4PRUxsb2HkviaXDOklErG9krt6uiLh9a+z6mVtj12OTxuGAYvPXIuLpovxPavk/ED0xUMv/Sl3+p/2CU9nX9Pjr66x/+VCx/IfWWcj/nlXzPxrk/ztL8v/dddY/eH/zvd66/O9d7yUBAAAAAABA27p5IiJeLPr7f2Vx/k8UzP/pi4jjG1D/4LL9lX//r9zZgGqAAndPRLxSOP+3ks/+HejIth6rzQfoSs6cm5o8FBGPR8SB6NqR7o+sUsfBz/d83ahsMJv/lz/S+m9ncwGzOO507qg/Z2J8dvxhrxuIuHst4pnC+b/JYvufFLT/6e+D6QesY8/zN041Kls7/4HNUv02Yn9h+3//rhXJ6vfnGK71B4bzXsFKz378xQ+N6l9v/rvFBDy8tP3fuXr+DyRL79cz03wdh+c6q43K1tv/707erN1ypjs79tH47OzlkYju5GRHerTu+GjzMcOjoKvJ5+f5kOdLmv8Hnlt9/K+o/98bEfPL/u/kr/o1xbkn/+v7vVE8+v9QnjT/J5pq/5vfGL0x8GOj+h+s/T9Sa+sPZEeM/8GCr/I07a4/XpCOnUVFrY4XAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALaDSkTsiqQytLhdqQwNRfRFxBOxszJ1aWb2hTOXPrg4kZbVPv+/kn/Sb//CfpJ//v/Akv3RZfuHI2J3RHzZ0VvbHzp9aWqi7IsHAAAAAAAAAAAAAAAAAACALaKvwfr/1B8dZUcHbLrOsgMASlOQ/7+UEQfQetp/aF/yH9qX/If2Jf+hfcl/aF/yH9pX8/n/b3VTAgFaTvsPAAAAAADbyu59N39NImL+5d7aI9WdlXWVGhmw2SplBwCUpulb/OgUwLZh6g+0L805kKxR3tPwpLXOXM306Yc4GQAAAAAAAAAAAADazv691v9Du7L+H9pX0+v/gW0jX/+/r+Q4gNbzHh+INVbyF67/X/MsAAAAAAAAAAAAAGAjzcxdOT8+NTV52cZbWyOMVm5Uq9Wr6U/BVonnEd/Ip8JvlXiWbeRr/R7srPJ+JwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPX+DwAA//80cybK") mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) 1.151840657s ago: executing program 0 (id=27): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010400000000000000000100000008000240000000020900010073797a3000000000140000001100"], 0x50}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="140000001000009006000000000000000000000a2c0000000b0a01040000000000000000010000000900020073797a31000000000900010073797a30"], 0x21c}}, 0x0) 1.093902402s ago: executing program 0 (id=28): sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0xfffffecc) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/240, 0xf0}], 0x1, 0x2, 0x0) 1.086453842s ago: executing program 2 (id=29): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000bc0)=ANY=[@ANYRES32, @ANYBLOB="1400060006000000000000f000000000000000ee07000200ac1414aa08000100ac1414aa080004007f00000108000400e00000021400030076657468315f746f5f626f6e6400000008000800000300000800080030000000"], 0x70}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x20040800}, 0x24004000) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="70000000140009050000000000000000020100ff", @ANYRES32=r3, @ANYBLOB="1400060006000000000000f0000000000000000008000200ac1414aa08000100ac1414aa080004007f00"], 0x70}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000d80)=@ipv4_newaddr={0x54, 0x14, 0x509, 0x0, 0x0, {0x2, 0x1, 0x0, 0xff, r6}, [@IFA_LOCAL={0x8, 0x2, @dev}, @IFA_ADDRESS={0x8, 0x1, @local}, @IFA_BROADCAST={0x8, 0x4, @loopback}, @IFA_BROADCAST={0x8, 0x4, @multicast2}, @IFA_LABEL={0x14, 0x3, 'veth1_to_bond\x00'}, @IFA_FLAGS={0x8, 0x8, 0x300}]}, 0x54}}, 0x0) 1.031559047s ago: executing program 2 (id=30): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000300), 0x1d) sendmsg$can_bcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b0a2a7cf704005cd"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x6, 0x0, 0x0, {0x0, 0xea60}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "6f8f1b7e3e806009"}}, 0x48}}, 0x0) 990.053051ms ago: executing program 0 (id=31): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vxcan1\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000000300)={0x1d, r2}, 0x1d) sendmsg$can_bcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b0a2a7cf704005cd"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x6, 0x0, 0x0, {0x0, 0xea60}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "6f8f1b7e3e806009"}}, 0x48}}, 0x0) 989.85474ms ago: executing program 2 (id=32): socket$packet(0x11, 0x0, 0x300) socket$nl_netfilter(0x10, 0x3, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x27) socketpair$unix(0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x314}], 0x1, 0x0, 0x0, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0xc0109207, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, r3, 0x1, 0x0, 0x0, {0x3}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) 989.75304ms ago: executing program 0 (id=33): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000580)=""/273, 0x111, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 944.732494ms ago: executing program 4 (id=34): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000240)=@gcm_128={{0x303, 0x38}, '\x00', "e20000000000000010000000002000", '\x00', "ec5134428d5d00"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x29, 0x4a, 0x0, 0x900) 930.590145ms ago: executing program 4 (id=35): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) set_tid_address(0x0) 878.00219ms ago: executing program 0 (id=36): write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, 0x0, 0x0) mlockall(0x1) connect$inet(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 877.45753ms ago: executing program 4 (id=39): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000480)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000580)=ANY=[@ANYBLOB="00020000", @ANYRES16=r1, @ANYBLOB="010000000000fcdbdf253b00000008000300", @ANYRES32=r2, @ANYBLOB="e201330080000000ffffffffffff0802110000000b605fcc36fc0000000000000000000064002000000004060000000000000602000005040000006825030000002a01003c04010008012d1a0000000000000000000000000000000000000000000000000000710700000000000000dd88", @ANYRESHEX=r2], 0x200}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb0}, [@ldst={0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x0, 0x0, &(0x7f0000000400)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xf) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xfeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0x0, 0x0, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x0, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x303e0c65, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r3) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$SIOCSIFHWADDR(r3, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="d0772e4cad93"}) socket$netlink(0x10, 0x3, 