last executing test programs: 1.077800249s ago: executing program 0 (id=193): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x4, 0x20005, 0x400, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)=0xa) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x5, @remote, 0x1}, 0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) 968.68725ms ago: executing program 0 (id=195): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0xf0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) shmdt(0x0) 961.261761ms ago: executing program 1 (id=196): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="aa", 0xffe0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x6}, 0x3}, 0x1c) shutdown(r0, 0x1) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x6f, 0x20}, 0xc) 856.147353ms ago: executing program 0 (id=197): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000000c0)='kfree\x00', r1}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[], 0x20}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="10000000040000000800000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) 811.419344ms ago: executing program 1 (id=199): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000580)='/sys/power/image_size', 0x1a1081, 0x18) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)='2', 0x1}], 0x1, 0x0, 0x0) 807.547774ms ago: executing program 0 (id=200): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0700000004000000800000000400000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r2, &(0x7f0000000040)={0x23, 0x0, 0x0, 0x1}, 0x10) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) 761.091015ms ago: executing program 2 (id=202): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x108284, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r0}) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001214010028bd7000fcdbdf250800", @ANYRES64=r1], 0x30}, 0x1, 0x0, 0x0, 0x4000014}, 0x20000000) 736.458355ms ago: executing program 0 (id=203): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) 732.971175ms ago: executing program 1 (id=204): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWRULE={0x70, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x44, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @limit={{0xa}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x4}, @NFTA_LIMIT_UNIT={0xc}]}}}, {0x14, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x98}}, 0x0) 719.059565ms ago: executing program 2 (id=205): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4048000}, 0x44450) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000060a0b0400000000000000000200000054000480500001800a0001006d6174636800000040000280080002400000000124000300d67a8527f76ec1d39e537c4c3060c6a405106c72848aa8bcb429b3a20d5324520e000100636f6e6e6c696d69740000000900010073797a30000000000900020073797a32"], 0xa8}}, 0x4048010) 563.837519ms ago: executing program 0 (id=206): r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) close(r0) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r1, 0x8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x80, &(0x7f0000001500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 551.685879ms ago: executing program 1 (id=207): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0xc844) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000300)={0xa, 0x4e20, 0x5, @mcast1}, 0x1c) 519.56014ms ago: executing program 2 (id=209): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendto$inet6(r0, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0x2, 0x4e24, 0x0, @local, 0x4000000}, 0x1c) 501.30804ms ago: executing program 4 (id=211): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x2) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x0, 0x100804, 0x0, 0xa, 0x0, 0xffffffff, 0x4, 0x0, 0x0, 0x4}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f00000004c0)={{0x80}, 'port0\x00', 0x0, 0x121428, 0x7fff, 0x0, 0x3, 0xfffffffc, 0x0, 0x0, 0x0, 0xe}) 480.84246ms ago: executing program 2 (id=212): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000480)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000080)="da", 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0xd0}}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)='/', 0x1}], 0x1}}], 0x2, 0x0) close(r2) 446.159621ms ago: executing program 1 (id=213): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socket$packet(0x11, 0xa, 0x300) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2688ca4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 425.635301ms ago: executing program 2 (id=214): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000003c0)=[{&(0x7f0000000240)="3900000013000318680907070000000f0000ff3f04000000170a001700000000040037000f00030001332564aaee7b1d58b9a64411f6bbf44d", 0x39}], 0x1) 370.293202ms ago: executing program 4 (id=215): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x6}, 0x18) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vxcan1\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000000)={0x1d, r2}, 0x10) bind$can_raw(r1, &(0x7f0000000080), 0x10) 286.676744ms ago: executing program 4 (id=218): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000400000e0000000000000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x2) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000580)=""/244, 0xf4}], 0x1) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 263.886585ms ago: executing program 3 (id=219): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000022007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) io_pgetevents(0x0, 0x4, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) 208.294906ms ago: executing program 3 (id=220): r0 = socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x8, 0x6}, 0x120, 0x10000, 0x33f8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) signalfd4(r0, 0x0, 0x0, 0x0) 193.143036ms ago: executing program 1 (id=221): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010026bd70003c0200000200000008000100", @ANYRES32=r3], 0x1c}}, 0x0) write$nci(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="6103062407028009012f01"], 0xb) 192.516976ms ago: executing program 2 (id=222): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x6, 0x6, 0x5, 0x2}]}) 153.954256ms ago: executing program 4 (id=223): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='devpts\x00', 0x1010401, 0x0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./control\x00', 0x0, 0x2000, 0x0) 129.108087ms ago: executing program 3 (id=224): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0x200000000000006}, 0x18) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x1) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) 109.524907ms ago: executing program 4 (id=225): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x3, 0x8, @loopback, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "41328ac34a4ad2ba", "e8582491a0c4050000000000f6542a9b6800000000000000003967d2daa45b4e", "61241765", "89b06aff130000fd"}, 0x38) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@ip_tos_int={{0x14, 0x11a, 0x1, 0x8}}, @ip_pktinfo={{0x1c, 0x11a, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0x7}}}], 0x38}, 0x0) 104.804238ms ago: executing program 3 (id=226): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'team_slave_1\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r3}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="800000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000005000128009000100766c616e000000004000028006000100000ffe00340003800c0001000ffe0000000000000c00010000217fffff0080030c00010000010000000000000c000100040000000000000008000500", @ANYRES32=r1, @ANYBLOB="080003"], 0x80}, 0x1, 0x0, 0x0, 0x20044081}, 0x8000) 85.391398ms ago: executing program 3 (id=227): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x40, 0x5d, 0x2, 0x8}, {0x6, 0x0, 0x6, 0x1}]}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000040000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x9) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000140)="24000000010006", 0x7) 50.610509ms ago: executing program 3 (id=228): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x140, 0x4) io_setup(0x9, &(0x7f0000000240)=0x0) r2 = eventfd2(0x200, 0x800) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x40, r0, &(0x7f0000000280)='L', 0x1, 0x0, 0x0, 0x1, r2}]) sendto$inet(r0, 0x0, 0x0, 0x4, &(0x7f0000001080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) 0s ago: executing program 4 (id=229): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000600)='sys_enter\x00', r1}, 0x10) syslog(0x2, &(0x7f0000000a00)=""/4096, 0x1000) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 18.416189][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 18.416203][ T29] audit: type=1400 audit(1756850287.067:57): avc: denied { transition } for pid=3209 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.420642][ T29] audit: type=1400 audit(1756850287.067:58): avc: denied { noatsecure } for pid=3209 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.423670][ T29] audit: type=1400 audit(1756850287.067:59): avc: denied { write } for pid=3209 comm="sh" path="pipe:[1443]" dev="pipefs" ino=1443 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 18.427110][ T29] audit: type=1400 audit(1756850287.067:60): avc: denied { rlimitinh } for pid=3209 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.429959][ T29] audit: type=1400 audit(1756850287.067:61): avc: denied { siginh } for pid=3209 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.126' (ED25519) to the list of known hosts. [ 25.540905][ T29] audit: type=1400 audit(1756850294.187:62): avc: denied { mounton } for pid=3293 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.541501][ T3293] cgroup: Unknown subsys name 'net' [ 25.563744][ T29] audit: type=1400 audit(1756850294.187:63): avc: denied { mount } for pid=3293 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.591164][ T29] audit: type=1400 audit(1756850294.217:64): avc: denied { unmount } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.683349][ T3293] cgroup: Unknown subsys name 'cpuset' [ 25.689477][ T3293] cgroup: Unknown subsys name 'rlimit' [ 25.798052][ T29] audit: type=1400 audit(1756850294.447:65): avc: denied { setattr } for pid=3293 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.821508][ T29] audit: type=1400 audit(1756850294.447:66): avc: denied { create } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.841962][ T29] audit: type=1400 audit(1756850294.447:67): avc: denied { write } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.848284][ T3295] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.863051][ T29] audit: type=1400 audit(1756850294.447:68): avc: denied { read } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.892778][ T29] audit: type=1400 audit(1756850294.447:69): avc: denied { mounton } for pid=3293 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.907868][ T3293] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k Setting up swapspace version 1, size = 127995904 bytes [ 25.917552][ T29] audit: type=1400 audit(1756850294.447:70): avc: denied { mount } for pid=3293 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.950199][ T29] audit: type=1400 audit(1756850294.517:71): avc: denied { relabelto } for pid=3295 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.674903][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 27.713157][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 27.726968][ T3302] chnl_net:caif_netlink_parms(): no params data found [ 27.768253][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 27.784379][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.791597][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.798861][ T3306] bridge_slave_0: entered allmulticast mode [ 27.805216][ T3306] bridge_slave_0: entered promiscuous mode [ 27.822133][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.829253][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.836512][ T3306] bridge_slave_1: entered allmulticast mode [ 27.842928][ T3306] bridge_slave_1: entered promiscuous mode [ 27.859735][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 27.887334][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.894564][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.901726][ T3302] bridge_slave_0: entered allmulticast mode [ 27.908131][ T3302] bridge_slave_0: entered promiscuous mode [ 27.921541][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.935435][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.942508][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.949668][ T3302] bridge_slave_1: entered allmulticast mode [ 27.956226][ T3302] bridge_slave_1: entered promiscuous mode [ 27.968976][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.976159][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.983552][ T3303] bridge_slave_0: entered allmulticast mode [ 27.989890][ T3303] bridge_slave_0: entered promiscuous mode [ 27.997172][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.006248][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.013378][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.020540][ T3303] bridge_slave_1: entered allmulticast mode [ 28.027079][ T3303] bridge_slave_1: entered promiscuous mode [ 28.071129][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.085150][ T3306] team0: Port device team_slave_0 added [ 28.090944][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.098090][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.105227][ T3310] bridge_slave_0: entered allmulticast mode [ 28.111583][ T3310] bridge_slave_0: entered promiscuous mode [ 28.118942][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.138361][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.147948][ T3306] team0: Port device team_slave_1 added [ 28.158561][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.165613][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.172788][ T3310] bridge_slave_1: entered allmulticast mode [ 28.179055][ T3310] bridge_slave_1: entered promiscuous mode [ 28.186287][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.200385][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.207469][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.214674][ T3307] bridge_slave_0: entered allmulticast mode [ 28.220880][ T3307] bridge_slave_0: entered promiscuous mode [ 28.249688][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.256823][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.264177][ T3307] bridge_slave_1: entered allmulticast mode [ 28.270782][ T3307] bridge_slave_1: entered promiscuous mode [ 28.285366][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.292562][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.318502][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.330218][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.339618][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.346602][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.372538][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.383887][ T3303] team0: Port device team_slave_0 added [ 28.394809][ T3302] team0: Port device team_slave_0 added [ 28.401398][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.414028][ T3303] team0: Port device team_slave_1 added [ 28.421592][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.440455][ T3302] team0: Port device team_slave_1 added [ 28.455669][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.470361][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.477581][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.503509][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.524051][ T3306] hsr_slave_0: entered promiscuous mode [ 28.529965][ T3306] hsr_slave_1: entered promiscuous mode [ 28.544793][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.551775][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.577997][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.589302][ T3310] team0: Port device team_slave_0 added [ 28.596245][ T3310] team0: Port device team_slave_1 added [ 28.606623][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.613714][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.639695][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.651087][ T3307] team0: Port device team_slave_0 added [ 28.657605][ T3307] team0: Port device team_slave_1 added [ 