last executing test programs: 248.50903ms ago: executing program 2 (id=3): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0, @ANYBLOB="a159b1b7c6d1f1b4680bb9a46146a94cf2cb0d0852b0fdbd5003ada46bf929b6f53ed21614e094599b432829cb6cbd705062e6dbe9253d8cc898290e7c"], 0x0, 0x14001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x4, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x80, 0x4) sendto$inet6(r1, &(0x7f0000000080)="ac", 0xfffd, 0x44004, &(0x7f0000000100)={0xa, 0x4e24, 0x8, @loopback, 0xc5f}, 0x1c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000740)='kfree\x00', r2, 0x0, 0x40008003}, 0x18) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000480)={'batadv0\x00', {0x2, 0x4e23, @local}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0x7}, 0x18) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000800), 0x8000, 0x0) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x2, 0x0, 0x5}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x9}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x15}}, @NFQA_CFG_CMD={0x8, 0x1, {0x4, 0x0, 0x8}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x24000040) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)=0x9) r6 = dup(r5) ioctl$GIO_UNISCRNMAP(r6, 0x43403d0e, 0x0) 214.952453ms ago: executing program 4 (id=5): socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0xc0}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x94}, 0x40}], 0x1, 0x2, 0x0) 81.497854ms ago: executing program 0 (id=1): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) prctl$PR_SCHED_CORE(0x4d, 0x1, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r2) socket(0x1e, 0x4, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f00000007c0)='ext4\x00', &(0x7f00000006c0)='./file1\x00', 0x40, &(0x7f00000000c0)={[{@user_xattr}, {@nodioread_nolock}]}, 0x1, 0x576, &(0x7f0000000140)="$eJzs3T1sG2UfAPD/neO3X3nf9JXeVwLUoQKkIlV1kn5AYWpXRKVKHZBYIHLcqIoTV7EDTZQh3StEBwSoS9lgYAQxMCAWRlYWEDNSRSOQmg5g5K80TZzglDouud9POvuee87+P8+d/499pzs5gMw62nhII56OiItJxMi6uqFoVx5trbe6slS8v7JUTKJev/RLEklE3FtZKnbWT9rPhyJiOSKeiohv8hHH081xqwuL0xPlcmmuXR6tzVwdrS4snrgyMzFVmirNnnrp5TNnT58ZPzm+/mX36+tL+Z319caPN9+98d2rt29++tmR5eL7E0mci+F23fp+PE6tbZKPcxuWn+5HsAFKBt0AHkmuneeNVPp/jESunfXd1Ed2tWlAn9X3RdSBjErkP2RU53dA4/i3M+3m748751sHII24q+2pVTPUOjcR+5vHJgd/TR46Mmkcbx7ezYayJy1fj4ixoaHNn/+k/fl7dGOPo4H01dfnWztq8/5P18af6DL+DHfOnf5NnfFvddP49yB+bovx72KPMX5/46ePtox/PeKZrvGTtfhJl/hpRLzVY/xbr395dqu6+scRx6J7/I5k+/PDo5evlEtjrceuMb46duSV7fp/cIv4rXO2+5tfM922f5fT2l198e3nzy5vE/+F57bf/922/4GIeK/H+P+998lrW9XduZ7cbfwK2On+TyIft3uM/+K5oz/0uCoAAAAAAAAAALADafNatiQtrM2naaHQuof3f3EwLVeqteOXK/Ozk61r3g5HPu1caTXSKieN8nj7etxO+eSG8qlcO2DuQLNcKFbKkwPuOwAAAAAAAAAAAAAAAAAAADwpDm24//+3XPP+/41/Vw3sVVv/5Tew18l/yK6H8z8ZWDuA3ef7HzKrLv8hu+Q/ZJf8h+yS/5Bd8h+yS/5Ddsl/AAAAAAAAAAAAAAAAAAAAAAAAAADoi4sXLjSm+v2VpWKjPDm0MD9defvEZKk6XZiZLxaKlbmrhalKZapcKhQrM3/1fkmlcnUsZuevjdZK1dpodWHxzZnK/GznP0VL+b73CAAAAAAAAAAAAAAAAAAAAP55hptTkhYiIm3Op2mhEPHviDicRHL5Srk0FhH/iYjvc/l9jfL4oBsNAAAAAAAAAAAAAAAAAAAAe0x1YXF6olwuzWVkZmgnK0fE8uNtRuMdd/yqfHtfPSnb0EwWZgY8MAEAAAAAAAAAAAAAAAAAQAY9uOm311f80d8GAQAAAAAAAAAAAAAAAAAAQCalPycR0ZiOjTw/vLH2X8lqrvkcEe/cuvTBtYlabW68sfzu2vLah+3lJwfRfqBXnTzt5DEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwQHVhcXqiXC7N9XFm0H0EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeBR/BgAA///eANcP") sendmsg$nl_route_sched(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) 47.921646ms ago: executing program 1 (id=2): r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x94}, 0x40}], 0x1, 0x2, 0x0) 38.980377ms ago: executing program 3 (id=4): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0, r1}, 0x18) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) io_submit(r3, 0x11ff, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 0s ago: executing program 2 (id=6): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) syz_usb_connect(0x2, 0xfffffffffffffe86, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) kernel console output (not intermixed with test programs): [ 22.002062][ T29] audit: type=1400 audit(1765560599.636:62): avc: denied { search } for pid=3199 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.024072][ T29] audit: type=1400 audit(1765560599.636:63): avc: denied { search } for pid=3199 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=477 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.046835][ T29] audit: type=1400 audit(1765560599.636:64): avc: denied { search } for pid=3199 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.069749][ T29] audit: type=1400 audit(1765560599.636:65): avc: denied { search } for pid=3199 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.092748][ T29] audit: type=1400 audit(1765560599.646:66): avc: denied { read open } for pid=3200 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.218' (ED25519) to the list of known hosts. [ 28.494357][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 28.494374][ T29] audit: type=1400 audit(1765560606.136:70): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.523420][ T29] audit: type=1400 audit(1765560606.166:71): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.524475][ T3305] cgroup: Unknown subsys name 'net' [ 28.551244][ T29] audit: type=1400 audit(1765560606.186:72): avc: denied { unmount } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.692902][ T3305] cgroup: Unknown subsys name 'cpuset' [ 28.699292][ T3305] cgroup: Unknown subsys name 'rlimit' [ 28.850858][ T29] audit: type=1400 audit(1765560606.486:73): avc: denied { setattr } for pid=3305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.874140][ T29] audit: type=1400 audit(1765560606.486:74): avc: denied { create } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.894715][ T29] audit: type=1400 audit(1765560606.496:75): avc: denied { write } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.915366][ T29] audit: type=1400 audit(1765560606.496:76): avc: denied { read } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.935649][ T29] audit: type=1400 audit(1765560606.496:77): avc: denied { read } for pid=3046 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 28.956560][ T29] audit: type=1400 