0x0) socket$igmp6(0xa, 0x3, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_IP6TABLES={0x5}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x44}}, 0x0) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r5, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000014020100000000400000000025000000"], 0x14}}, 0x0) 870ms ago: executing program 3 (id=41): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140), 0xe9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) write$binfmt_misc(r0, 0x0, 0xfdef) 809.911675ms ago: executing program 3 (id=42): setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x83}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111b5000000000085100000020000008500000000000000950000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) ioctl$SIOCSIFHWADDR(r0, 0x89f1, &(0x7f0000000900)={'ip6tnl0\x00', @random="0600002000"}) 809.746335ms ago: executing program 3 (id=43): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'virt_wifi0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="a800000010000100"/20, @ANYRES32=r2, @ANYBLOB="000000000000000088001680840001800c0003"], 0xa8}}, 0x0) 809.619785ms ago: executing program 3 (id=44): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000004c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @printk={@s}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x14, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 806.011465ms ago: executing program 4 (id=45): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001000000000071273fa79d93014b8e3381b6"], 0xfdef) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x39000, 0x0) splice(r4, 0x0, r2, 0x0, 0x408cd, 0x0) splice(r4, &(0x7f0000000040)=0x6a, r3, &(0x7f00000000c0)=0x100000000, 0x7fffffffffffffff, 0xa) connect$unix(r5, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x16, 0x4, 0x4, 0x1, 0x0, r4, 0x0, '\x00', 0x0, r5}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r6, &(0x7f0000000380)}, 0x20) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r7) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000d80)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfffffe3e) connect$unix(0xffffffffffffffff, 0x0, 0x0) r8 = socket$unix(0x1, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r8, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x7c}}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r9, 0xf, 0x0, 0x0, 0x0, 0x0, 0xb08e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x88}, 0x90) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000100)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r10, 0x5, 0xb68, 0x29, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1100}, 0x48) 791.402417ms ago: executing program 1 (id=46): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x94}]}, 0x10) 725.957812ms ago: executing program 1 (id=47): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x48, 0x10, 0x401, 0x6000, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @local}, @IFLA_IPTUN_ENCAP_SPORT={0x6}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x48}}, 0x0) 725.766042ms ago: executing program 1 (id=48): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00'}, 0x90) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000540)={0x0, 0x30000, &(0x7f0000000500)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x70bd2b, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x2c}}, 0x0) 706.596553ms ago: executing program 1 (id=49): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @mss, @timestamp, @timestamp, @window, @timestamp, @window, @sack_perm], 0x8) 698.474974ms ago: executing program 1 (id=50): socket(0x0, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="8500000000b93105abb9730000000000000000"], 0x0, 0x9, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) socket$netlink(0x10, 0x3, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000015c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xeffffdff, 0x0, [{0x0, 0x10}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x81}, {0x0, 0xfc}, {}, {0x7}, {}, {}, {0x1c}]}}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/4096) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r3) 629.942939ms ago: executing program 3 (id=51): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'virt_wifi0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="a800000010000100"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000880016"], 0xa8}}, 0x0) 629.75165ms ago: executing program 3 (id=52): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000c00000000000000008500000007000000040000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005f"], 0x3}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x0) 160.622577ms ago: executing program 2 (id=53): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x80000000000008, &(0x7f0000000180)="0f", 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0x1, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100), 0x1000a) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f00000000c0)='7', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000200)=""/49, &(0x7f0000000080)=0x31) 148.275529ms ago: executing program 2 (id=54): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000200)=[{}, {0x74}]}, 0x10) 85.999213ms ago: executing program 2 (id=55): poll(&(0x7f0000000180)=[{}], 0x1, 0xf49) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 0s ago: executing program 1 (id=56): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000bc0)=ANY=[@ANYRES32, @ANYBLOB="1400060006000000000000f000000000000000ee07000200ac1414aa08000100ac1414aa080004007f00000108000400e00000021400030076657468315f746f5f626f6e6400000008000800000300000800080030000000"], 0x70}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x20040800}, 0x24004000) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="70000000140009050000000000000000020100ff", @ANYRES32=r3, @ANYBLOB="1400060006000000000000f0000000000000000008000200ac1414aa08000100ac1414aa080004007f00"], 