last executing test programs: 197.095817ms ago: executing program 3 (id=4): socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x800, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c756e616d653dd0"]) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r3 = socket$kcm(0x10, 0x2, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f00ff0f00000000000050375ed08a56331dbf9ed78105001ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010004080c00bdad01409bbc7a46e39a54cbbda812176679df069163ce955fed0009d78f0a947ee2b49e33538afaeb2713f450ebd010a20ff27fff", 0x89}], 0x1, 0x0, 0x0, 0x7}, 0x24002040) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002bc0)=@newlink={0x3c, 0x10, 0x1, 0x70bd2b, 0x0, {0x0, 0x0, 0x0, r4, 0x0, 0x20008}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5, 0x9, 0x1}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', r4, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = syz_open_dev$usbfs(&(0x7f0000000080), 0x70, 0x101301) r7 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r7, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) sendmsg$inet(r7, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)="cd", 0x1}], 0x1}, 0x240448c4) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 48.36901ms ago: executing program 4 (id=5): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="11000000040000000400000005"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = socket(0x1e, 0x4, 0x0) r5 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r7, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r7, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) sendmmsg$inet(r7, &(0x7f0000000f40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000006c0)="04", 0x1}], 0x1}}], 0x1, 0x4048055) close_range(r6, 0xffffffffffffffff, 0x0) recvmsg$unix(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001e00)=""/4096, 0x1000}], 0x1}, 0x40010000) socket$packet(0x11, 0x2, 0x300) 0s ago: executing program 0 (id=1): creat(&(0x7f0000000100)='./file0\x00', 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x60, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/reserved_size', 0x149a82, 0x1a1) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000380)='\f', 0x1}], 0x1) write$UHID_DESTROY(r1, &(0x7f00000001c0), 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='w\xde\xa3\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98,\xc8\x18E/\x8c\x1a\xe3\xbd') r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x70, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x200000001300, 0x200000001330], 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB]}, 0x78) sendmsg$NFT_BATCH(r2, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) r6 = eventfd2(0x9, 0x0) io_pgetevents(r5, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], 0x0, 0x0) io_submit(r5, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x1, r6}]) io_destroy(r5) acct(0x0) ioprio_set$uid(0x3, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x1, 0xfffffffc}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x49}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.179' (ED25519) to the list of known hosts. [ 33.397838][ T29] audit: type=1400 audit(1751115769.998:62): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.399008][ T3295] cgroup: Unknown subsys name 'net' [ 33.420571][ T29] audit: type=1400 audit(1751115769.998:63): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.448085][ T29] audit: type=1400 audit(1751115770.028:64): avc: denied { unmount } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.575098][ T3295] cgroup: Unknown subsys name 'cpuset' [ 33.581229][ T3295] cgroup: Unknown subsys name 'rlimit' [ 33.712671][ T29] audit: type=1400 audit(1751115770.308:65): avc: denied { setattr } for pid=3295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.736063][ T29] audit: type=1400 audit(1751115770.308:66): avc: denied { create } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.756635][ T29] audit: type=1400 audit(1751115770.318:67): avc: denied { write } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.777081][ T29] audit: type=1400 audit(1751115770.318:68): avc: denied { read } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.781943][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 33.797329][ T29] audit: type=1400 audit(1751115770.328:69): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.829305][ T3295] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 33.830654][ T29] audit: type=1400 audit(1751115770.328:70): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 33.862604][ T29] audit: type=1400 audit(1751115770.408:71): avc: denied { relabelto } for pid=3299 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 35.872032][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 35.932152][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 35.950879][ T3309] chnl_net:caif_netlink_parms(): no params data found [ 35.967501][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 36.007354][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.014538][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.021691][ T3307] bridge_slave_0: entered allmulticast mode [ 36.028182][ T3307] bridge_slave_0: entered promiscuous mode [ 36.037157][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.044333][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.051525][ T3307] bridge_slave_1: entered allmulticast mode [ 36.058094][ T3307] bridge_slave_1: entered promiscuous mode [ 36.111871][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.119061][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.126418][ T3306] bridge_slave_0: entered allmulticast mode [ 36.132869][ T3306] bridge_slave_0: entered promiscuous mode [ 36.140582][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.158014][ T3309] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.165207][ T3309] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.172370][ T3309] bridge_slave_0: entered allmulticast mode [ 36.179508][ T3309] bridge_slave_0: entered promiscuous mode [ 36.186104][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.193171][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.200450][ T3306] bridge_slave_1: entered allmulticast mode [ 36.206985][ T3306] bridge_slave_1: entered promiscuous mode [ 36.214303][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.229779][ T3309] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.236913][ T3309] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.244054][ T3309] bridge_slave_1: entered allmulticast mode [ 36.250483][ T3309] bridge_slave_1: entered promiscuous mode [ 36.286217][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 36.295792][ T3307] team0: Port device team_slave_0 added [ 36.304703][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.311955][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.319247][ T3305] bridge_slave_0: entered allmulticast mode [ 36.325738][ T3305] bridge_slave_0: entered promiscuous mode [ 36.338925][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.349287][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.362255][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.371984][ T3307] team0: Port device team_slave_1 added [ 36.377757][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.384841][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.392098][ T3305] bridge_slave_1: entered allmulticast mode [ 36.398610][ T3305] bridge_slave_1: entered promiscuous mode [ 