audit(1765560606.516:78): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.965736][ T3309] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 28.981513][ T29] audit: type=1400 audit(1765560606.516:79): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 29.031071][ T3305] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.113734][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 31.142839][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 31.185436][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 31.194536][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 31.280584][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.287882][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.295253][ T3316] bridge_slave_0: entered allmulticast mode [ 31.301724][ T3316] bridge_slave_0: entered promiscuous mode [ 31.326390][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.333577][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.340790][ T3316] bridge_slave_1: entered allmulticast mode [ 31.347338][ T3316] bridge_slave_1: entered promiscuous mode [ 31.358649][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.365887][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.373161][ T3315] bridge_slave_0: entered allmulticast mode [ 31.379678][ T3315] bridge_slave_0: entered promiscuous mode [ 31.403003][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 31.412378][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.419548][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.426892][ T3315] bridge_slave_1: entered allmulticast mode [ 31.433533][ T3315] bridge_slave_1: entered promiscuous mode [ 31.451130][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.468382][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.475547][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.482815][ T3320] bridge_slave_0: entered allmulticast mode [ 31.489513][ T3320] bridge_slave_0: entered promiscuous mode [ 31.495956][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.503210][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.510461][ T3318] bridge_slave_0: entered allmulticast mode [ 31.516908][ T3318] bridge_slave_0: entered promiscuous mode [ 31.524568][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.548685][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.555852][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.563136][ T3320] bridge_slave_1: entered allmulticast mode [ 31.569741][ T3320] bridge_slave_1: entered promiscuous mode [ 31.576319][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.583451][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.590669][ T3318] bridge_slave_1: entered allmulticast mode [ 31.597297][ T3318] bridge_slave_1: entered promiscuous mode [ 31.615172][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.636682][ T3316] team0: Port device team_slave_0 added [ 31.643530][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.665388][ T3316] team0: Port device team_slave_1 added [ 31.677339][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.687706][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.710870][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.721320][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.746420][ T3315] team0: Port device team_slave_0 added [ 31.766868][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.773921][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.800282][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.811972][ T3315] team0: Port device team_slave_1 added [ 31.823867][ T3318] team0: Port device team_slave_0 added [ 31.829584][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.836724][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.843967][ T3319] bridge_slave_0: entered allmulticast mode [ 31.850510][ T3319] bridge_slave_0: entered promiscuous mode [ 31.857383][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.864362][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.890365][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.907367][ T3320] team0: Port device team_slave_0 added [ 31.913820][ T3318] team0: Port device team_slave_1 added [ 31.919754][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.926888][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.934740][ T3319] bridge_slave_1: entered allmulticast mode [ 31.941246][ T3319] bridge_slave_1: entered promiscuous mode [ 31.967272][ T3320] team0: Port device team_slave_1 added [ 31.991243][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.000699][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.007725][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.033645][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.044797][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.051792][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.078252][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.095622][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.105094][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.112223][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.138291][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.149357][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.156413][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.182355][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.193532][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.200540][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.226585][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.266980][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.273988][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.300023][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.322408][ T3319] team0: Port device team_slave_0 added [ 32.338197][ T3316] hsr_slave_0: entered promiscuous mode [ 32.344394][ T3316] hsr_slave_1: entered promiscuous mode [ 32.357047][ T3319] team0: Port device team_slave_1 added [ 32.365142][ T3315] hsr_slave_0: entered promiscuous mode [ 32.371140][ T3315] hsr_slave_1: entered promiscuous mode [ 32.377077][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 32.382923][ T3315] Cannot create hsr debugfs directory [ 32.402493][ T3318] hsr_slave_0: entered promiscuous mode [ 32.408537][ T3318] hsr_slave_1: entered promiscuous mode [ 32.414652][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 32.420375][ T3318] Cannot create hsr debugfs directory [ 32.443092][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.450067][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.476128][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.501388][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.508396][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.534528][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.559479][ T3320] hsr_slave_0: entered promiscuous mode [ 32.565703][ T3320] hsr_slave_1: entered promiscuous mode [ 32.571601][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 32.577441][ T3320] Cannot create hsr debugfs directory [ 32.653416][ T3319] hsr_slave_0: entered promiscuous mode [ 32.659388][ T3319] hsr_slave_1: entered promiscuous mode [ 32.665451][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 32.671175][ T3319] Cannot create hsr debugfs directory [ 32.808368][ T3316] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 32.820246][ T3316] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 32.832251][ T3316] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 32.846641][ T3316] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 32.872158][ T3318] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 32.881375][ T3318] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 32.894327][ T3318] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 32.913530][ T3318] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 32.933089][ T3315] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 32.945079][ T3315] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 32.962799][ T3315] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 32.971767][ T3315] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 32.992016][ T3320] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 33.003495][ T3320] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 33.012351][ T3320] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 33.029528][ T3320] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 33.053403][ T3319] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 33.065843][ T3319] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 33.075335][ T3319] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 33.087515][ T3319] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 33.110240][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.147707][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.161922][ T1665] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.169026][ T1665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.188253][ T1665] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.195376][ T1665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.214327][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.254928][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.267902][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.277862][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.286940][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.298784][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.305978][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.328844][ T826] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.335935][ T826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.347770][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.361195][ T826] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.368464][ T826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.386307][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.395598][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.408771][ T826] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.416063][ T826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.425184][ T826] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.432308][ T826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.447620][ T826] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.454718][ T826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.469452][ T826] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.476551][ T826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.494122][ T826] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.501201][ T826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.521037][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.608930][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.694636][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.709827][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.743899][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.774770][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.821003][ T3316] veth0_vlan: entered promiscuous mode [ 33.859453][ T3316] veth1_vlan: entered promiscuous mode [ 33.893779][ T3320] veth0_vlan: entered promiscuous mode [ 33.914506][ T3319] veth0_vlan: entered promiscuous mode [ 33.926391][ T3320] veth1_vlan: entered promiscuous mode [ 33.938294][ T3318] veth0_vlan: entered promiscuous mode [ 33.956324][ T3319] veth1_vlan: entered promiscuous mode [ 33.963209][ T3318] veth1_vlan: entered promiscuous mode [ 33.970124][ T3316] veth0_macvtap: entered promiscuous mode [ 33.987830][ T3315] veth0_vlan: entered promiscuous mode [ 33.994312][ T3316] veth1_macvtap: entered promiscuous mode [ 34.007982][ T3315] veth1_vlan: entered promiscuous mode [ 34.026508][ T3320] veth0_macvtap: entered promiscuous mode [ 34.034573][ T3319] veth0_macvtap: entered promiscuous mode [ 34.042779][ T3320] veth1_macvtap: entered promiscuous mode [ 34.050571][ T3319] veth1_macvtap: entered promiscuous mode [ 34.058072][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.073488][ T3318] veth0_macvtap: entered promiscuous mode [ 34.080488][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.096077][ T826] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.105533][ T3318] veth1_macvtap: entered promiscuous mode [ 34.113154][ T826] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.123779][ T826] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.135286][ T826] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.144478][ T3315] veth0_macvtap: entered promiscuous mode [ 34.154839][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.164615][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.175627][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.185795][ T3315] veth1_macvtap: entered promiscuous mode [ 34.198007][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.205918][ T68] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.221397][ T68] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.234501][ T68] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.245566][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.253809][ T68] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.262816][ T68] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.279028][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 34.279042][ T29] audit: type=1400 audit(1765560611.916:90): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.U4VmPR/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 34.310202][ T29] audit: type=1400 audit(1765560611.916:91): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 34.332277][ T29] audit: type=1400 audit(1765560611.916:92): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.U4VmPR/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 34.337177][ T68] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.357604][ T29] audit: type=1400 audit(1765560611.916:93): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 34.367828][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.388154][ T29] audit: type=1400 audit(1765560611.916:94): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.U4VmPR/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 34.400708][ T68] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.422027][ T29] audit: type=1400 audit(1765560611.926:95): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.U4VmPR/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4775 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 34.458209][ T29] audit: type=1400 audit(1765560611.926:96): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 34.482820][ T29] audit: type=1400 audit(1765560611.946:97): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 34.484362][ T68] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.505865][ T29] audit: type=1400 audit(1765560611.946:98): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="gadgetfs" ino=4777 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 34.541074][ T68] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.552900][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.562681][ T3316] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 34.566969][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.586524][ T68] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.604674][ T68] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.609430][ T29] audit: type=1400 audit(1765560612.246:99): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 34.653295][ T68] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.680909][ T68] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.741769][ T3489] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 34.760788][ T826] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.793534][ T826] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.890051][ T3496] syzkaller0: entered promiscuous mode [ 34.895703][ T3496] syzkaller0: entered allmulticast mode [ 34.937978][ T826] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.953406][ T3409] ================================================================== [ 34.961535][ T3409] BUG: KCSAN: data-race in __mod_timer / __mod_timer [ 34.968256][ T3409] [ 34.970610][ T3409] write to 0xffff88811b75c470 of 8 bytes by task 1038 on cpu 0: [ 34.978261][ T3409] __mod_timer+0x784/0x840 [ 34.982801][ T3409] mod_timer+0x1f/0x30 [ 34.986888][ T3409] wg_timers_any_authenticated_packet_traversal+0xd0/0x100 [ 34.994122][ T3409] wg_packet_tx_worker+0xeb/0x330 [ 34.999160][ T3409] process_scheduled_works+0x4ce/0x9d0 [ 35.004645][ T3409] worker_thread+0x582/0x770 [ 35.009255][ T3409] kthread+0x489/0x510 [ 35.013342][ T3409] ret_from_fork+0x149/0x290 [ 35.017948][ T3409] ret_from_fork_asm+0x1a/0x30 [ 35.022738][ T3409] [ 35.025064][ T3409] read to 0xffff88811b75c470 of 8 bytes by task 3409 on cpu 1: [ 35.032620][ T3409] __mod_timer+0x69/0x840 [ 35.037061][ T3409] mod_timer+0x1f/0x30 [ 35.041148][ T3409] wg_timers_any_authenticated_packet_traversal+0xd0/0x100 [ 35.048367][ T3409] wg_packet_rx_poll+0x7f5/0x1160 [ 35.053433][ T3409] __napi_poll+0x5f/0x300 [ 35.057792][ T3409] napi_threaded_poll_loop+0x1ac/0x630 [ 35.063269][ T3409] napi_threaded_poll+0x164/0x200 [ 35.068312][ T3409] kthread+0x489/0x510 [ 35.072407][ T3409] ret_from_fork+0x149/0x290 [ 35.077019][ T3409] ret_from_fork_asm+0x1a/0x30 [ 35.081907][ T3409] [ 35.084238][ T3409] value changed: 0x00000000ffff9f98 -> 0x00000000ffff9fb0 [ 35.091344][ T3409] [ 35.093686][ T3409] Reported by Kernel Concurrency Sanitizer on: [ 35.099940][ T3409] CPU: 1 UID: 0 PID: 3409 Comm: napi/wg2-0 Not tainted syzkaller #0 PREEMPT(voluntary) [ 35.109773][ T3409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 35.119930][ T3409] ================================================================== [ 35.131776][ T3506] loop0: detected capacity change from 0 to 1024 [ 35.142522][ T3506] ======================================================= [ 35.142522][ T3506] WARNING: The mand mount option has been deprecated and [ 35.142522][ T3506] and is ignored by this kernel. Remove the mand [ 35.142522][ T3506] option from the mount to silence this warning. [ 35.142522][ T3506] ======================================================= [ 35.194669][ T3506] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.224143][ T3506] ext4 filesystem being mounted at /0/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.411650][ T3319] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.912227][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 36.912443][ T3505] Bluetooth: hci0: command 0x1003 tx timeout