0x70}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000d80)=@ipv4_newaddr={0x54, 0x14, 0x509, 0x0, 0x0, {0x2, 0x1, 0x0, 0xff, r6}, [@IFA_LOCAL={0x8, 0x2, @dev}, @IFA_ADDRESS={0x8, 0x1, @local}, @IFA_BROADCAST={0x8, 0x4, @loopback}, @IFA_BROADCAST={0x8, 0x4, @multicast2}, @IFA_LABEL={0x14, 0x3, 'veth1_to_bond\x00'}, @IFA_FLAGS={0x8, 0x8, 0x300}]}, 0x54}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.143' (ED25519) to the list of known hosts. [ 20.683738][ T23] audit: type=1400 audit(1719991428.320:66): avc: denied { mounton } for pid=341 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.685177][ T341] cgroup1: Unknown subsys name 'net' [ 20.706217][ T23] audit: type=1400 audit(1719991428.320:67): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.711717][ T341] cgroup1: Unknown subsys name 'net_prio' [ 20.738849][ T341] cgroup1: Unknown subsys name 'devices' [ 20.745096][ T23] audit: type=1400 audit(1719991428.380:68): avc: denied { unmount } for pid=341 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.911114][ T341] cgroup1: Unknown subsys name 'hugetlb' [ 20.916725][ T341] cgroup1: Unknown subsys name 'rlimit' [ 21.139809][ T23] audit: type=1400 audit(1719991428.780:69): avc: denied { setattr } for pid=341 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9290 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.152560][ T344] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.163393][ T23] audit: type=1400 audit(1719991428.780:70): avc: denied { mounton } for pid=341 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.196597][ T23] audit: type=1400 audit(1719991428.780:71): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.219492][ T23] audit: type=1400 audit(1719991428.820:72): avc: denied { relabelto } for pid=344 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.244774][ T23] audit: type=1400 audit(1719991428.820:73): avc: denied { write } for pid=344 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.244797][ T341] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.270089][ T23] audit: type=1400 audit(1719991428.830:74): avc: denied { read } for pid=341 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.270105][ T23] audit: type=1400 audit(1719991428.830:75): avc: denied { open } for pid=341 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.649508][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.656347][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.663791][ T352] device bridge_slave_0 entered promiscuous mode [ 21.671551][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.678374][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.685722][ T353] device bridge_slave_0 entered promiscuous mode [ 21.692245][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.699129][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.706301][ T352] device bridge_slave_1 entered promiscuous mode [ 21.728907][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.735735][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.743059][ T353] device bridge_slave_1 entered promiscuous mode [ 21.805601][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.812570][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.819826][ T351] device bridge_slave_0 entered promiscuous mode [ 21.826615][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.833470][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.840825][ T351] device bridge_slave_1 entered promiscuous mode [ 21.871060][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.877888][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.885571][ T355] device bridge_slave_0 entered promiscuous mode [ 21.895837][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.902955][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.910221][ T355] device bridge_slave_1 entered promiscuous mode [ 21.964748][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.971778][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.979073][ T354] device bridge_slave_0 entered promiscuous mode [ 22.000122][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.006945][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.014254][ T354] device bridge_slave_1 entered promiscuous mode [ 22.153694][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.160536][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.167651][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.174435][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.183164][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.190001][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.197119][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.203886][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.214350][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.221293][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.228423][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.235184][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.249702][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.256535][ T351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.263713][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.270529][ T351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.327717][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.334573][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.341695][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.348448][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.374315][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.383022][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.391603][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.398934][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.405921][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.413117][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.420102][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.427106][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.434091][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.441202][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.448170][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.469431][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.476624][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.484017][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.492858][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.499697][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.507084][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.515235][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.522060][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.529294][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.537027][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.565262][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.572851][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.580617][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.590691][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.597506][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.605550][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.613641][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.620471][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.627681][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.635691][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.642517][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.649813][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.657751][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.664583][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.671711][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.679642][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.686451][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.711800][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.720100][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.728146][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.736410][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.744135][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.751381][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.776689][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.784815][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.793043][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.801518][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.809381][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.817138][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.824916][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.832940][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.840728][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.848692][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.856562][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.864432][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.901454][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.910327][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.918022][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.927567][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.935733][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.943593][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.951378][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.959692][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.967728][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.975929][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.984114][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.992415][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.000567][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.007375][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.014784][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.022977][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.031013][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.037831][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.044983][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.053169][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.071799][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.079818][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.109334][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.117276][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.127425][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.135972][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.144919][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.153106][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.161343][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.169176][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.176759][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.184997][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.219219][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.227249][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.236472][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.244846][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.253777][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.262654][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.273442][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.282060][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.290681][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.308963][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.356320][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.364586][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.374018][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.382392][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.391474][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.399894][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.408066][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.416320][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.424851][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.433376][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.441760][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.450312][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.459157][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.467240][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.504383][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.518882][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.344933][ T396] syz.3.4 (396) used greatest stack depth: 22712 bytes left [ 26.260360][ T23] kauditd_printk_skb: 25 callbacks suppressed [ 26.260368][ T23] audit: type=1400 audit(1719991433.900:101): avc: denied { map_create } for pid=421 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 26.350008][ T23] audit: type=1400 audit(1719991433.930:102): avc: denied { map_read map_write } for pid=421 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 26.394303][ T23] audit: type=1400 audit(1719991433.930:103): avc: denied { prog_load } for pid=421 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 26.418198][ T23] audit: type=1400 audit(1719991433.930:104): avc: denied { prog_run } for pid=421 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 26.557728][ T23] audit: type=1400 audit(1719991433.970:105): avc: denied { ioctl } for pid=423 comm="syz.1.13" path="socket:[11726]" dev="sockfs" ino=11726 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.563219][ T434] netlink: 44 bytes leftover after parsing attributes in process `syz.2.18'. [ 26.608508][ T23] audit: type=1400 audit(1719991434.060:106): avc: denied { create } for pid=427 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 26.681604][ T23] audit: type=1400 audit(1719991434.060:107): avc: denied { connect } for pid=427 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 26.821866][ T23] audit: type=1400 audit(1719991434.090:108): avc: denied { create } for pid=431 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 26.829945][ T434] syz.2.18 (434) used greatest stack depth: 21656 bytes left [ 26.891013][ T23] audit: type=1400 audit(1719991434.530:109): avc: denied { mount } for pid=431 comm="syz.1.17" name="/" dev="loop1" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 26.914612][ T437] device pim6reg1 entered promiscuous mode [ 26.942313][ T23] audit: type=1400 audit(1719991434.570:110): avc: denied { create } for pid=441 comm="syz.2.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.408715][ T447] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 27.500053][ T463] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 27.797978][ T459] EXT4-fs (loop0): Test dummy encryption mode enabled [ 27.812043][ T459] EXT4-fs (loop0): Ignoring removed orlov option [ 27.853181][ T459] EXT4-fs (loop0): Unsupported blocksize for fs encryption [ 28.107217][ T478] netlink: 44 bytes leftover after parsing attributes in process `syz.2.29'. [ 28.116037][ T480] cgroup: syz.0.28 (480) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 28.134418][ T480] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 28.195167][ T488] mmap: syz.0.33 (488) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 28.340634][ T501] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=532 sclass=netlink_tcpdiag_socket pid=501 comm=syz.4.39 [ 28.357967][ T507] netlink: 44 bytes leftover after parsing attributes in process `syz.1.40'. [ 28.374769][ T511] [ 28.380153][ T511] ********************************************************** [ 28.395635][ T511] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 28.403445][ T511] ** ** [ 28.410788][ T511] ** trace_printk() being used. Allocating extra memory. ** [ 28.418041][ T511] ** ** [ 28.427516][ T511] ** This means that this is a DEBUG kernel and it is ** [ 28.435362][ T511] ** unsafe for production use. ** [ 28.443371][ T517] syz.1.47 (517) used greatest stack depth: 21592 bytes left [ 28.450599][ T511] ** ** [ 28.450603][ T511] ** If you see this message and you are not debugging ** [ 28.450606][ T511] ** the kernel, report this immediately to your vendor! ** [ 28.450609][ T511] ** ** [ 28.450612][ T511] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 28.450615][ T511] ********************************************************** [ 28.581844][ T533] netlink: 40 bytes leftover after parsing attributes in process `syz.3.52'. [ 29.362180][ T352] syz-executor (352) used greatest stack depth: 20760 bytes left [ 29.472691][ T353] syz-executor (353) used greatest stack depth: 19576 bytes left [ 30.288778][ T179] device bridge_slave_1 left promiscuous mode [ 30.294698][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.302053][ T179] device bridge_slave_0 left promiscuous mode [ 30.307954][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.029187][ T179] device bridge_slave_1 left promiscuous mode [ 32.035110][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.042398][ T179] device bridge_slave_0 left promiscuous mode [ 32.048292][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.055582][ T179] device bridge_slave_1 left promiscuous mode [ 32.061521][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.068971][ T179] device bridge_slave_0 left promiscuous mode [ 32.074868][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.082114][ T179] device bridge_slave_1 left promiscuous mode [ 32.088008][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.095280][ T179] device bridge_slave_0 left promiscuous mode [ 32.101285][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.108369][ T179] device bridge_slave_1 left promiscuous mode [ 32.114398][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.121587][ T179] device bridge_slave_0 left promiscuous mode [ 32.127471][ T179] bridge0: port 1(bridge_slave_0) entered disabled state