36.410700][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.458641][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.465748][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.491693][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.503595][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.520258][ T3309] team0: Port device team_slave_0 added [ 36.526383][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.533361][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.559556][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.571547][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.581226][ T3306] team0: Port device team_slave_0 added [ 36.587941][ T3306] team0: Port device team_slave_1 added [ 36.599432][ T3309] team0: Port device team_slave_1 added [ 36.632760][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.639751][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.665683][ T3309] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.685868][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.693125][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.700423][ T3315] bridge_slave_0: entered allmulticast mode [ 36.707123][ T3315] bridge_slave_0: entered promiscuous mode [ 36.714172][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.721282][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.728436][ T3315] bridge_slave_1: entered allmulticast mode [ 36.734870][ T3315] bridge_slave_1: entered promiscuous mode [ 36.741210][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.748172][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.774156][ T3309] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.785684][ T3305] team0: Port device team_slave_0 added [ 36.791727][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.798773][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.824770][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.845291][ T3305] team0: Port device team_slave_1 added [ 36.853305][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.860337][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.886275][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.924023][ T3307] hsr_slave_0: entered promiscuous mode [ 36.930031][ T3307] hsr_slave_1: entered promiscuous mode [ 36.937948][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.948166][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.958323][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.965313][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.991303][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.002930][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.009909][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.035915][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.074036][ T3309] hsr_slave_0: entered promiscuous mode [ 37.080112][ T3309] hsr_slave_1: entered promiscuous mode [ 37.085975][ T3309] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.093515][ T3309] Cannot create hsr debugfs directory [ 37.104715][ T3315] team0: Port device team_slave_0 added [ 37.124645][ T3306] hsr_slave_0: entered promiscuous mode [ 37.130556][ T3306] hsr_slave_1: entered promiscuous mode [ 37.136453][ T3306] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.144013][ T3306] Cannot create hsr debugfs directory [ 37.152344][ T3315] team0: Port device team_slave_1 added [ 37.182403][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.189398][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.215403][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.238541][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.245638][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.271796][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.289625][ T3305] hsr_slave_0: entered promiscuous mode [ 37.295755][ T3305] hsr_slave_1: entered promiscuous mode [ 37.301622][ T3305] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.309277][ T3305] Cannot create hsr debugfs directory [ 37.396931][ T3315] hsr_slave_0: entered promiscuous mode [ 37.403010][ T3315] hsr_slave_1: entered promiscuous mode [ 37.408949][ T3315] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.416543][ T3315] Cannot create hsr debugfs directory [ 37.499117][ T3307] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.512211][ T3307] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.521216][ T3307] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.534099][ T3307] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.571981][ T3309] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.581253][ T3309] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.590720][ T3309] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.599379][ T3309] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.635583][ T3306] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.649724][ T3306] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.658923][ T3306] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.668043][ T3306] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.699816][ T3305] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.709500][ T3305] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.720312][ T3305] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.732066][ T3305] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.750417][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.773838][ T3315] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.782435][ T3315] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.798659][ T3315] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.807607][ T3315] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.822931][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.838007][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.857039][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.864122][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.878527][ T3309] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.892628][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.899834][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.910407][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.917483][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.945538][ T266] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.952795][ T266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.975921][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.987381][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.000485][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.011656][ T3307] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.022146][ T3307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.036712][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.043847][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.053296][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.060406][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.088162][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.100036][ T3309] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.110522][ T3309] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.137166][ T3415] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.144259][ T3415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.155965][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.168307][ T266] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.175388][ T266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.190365][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.212379][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.219468][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.240036][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.262403][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.269763][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.287677][ T3309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.379774][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.420428][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.460764][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.485062][ T3309] veth0_vlan: entered promiscuous mode [ 38.496280][ T3309] veth1_vlan: entered promiscuous mode [ 38.529975][ T3309] veth0_macvtap: entered promiscuous mode [ 38.557063][ T3307] veth0_vlan: entered promiscuous mode [ 38.564566][ T3309] veth1_macvtap: entered promiscuous mode [ 38.588819][ T3307] veth1_vlan: entered promiscuous mode [ 38.610518][ T3306] veth0_vlan: entered promiscuous mode [ 38.624393][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.632636][ T3305] veth0_vlan: entered promiscuous mode [ 38.650873][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.658682][ T3307] veth0_macvtap: entered promiscuous mode [ 38.669072][ T3309] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.678031][ T3309] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.686795][ T3309] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.695709][ T3309] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.711372][ T3307] veth1_macvtap: entered promiscuous mode [ 38.720635][ T3306] veth1_vlan: entered promiscuous mode [ 38.726897][ T3315] veth0_vlan: entered promiscuous mode [ 38.740188][ T3305] veth1_vlan: entered promiscuous mode [ 38.756605][ T3315] veth1_vlan: entered promiscuous mode [ 38.763513][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 38.763525][ T29] audit: type=1400 audit(1751115775.358:81): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/root/syzkaller.5d9cfD/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.766198][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.774417][ T29] audit: type=1400 audit(1751115775.368:82): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 38.813188][ T3315] veth0_macvtap: entered promiscuous mode [ 38.822922][ T29] audit: type=1400 audit(1751115775.368:83): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/root/syzkaller.5d9cfD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 38.822987][ T29] audit: type=1400 audit(1751115775.368:84): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 38.838874][ T3305] veth0_macvtap: entered promiscuous mode [ 38.853990][ T29] audit: type=1400 audit(1751115775.368:85): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/root/syzkaller.5d9cfD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 38.881992][ T3306] veth0_macvtap: entered promiscuous mode [ 38.907995][ T29] audit: type=1400 audit(1751115775.368:86): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/root/syzkaller.5d9cfD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 38.929537][ T3315] veth1_macvtap: entered promiscuous mode [ 38.941015][ T29] audit: type=1400 audit(1751115775.368:87): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 38.970710][ T3305] veth1_macvtap: entered promiscuous mode [ 38.972218][ T29] audit: type=1400 audit(1751115775.568:88): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 38.996783][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.999225][ T29] audit: type=1400 audit(1751115775.568:89): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="gadgetfs" ino=3845 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.009629][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.038570][ T3309] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.041247][ T3306] veth1_macvtap: entered promiscuous mode [ 39.061988][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.073868][ T3307] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.082660][ T3307] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.091367][ T3307] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.100137][ T3307] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.113144][ T3305] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.114884][ T29] audit: type=1400 audit(1751115775.708:90): avc: denied { read write } for pid=3309 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.121935][ T3305] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.154597][ T3305] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.163361][ T3305] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.186806][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.206765][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.217318][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.225866][ T3306] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.234681][ T3306] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.243519][ T3306] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.252305][ T3306] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.266397][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.284989][ T3315] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.293816][ T3315] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.302720][ T3315] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.311542][ T3315] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.388244][ T3296] ================================================================== [ 39.396382][ T3296] BUG: KCSAN: data-race in avc_policy_seqno / avc_ss_reset [ 39.403602][ T3296] [ 39.406137][ T3296] write to 0xffffffff88e95d28 of 4 bytes by task 3481 on cpu 1: [ 39.413782][ T3296] avc_ss_reset+0x20c/0x240 [ 39.418324][ T3296] security_set_bools+0x301/0x340 [ 39.423365][ T3296] sel_commit_bools_write+0x1ea/0x270 [ 39.428755][ T3296] vfs_writev+0x403/0x8b0 [ 39.433102][ T3296] do_writev+0xe7/0x210 [ 39.437272][ T3296] __x64_sys_writev+0x45/0x50 [ 39.441965][ T3296] x64_sys_call+0x2006/0x2fb0 [ 39.446656][ T3296] do_syscall_64+0xd2/0x200 [ 39.451192][ T3296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.457096][ T3296] [ 39.459423][ T3296] read to 0xffffffff88e95d28 of 4 bytes by task 3296 on cpu 0: [ 39.466989][ T3296] avc_policy_seqno+0x15/0x30 [ 39.471683][ T3296] selinux_inode_permission+0x284/0x620 [ 39.477253][ T3296] security_inode_permission+0x6d/0xb0 [ 39.482739][ T3296] inode_permission+0x106/0x310 [ 39.487699][ T3296] link_path_walk+0x162/0x900 [ 39.492386][ T3296] __filename_parentat+0x15c/0x3f0 [ 39.497527][ T3296] do_unlinkat+0x99/0x4c0 [ 39.501879][ T3296] __x64_sys_unlink+0x2e/0x40 [ 39.506578][ T3296] x64_sys_call+0x22a6/0x2fb0 [ 39.511287][ T3296] do_syscall_64+0xd2/0x200 [ 39.515802][ T3296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.521707][ T3296] [ 39.524031][ T3296] value changed: 0x00000001 -> 0x00000002 [ 39.529754][ T3296] [ 39.532082][ T3296] Reported by Kernel Concurrency Sanitizer on: [ 39.538256][ T3296] CPU: 0 UID: 0 PID: 3296 Comm: udevd Not tainted 6.16.0-rc3-syzkaller-00190-g67a993863163 #0 PREEMPT(voluntary) [ 39.550244][ T3296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 39.560310][ T3296] ================================================================== [ 39.604842][ T3487] netlink: 96 bytes leftover after parsing attributes in process `syz.1.2'. [ 39.613607][ T3487] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2'. [ 39.631475][ T3487] 8021q: VLANs not supported on ip6tnl0 [ 39.815079][ T3476] hub 2-0:1.0: USB hub found [ 39.820215][ T3476] hub 2-0:1.0: 8 ports detected