28.679028][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.686050][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.712096][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.740501][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.747550][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.773724][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.794828][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.801958][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.828533][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.839832][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.846826][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.872932][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.887113][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.894109][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.920225][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.935441][ T3303] hsr_slave_0: entered promiscuous mode [ 28.941412][ T3303] hsr_slave_1: entered promiscuous mode [ 28.947198][ T3303] debugfs: 'hsr0' already exists in 'hsr' [ 28.952923][ T3303] Cannot create hsr debugfs directory [ 28.986717][ T3302] hsr_slave_0: entered promiscuous mode [ 28.992802][ T3302] hsr_slave_1: entered promiscuous mode [ 28.998598][ T3302] debugfs: 'hsr0' already exists in 'hsr' [ 29.004449][ T3302] Cannot create hsr debugfs directory [ 29.024074][ T3310] hsr_slave_0: entered promiscuous mode [ 29.030200][ T3310] hsr_slave_1: entered promiscuous mode [ 29.036285][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 29.042111][ T3310] Cannot create hsr debugfs directory [ 29.076224][ T3307] hsr_slave_0: entered promiscuous mode [ 29.082416][ T3307] hsr_slave_1: entered promiscuous mode [ 29.088327][ T3307] debugfs: 'hsr0' already exists in 'hsr' [ 29.094198][ T3307] Cannot create hsr debugfs directory [ 29.211070][ T3306] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.221500][ T3306] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.232765][ T3306] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.251292][ T3306] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.300131][ T3302] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.308914][ T3302] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.319511][ T3302] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.333043][ T3302] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.354239][ T3310] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.365226][ T3310] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.378744][ T3310] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.396349][ T3310] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.431517][ T3303] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.440310][ T3303] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.452367][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.463428][ T3303] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.471902][ T3303] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.492947][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.506328][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.523525][ T3307] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.533532][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.540751][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.553307][ T146] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.560649][ T146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.568806][ T3307] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.581947][ T3307] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.590349][ T3307] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.601795][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.626836][ T3302] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.641471][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.648687][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.670845][ T1461] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.677961][ T1461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.701062][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.740293][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.750269][ T1461] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.757817][ T1461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.792628][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.799907][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.821859][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.837497][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.845791][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.862950][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.874887][ T146] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.882078][ T146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.899970][ T3310] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.910395][ T3310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.925994][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.938438][ T3306] veth0_vlan: entered promiscuous mode [ 29.947362][ T146] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.954453][ T146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.984801][ T3306] veth1_vlan: entered promiscuous mode [ 30.007299][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.014426][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.023459][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.030667][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.061398][ T3306] veth0_macvtap: entered promiscuous mode [ 30.068798][ T3306] veth1_macvtap: entered promiscuous mode [ 30.082063][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.113989][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.154508][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.177597][ T3302] veth0_vlan: entered promiscuous mode [ 30.185809][ T3442] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.198778][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.210619][ T3442] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.223414][ T3302] veth1_vlan: entered promiscuous mode [ 30.244537][ T3442] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.256479][ T3442] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.269159][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.288776][ T3302] veth0_macvtap: entered promiscuous mode [ 30.306770][ T3302] veth1_macvtap: entered promiscuous mode [ 30.315102][ T3306] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.320182][ T3310] veth0_vlan: entered promiscuous mode [ 30.349462][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.361253][ T3310] veth1_vlan: entered promiscuous mode [ 30.375410][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.400030][ T3310] veth0_macvtap: entered promiscuous mode [ 30.412570][ T49] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.421849][ T3465] loop3: detected capacity change from 0 to 1024 [ 30.422053][ T49] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.446766][ T3465] ======================================================= [ 30.446766][ T3465] WARNING: The mand mount option has been deprecated and [ 30.446766][ T3465] and is ignored by this kernel. Remove the mand [ 30.446766][ T3465] option from the mount to silence this warning. [ 30.446766][ T3465] ======================================================= [ 30.486053][ T146] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.497786][ T3465] EXT4-fs: Ignoring removed nobh option [ 30.505224][ T3465] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 30.508321][ T3310] veth1_macvtap: entered promiscuous mode [ 30.524711][ T146] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.536619][ T3465] EXT4-fs error (device loop3): ext4_ext_check_inode:523: inode #11: comm syz.3.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 32512(32512) [ 30.568142][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.589277][ T3307] veth0_vlan: entered promiscuous mode [ 30.595995][ T3465] EXT4-fs error (device loop3): ext4_orphan_get:1397: comm syz.3.4: couldn't read orphan inode 11 (err -117) [ 30.597969][ T3307] veth1_vlan: entered promiscuous mode [ 30.615936][ T3465] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 30.619802][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.643240][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 30.643255][ T29] audit: type=1400 audit(1756850299.297:93): avc: denied { mount } for pid=3461 comm="syz.3.4" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 30.673346][ T29] audit: type=1400 audit(1756850299.297:94): avc: denied { open } for pid=3461 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.692226][ T29] audit: type=1400 audit(1756850299.297:95): avc: denied { perfmon } for pid=3461 comm="syz.3.4" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 30.712815][ T29] audit: type=1400 audit(1756850299.297:96): avc: denied { kernel } for pid=3461 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.731924][ T29] audit: type=1400 audit(1756850299.297:97): avc: denied { tracepoint } for pid=3461 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.758585][ T3307] veth0_macvtap: entered promiscuous mode [ 30.764509][ T29] audit: type=1400 audit(1756850299.367:98): avc: denied { prog_load } for pid=3461 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 30.783494][ T29] audit: type=1400 audit(1756850299.367:99): avc: denied { bpf } for pid=3461 comm="syz.3.4" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 30.785757][ T3303] veth0_vlan: entered promiscuous mode [ 30.804357][ T29] audit: type=1400 audit(1756850299.367:100): avc: denied { prog_run } for pid=3461 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 30.818794][ T3303] veth1_vlan: entered promiscuous mode [ 30.843626][ T2911] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.858346][ T3307] veth1_macvtap: entered promiscuous mode [ 30.867089][ T2911] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.883176][ T29] audit: type=1400 audit(1756850299.517:101): avc: denied { create } for pid=3478 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.902350][ T29] audit: type=1400 audit(1756850299.517:102): avc: denied { bind } for pid=3478 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.931236][ T3303] veth0_macvtap: entered promiscuous mode [ 30.939273][ T2911] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.950402][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.964937][ T2911] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.976097][ T3303] veth1_macvtap: entered promiscuous mode [ 30.984128][ T3306] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 30.988542][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.001344][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.024159][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.043052][ T49] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.064272][ T49] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.102698][ T49] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.139649][ T41] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.169105][ T41] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.181010][ T3494] loop4: detected capacity change from 0 to 1024 [ 31.200640][ T41] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.206865][ T3494] EXT4-fs: Ignoring removed orlov option [ 31.221705][ T41] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.258492][ T41] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.287981][ T3494] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.415227][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.750053][ T3551] Driver unsupported XDP return value 0 on prog (id 23) dev N/A, expect packet loss! [ 32.032247][ T3571] atomic_op ffff88811a8be128 conn xmit_atomic 0000000000000000 [ 32.187948][ T3590] loop4: detected capacity change from 0 to 1024 [ 32.206563][ T3590] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 32.232106][ T3590] EXT4-fs error (device loop4): ext4_mb_mark_diskspace_used:4183: comm syz.4.50: Allocating blocks 385-513 which overlap fs metadata [ 32.256821][ T3590] EXT4-fs (loop4): pa ffff888100559070: logic 16, phys. 129, len 24 [ 32.264970][ T3590] EXT4-fs error (device loop4): ext4_mb_release_inode_pa:5434: group 0, free 0, pa_free 8 [ 32.361148][ T3590] syz.4.50 (3590) used greatest stack depth: 10136 bytes left [ 32.375724][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.446101][ T3598] ref_ctr_offset mismatch. inode: 0x6c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x8000000 [ 32.529433][ T3602] syz.1.52 uses obsolete (PF_INET,SOCK_PACKET) [ 32.593617][ T3608] netlink: 180 bytes leftover after parsing attributes in process `syz.0.55'. [ 32.623627][ T3608] netlink: 180 bytes leftover after parsing attributes in process `syz.0.55'. [ 32.750731][ T3627] netlink: 'syz.3.65': attribute type 21 has an invalid length. [ 32.758484][ T3627] netlink: 4 bytes leftover after parsing attributes in process `syz.3.65'. [ 32.807521][ T3622] loop4: detected capacity change from 0 to 4096 [ 32.824974][ T3442] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 32.833939][ T3627] netlink: 'syz.3.65': attribute type 21 has an invalid length. [ 32.841679][ T3627] netlink: 4 bytes leftover after parsing attributes in process `syz.3.65'. [ 32.853683][ T3622] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.856362][ T3442] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 32.877471][ T3627] Zero length message leads to an empty skb [ 32.883565][ T3442] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 32.897211][ T3442] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 32.959945][ T3642] x_tables: ip_tables: recent.0 match: invalid size 216 (kernel) != (user) 4096 [ 33.010726][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.077544][ T3656] syz.2.79 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 33.153615][ T3660] sd 0:0:1:0: device reset [ 33.489785][ T3706] pim6reg: entered allmulticast mode [ 33.507259][ T3706] pim6reg: left allmulticast mode [ 33.601291][ T3719] netlink: 20 bytes leftover after parsing attributes in process `syz.4.105'. [ 33.624527][ T3721] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 33.632143][ T3721] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 33.641097][ T3721] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 33.648631][ T3721] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 33.782050][ T3735] process 'syz.3.113' launched './file0' with NULL argv: empty string added [ 33.855170][ T3741] serio: Serial port ptm0 [ 33.939868][ T3750] pim6reg: entered allmulticast mode [ 33.948234][ T3750] pim6reg: left allmulticast mode [ 33.973674][ T3752] mmap: syz.0.121 (3752) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 34.016992][ T3756] random: crng reseeded on system resumption [ 34.030233][ T3756] Restarting kernel threads ... [ 34.060149][ T3756] Done restarting kernel threads. [ 34.456659][ T3822] netlink: 8 bytes leftover after parsing attributes in process `syz.1.154'. [ 34.588992][ T3835] syz.2.160 (3835) used greatest stack depth: 9384 bytes left [ 34.631450][ T3845] loop3: detected capacity change from 0 to 512 [ 34.643204][ T3845] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 34.671316][ T3845] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.704358][ T3845] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 3: comm syz.3.161: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 34.741657][ T3845] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 12: comm syz.3.161: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 34.794465][ T3861] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 34.807414][ T3861] netlink: 'syz.1.172': attribute type 12 has an invalid length. [ 34.811035][ T3845] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 13: comm syz.3.161: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 34.815400][ T3861] netlink: 'syz.1.172': attribute type 29 has an invalid length. [ 34.843061][ T3845] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 14: comm syz.3.161: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 34.844357][ T3861] netlink: 148 bytes leftover after parsing attributes in process `syz.1.172'. [ 34.874104][ T3861] netlink: 'syz.1.172': attribute type 2 has an invalid length. [ 34.881902][ T3861] netlink: 'syz.1.172': attribute type 3 has an invalid length. [ 34.893812][ T3845] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 15: comm syz.3.161: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 34.955610][ T3845] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 16: comm syz.3.161: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653245223, rec_len=1, size=2048 fake=0 [ 35.012138][ T3845] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 17: comm syz.3.161: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 35.040267][ T3845] EXT4-fs error (device loop3): ext4_map_blocks:778: inode #2: block 18: comm syz.3.161: lblock 23 mapped to illegal pblock 18 (length 1) [ 35.090310][ T3845] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 19: comm syz.3.161: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 35.123298][ T3845] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 20: comm syz.3.161: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=2048 fake=0 [ 35.247308][ T3892] netlink: 60 bytes leftover after parsing attributes in process `syz.0.184'. [ 35.256293][ T3892] netlink: 60 bytes leftover after parsing attributes in process `syz.0.184'. [ 35.293989][ T3892] netlink: 60 bytes leftover after parsing attributes in process `syz.0.184'. [ 35.448337][ T3906] IPVS: stopping master sync thread 3907 ... [ 35.563234][ T3306] EXT4-fs warning (device loop3): ext4_update_dynamic_rev:1128: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 35.595102][ T3306] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.780220][ T29] kauditd_printk_skb: 252 callbacks suppressed [ 35.780236][ T29] audit: type=1400 audit(1756850304.427:355): avc: denied { create } for pid=3929 comm="syz.0.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 35.829769][ T3934] netlink: 'syz.2.202': attribute type 6 has an invalid length. [ 35.864730][ T29] audit: type=1400 audit(1756850304.437:356): avc: denied { connect } for pid=3929 comm="syz.0.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 35.884404][ T29] audit: type=1400 audit(1756850304.437:357): avc: denied { ioctl } for pid=3929 comm="syz.0.200" path="socket:[5690]" dev="sockfs" ino=5690 ioctlcmd=0x89ed scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 35.909373][ T29] audit: type=1400 audit(1756850304.477:358): avc: denied { create } for pid=3933 comm="syz.2.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 35.930238][ T29] audit: type=1400 audit(1756850304.477:359): avc: denied { ioctl } for pid=3933 comm="syz.2.202" path="socket:[6565]" dev="sockfs" ino=6565 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 35.955003][ T29] audit: type=1400 audit(1756850304.477:360): avc: denied { create } for pid=3933 comm="syz.2.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 35.975308][ T29] audit: type=1400 audit(1756850304.477:361): avc: denied { write } for pid=3933 comm="syz.2.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 36.127877][ T29] audit: type=1400 audit(1756850304.517:362): avc: denied { unmount } for pid=3935 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 36.147527][ T29] audit: type=1400 audit(1756850304.617:363): avc: denied { execmem } for pid=3927 comm="syz.4.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 36.166959][ T29] audit: type=1400 audit(1756850304.707:364): avc: denied { read write } for pid=3946 comm="syz.3.208" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 36.175881][ T3963] 0ªî{X¹¦: renamed from gretap0 (while UP) [ 36.238992][ T3963] 0ªî{X¹¦: entered allmulticast mode [ 36.252635][ T3963] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 36.346977][ T3977] serio: Serial port ptm0 [ 36.466818][ T2911] nci: nci_add_new_protocol: the target found does not have the desired protocol [ 36.592134][ T2993] ================================================================== [ 36.600267][ T2993] BUG: KCSAN: data-race in dentry_unlink_inode / step_into [ 36.607585][ T2993] [ 36.609926][ T2993] write to 0xffff888119cdee70 of 8 bytes by task 3292 on cpu 1: [ 36.617561][ T2993] dentry_unlink_inode+0x65/0x260 [ 36.622624][ T2993] d_delete+0x164/0x180 [ 36.626901][ T2993] d_delete_notify+0x32/0x100 [ 36.631676][ T2993] vfs_unlink+0x30b/0x420 [ 36.636035][ T2993] do_unlinkat+0x24e/0x480 [ 36.640476][ T2993] __x64_sys_unlink+0x2e/0x40 [ 36.645194][ T2993] x64_sys_call+0x2dc0/0x2ff0 [ 36.649903][ T2993] do_syscall_64+0xd2/0x200 [ 36.654528][ T2993] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.660443][ T2993] [ 36.662776][ T2993] read to 0xffff888119cdee70 of 8 bytes by task 2993 on cpu 0: [ 36.670328][ T2993] step_into+0x122/0x820 [ 36.674595][ T2993] walk_component+0x162/0x220 [ 36.679297][ T2993] path_lookupat+0xfe/0x2a0 [ 36.683823][ T2993] filename_lookup+0x147/0x340 [ 36.688667][ T2993] do_readlinkat+0x7d/0x320 [ 36.693188][ T2993] __x64_sys_readlink+0x47/0x60 [ 36.698062][ T2993] x64_sys_call+0x28da/0x2ff0 [ 36.702937][ T2993] do_syscall_64+0xd2/0x200 [ 36.707471][ T2993] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.713386][ T2993] [ 36.715825][ T2993] value changed: 0xffff88811a66ec18 -> 0x0000000000000000 [ 36.722953][ T2993] [ 36.725458][ T2993] Reported by Kernel Concurrency Sanitizer on: [ 36.731895][ T2993] CPU: 0 UID: 0 PID: 2993 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 36.741282][ T2993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 36.751534][ T2993] ==================================================================