last executing test programs: 851.351726ms ago: executing program 0 (id=1): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in=@empty, 0x0, 0x3}}, 0xe8) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="22cf330000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r3}, 0x10) r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002080)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x11}, {0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffb}}}, 0xb8}}, 0x20004800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r6 = syz_io_uring_setup(0x10d2, &(0x7f0000000480)={0x0, 0x758e, 0x80, 0x0, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000200)=[{0x32, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}) io_uring_enter(r6, 0x47bc, 0x0, 0x0, 0x0, 0x0) 816.800179ms ago: executing program 1 (id=2): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffff9}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xff, 0x30}, 0xc) finit_module(0xffffffffffffffff, 0x0, 0x7) r3 = socket(0x2, 0x2, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r3) sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="deffffff", @ANYRES16=r4, @ANYBLOB="000227bd7000fedbdf25260000000800420002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x20000080) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xa6, 0x4b}}}}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x80044) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000100)=0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={r0, r2}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x9}, 0x18) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17"], 0x48) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x1800000}, 0xc) 740.983046ms ago: executing program 1 (id=6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="7f454c4600000006010000000000000003003e000000000003000000000000004000000000000000980100000000000002000000000038000200000002000000000000600300000008000000000000000d00000000000000ed08000000000000f0ffffffffffffff0000000000000000080000000000000003"], 0x5b0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000180)='kfree\x00', r2}, 0x18) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) 682.793162ms ago: executing program 3 (id=4): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001d00)={&(0x7f00000017c0)={0x2, 0x0, @private=0xa010101}, 0x10, 0x0}, 0x0) 597.110731ms ago: executing program 2 (id=3): syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000021000000850000001b000000b7000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) socket(0x10, 0x803, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r3, &(0x7f0000004200)='t', 0x1) sendfile(r3, r2, 0x0, 0x3ffff) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000080)=0x7, 0x4) syz_emit_ethernet(0x2a, &(0x7f00000003c0)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xc7, 0x11, 0x0, @empty, @empty}, {0x1, 0x4e20, 0x8}}}}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000036c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) 574.287203ms ago: executing program 3 (id=7): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r0], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffffffffffff001}, 0x18) socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x30) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x40000, 0x0) fcntl$notify(r3, 0x402, 0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x40000, 0x0) fsopen(&(0x7f0000000100)='configfs\x00', 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r5, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr=0x91ff}, 0x10) shutdown(r5, 0x1) recvfrom(r5, &(0x7f0000000000)=""/116, 0xffffffdd, 0x734, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r4, &(0x7f00000009c0)=[{{&(0x7f0000000080)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x3}, 0x80, 0x0}}], 0x1, 0x4c000) syz_usb_connect(0x5, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x96, 0x5d, 0x6, 0x40, 0x133e, 0x815, 0x7e66, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x87, 0x28}}]}}]}}, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53048fc) 525.261728ms ago: executing program 1 (id=8): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r1, 0x8993, &(0x7f0000000080)={'bond0\x00', &(0x7f00000001c0)=@ethtool_perm_addr}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES64=r0], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2, 0x0, 0x1}, 0x18) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000f80), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b7b6496af6eae70b0b44c82c55d493057b86d56d76e4c1172186e842c6c7ab909a6a15078eea63475f3f9116066070402f7e18484f78db532feaaf068358e6f50b7f8ed2d1e7f324f004bce68899094408c172539b847926e4e48436cf38de900d678332938205b50de50e20dea09db03c3d16d99dfa49a79209ae70adf084f4e4f883874e7197e1d7db6d8adf33537ce3d1acfbfdff80a3784ad59d8667715de34216c2c39a84ed5cb67a24ac2c7aede3ddcb9af1969fd0ca5f56d600570c98366406db7af687de072ce3ad7e1d72a9654763a8bc6751b09738907f28b10fa01bb0fa0d31d9049f61262b73f80ab05683e4993ed21abf9b", @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x40080}, 0x10) socket$inet(0x2, 0x3, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0700000004000000800000000100000028000000f113a283b1508af3bb2c0000bb10c46c01983d23c9c4ce3ee494f974", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="e5a56d88594e255558e5ded758fab2436dbdafc667b8a7050df9bc651d004e", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0), 0x48200, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000140)=0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) membarrier(0x40, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x2008042, &(0x7f00000000c0), 0x1, 0x571, &(0x7f0000000780)="$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") open(&(0x7f0000000080)='./bus\x00', 0x147842, 0x49) mknod$loop(0x0, 0x2000, 0x0) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 424.366478ms ago: executing program 4 (id=5): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in=@empty, 0x0, 0x3}}, 0xe8) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="22cf330000000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r3}, 0x10) r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002080)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x11}, {0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffb}}}, 0xb8}}, 0x20004800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r6 = syz_io_uring_setup(0x10d2, &(0x7f0000000480)={0x0, 0x758e, 0x80, 0x0, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000200)=[{0x32, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}) io_uring_enter(r6, 0x47bc, 0x0, 0x0, 0x0, 0x0) 350.360005ms ago: executing program 0 (id=9): mknodat$null(0xffffffffffffff9c, 0x0, 0xb0a54e68b1cd2fdb, 0x103) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_emit_ethernet(0x6e, &(0x7f00000005c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x5dc, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0xff, @loopback={0x4000000}, @local, [@fragment={0x1d, 0x0, 0xd, 0x1, 0x0, 0xe, 0x68}]}}}}}}}, 0x0) 264.108354ms ago: executing program 0 (id=10): prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x40, 0x7fff0000}]}) getpriority(0x1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) syz_io_uring_setup(0x70ca, &(0x7f0000000080)={0x0, 0x0, 0x10100, 0x3, 0x179}, &(0x7f0000000100)=0x0, &(0x7f00000007c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x40, 0x0, @fd=r2, 0x0, 0x0}) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000280)={0x9, &(0x7f00000003c0)=[{0x3, 0x3, 0xde, 0x7f}, {0x6, 0x9, 0xfb, 0x3}, {0x0, 0x9, 0x8, 0x7}, {0xff, 0x4, 0x0, 0x7f}, {0xe, 0x3, 0x10, 0x7fffffff}, {0x3, 0x9, 0x1, 0x6}, {0x2, 0xff, 0x8, 0x7fff}, {0xf, 0xcf, 0xd1, 0x5}, {0x4, 0x5, 0x3, 0x8}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b000000000000"], 0x48) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/devices.allow\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000000080), 0x0, 0x0, 0x1) getdents(0xffffffffffffffff, &(0x7f0000001fc0)=""/184, 0x20002078) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syslog(0x2, &(0x7f0000000fc0)=""/194, 0xc2) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x94) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a0010000100001000000000000000000fe880000000000000000000000000101ac1414bb00000000000000000000000000000000000000000a00000064000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x1a0}}, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/94, 0x5e) 126.210328ms ago: executing program 1 (id=11): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x1000000000000}, 0x18) syz_emit_ethernet(0x36, &(0x7f0000000c40)={@local, @remote, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x0, 0x0, 0x0, @private2, @local}}}}, 0x0) 80.529522ms ago: executing program 1 (id=12): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$int_in(r0, 0x5452, &(0x7f0000000280)=0x3a0af83a) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x1000000}, 0x94) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x800002, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000200)=0x7ffffffc) ioctl$EVIOCGRAB(r2, 0x40044590, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="18020000010000000000000000000006850000008700000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000004000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0x2, 0x0, &(0x7f0000000080)="b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x50) shutdown(r0, 0x0) 0s ago: executing program 1 (id=13): mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_emit_ethernet(0x6e, &(0x7f00000005c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x5dc, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0xff, @loopback={0x4000000}, @local, [@fragment={0x1d, 0x0, 0xd, 0x1, 0x0, 0xe, 0x68}]}}}}}}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.21' (ED25519) to the list of known hosts. [ 28.656273][ T29] audit: type=1400 audit(1760011792.456:62): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.683743][ T29] audit: type=1400 audit(1760011792.476:63): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.684848][ T3298] cgroup: Unknown subsys name 'net' [ 28.714281][ T29] audit: type=1400 audit(1760011792.516:64): avc: denied { unmount } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.834954][ T3298] cgroup: Unknown subsys name 'cpuset' [ 28.841543][ T3298] cgroup: Unknown subsys name 'rlimit' [ 29.014444][ T29] audit: type=1400 audit(1760011792.816:65): avc: denied { setattr } for pid=3298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 29.043086][ T29] audit: type=1400 audit(1760011792.816:66): avc: denied { create } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.065937][ T29] audit: type=1400 audit(1760011792.816:67): avc: denied { write } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.078880][ T3304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.086727][ T29] audit: type=1400 audit(1760011792.816:68): avc: denied { read } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.116114][ T29] audit: type=1400 audit(1760011792.836:69): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.116141][ T3298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.142295][ T29] audit: type=1400 audit(1760011792.836:70): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 29.174256][ T29] audit: type=1400 audit(1760011792.896:71): avc: denied { relabelto } for pid=3304 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 31.187234][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 31.296024][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.303239][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.310649][ T3313] bridge_slave_0: entered allmulticast mode [ 31.317395][ T3313] bridge_slave_0: entered promiscuous mode [ 31.327060][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.334795][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.342009][ T3313] bridge_slave_1: entered allmulticast mode [ 31.348555][ T3313] bridge_slave_1: entered promiscuous mode [ 31.371251][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.380976][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 31.399309][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.421888][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 31.452314][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 31.462511][ T3313] team0: Port device team_slave_0 added [ 31.486201][ T3313] team0: Port device team_slave_1 added [ 31.546009][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.553555][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.561038][ T3310] bridge_slave_0: entered allmulticast mode [ 31.567695][ T3310] bridge_slave_0: entered promiscuous mode [ 31.576966][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.584576][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.610620][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.633089][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 31.641846][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.650661][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.659310][ T3310] bridge_slave_1: entered allmulticast mode [ 31.666360][ T3310] bridge_slave_1: entered promiscuous mode [ 31.683114][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.690575][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.718660][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.731052][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.739006][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.746726][ T3311] bridge_slave_0: entered allmulticast mode [ 31.753998][ T3311] bridge_slave_0: entered promiscuous mode [ 31.786918][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.796271][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.805082][ T3311] bridge_slave_1: entered allmulticast mode [ 31.813204][ T3311] bridge_slave_1: entered promiscuous mode [ 31.826441][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.869022][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.885359][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.892601][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.900366][ T3318] bridge_slave_0: entered allmulticast mode [ 31.908028][ T3318] bridge_slave_0: entered promiscuous mode [ 31.915653][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.924550][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.932460][ T3318] bridge_slave_1: entered allmulticast mode [ 31.939776][ T3318] bridge_slave_1: entered promiscuous mode [ 31.979781][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.001502][ T3310] team0: Port device team_slave_0 added [ 32.016041][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.031668][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.047680][ T3310] team0: Port device team_slave_1 added [ 32.058398][ T3313] hsr_slave_0: entered promiscuous mode [ 32.065094][ T3313] hsr_slave_1: entered promiscuous mode [ 32.077226][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.087598][ T3311] team0: Port device team_slave_0 added [ 32.093610][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.100871][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.109637][ T3317] bridge_slave_0: entered allmulticast mode [ 32.116304][ T3317] bridge_slave_0: entered promiscuous mode [ 32.131815][ T3311] team0: Port device team_slave_1 added [ 32.144398][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.151785][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.159285][ T3317] bridge_slave_1: entered allmulticast mode [ 32.166255][ T3317] bridge_slave_1: entered promiscuous mode [ 32.180645][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.188138][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.215514][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.253404][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.262372][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.300603][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.321754][ T3318] team0: Port device team_slave_0 added [ 32.334685][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.347593][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.358697][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.366656][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.394404][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.406358][ T3318] team0: Port device team_slave_1 added [ 32.413904][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.423052][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.453978][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.505611][ T3317] team0: Port device team_slave_0 added [ 32.520231][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.528278][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.558641][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.581333][ T3317] team0: Port device team_slave_1 added [ 32.596285][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.604516][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.649187][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.668677][ T3310] hsr_slave_0: entered promiscuous mode [ 32.676088][ T3310] hsr_slave_1: entered promiscuous mode [ 32.684941][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 32.693456][ T3310] Cannot create hsr debugfs directory [ 32.730887][ T3311] hsr_slave_0: entered promiscuous mode [ 32.737775][ T3311] hsr_slave_1: entered promiscuous mode [ 32.744762][ T3311] debugfs: 'hsr0' already exists in 'hsr' [ 32.752165][ T3311] Cannot create hsr debugfs directory [ 32.775047][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.785810][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.817107][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.847370][ T3318] hsr_slave_0: entered promiscuous mode [ 32.854309][ T3318] hsr_slave_1: entered promiscuous mode [ 32.861332][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 32.868236][ T3318] Cannot create hsr debugfs directory [ 32.874330][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.883179][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.915620][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.993797][ T3317] hsr_slave_0: entered promiscuous mode [ 33.000650][ T3317] hsr_slave_1: entered promiscuous mode [ 33.007677][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 33.013523][ T3317] Cannot create hsr debugfs directory [ 33.141050][ T3313] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 33.158262][ T3313] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 33.167742][ T3313] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 33.186743][ T3313] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 33.236953][ T3310] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 33.248816][ T3310] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 33.259285][ T3310] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 33.280816][ T3310] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 33.309450][ T3311] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 33.326303][ T3311] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 33.339987][ T3311] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 33.351698][ T3311] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 33.390871][ T3318] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 33.400663][ T3318] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 33.412754][ T3318] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 33.429591][ T3318] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 33.470137][ T3317] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 33.484582][ T3317] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 33.499267][ T3317] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 33.510158][ T3317] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 33.537208][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.561797][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.586709][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.594066][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.605449][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.618658][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.628185][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.659416][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.686340][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.694182][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.710826][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.721132][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.800272][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.815273][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.839483][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.861287][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.870900][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.880853][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.893280][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.906238][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.915077][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.925215][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.934715][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.950856][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.961893][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.971189][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.983924][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.991666][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.001107][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.010111][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.026869][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.034215][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.061458][ T3311] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.072382][ T3311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.103691][ T3317] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.115613][ T3317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.166994][ T3318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.260977][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.297654][ T3313] veth0_vlan: entered promiscuous mode [ 34.321636][ T3313] veth1_vlan: entered promiscuous mode [ 34.339677][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.351726][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.373469][ T3310] veth0_vlan: entered promiscuous mode [ 34.405611][ T3310] veth1_vlan: entered promiscuous mode [ 34.437906][ T3313] veth0_macvtap: entered promiscuous mode [ 34.457253][ T3313] veth1_macvtap: entered promiscuous mode [ 34.484588][ T3310] veth0_macvtap: entered promiscuous mode [ 34.498039][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.511590][ T3317] veth0_vlan: entered promiscuous mode [ 34.524756][ T3310] veth1_macvtap: entered promiscuous mode [ 34.537333][ T3317] veth1_vlan: entered promiscuous mode [ 34.561542][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.579016][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.591973][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.610980][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.631244][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.643049][ T3318] veth0_vlan: entered promiscuous mode [ 34.653557][ T3317] veth0_macvtap: entered promiscuous mode [ 34.667274][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.687374][ T3317] veth1_macvtap: entered promiscuous mode [ 34.700278][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.716256][ T3318] veth1_vlan: entered promiscuous mode [ 34.727118][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.749638][ T3311] veth0_vlan: entered promiscuous mode [ 34.756131][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.767320][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.778598][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.788619][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 34.788632][ T29] audit: type=1400 audit(1760011798.576:81): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/root/syzkaller.Rx3myG/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 34.810833][ T3318] veth0_macvtap: entered promiscuous mode [ 34.822316][ T29] audit: type=1400 audit(1760011798.576:82): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 34.833170][ T3318] veth1_macvtap: entered promiscuous mode [ 34.856472][ T29] audit: type=1400 audit(1760011798.576:83): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/root/syzkaller.Rx3myG/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 34.856503][ T29] audit: type=1400 audit(1760011798.576:84): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 34.873480][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.921114][ T29] audit: type=1400 audit(1760011798.586:85): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/root/syzkaller.Rx3myG/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 34.947865][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.971196][ T29] audit: type=1400 audit(1760011798.586:86): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/root/syzkaller.Rx3myG/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3890 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 34.982319][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.011633][ T29] audit: type=1400 audit(1760011798.586:87): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 35.045331][ T29] audit: type=1400 audit(1760011798.816:88): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 35.050143][ T3311] veth1_vlan: entered promiscuous mode [ 35.074410][ T29] audit: type=1400 audit(1760011798.816:89): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="gadgetfs" ino=3933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 35.107470][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.127554][ T3310] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 35.148023][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.156684][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.168306][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.190037][ T29] audit: type=1400 audit(1760011798.986:90): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 35.240877][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.272693][ T3311] veth0_macvtap: entered promiscuous mode [ 35.282324][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.311797][ T3311] veth1_macvtap: entered promiscuous mode [ 35.312530][ T3486] process 'syz.1.6' launched './file1' with NULL argv: empty string added [ 35.321530][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.357969][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.377619][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.392547][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.410507][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.447440][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.492526][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.512395][ T3494] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 35.522750][ T3494] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 35.532516][ T3493] loop2: detected capacity change from 0 to 1024 [ 35.543601][ T3493] EXT4-fs: Ignoring removed orlov option [ 35.556340][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.559830][ T3493] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.579091][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.627605][ T3499] loop1: detected capacity change from 0 to 512 [ 35.635462][ T3499] ======================================================= [ 35.635462][ T3499] WARNING: The mand mount option has been deprecated and [ 35.635462][ T3499] and is ignored by this kernel. Remove the mand [ 35.635462][ T3499] option from the mount to silence this warning. [ 35.635462][ T3499] ======================================================= [ 35.708978][ T3499] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.765195][ T3499] ext4 filesystem being mounted at /2/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 35.781422][ T3499] EXT4-fs error (device loop1): ext4_do_update_inode:5624: inode #2: comm syz.1.8: corrupted inode contents [ 35.811613][ T3499] EXT4-fs error (device loop1): ext4_dirty_inode:6509: inode #2: comm syz.1.8: mark_inode_dirty error [ 35.826412][ T3499] EXT4-fs error (device loop1): ext4_do_update_inode:5624: inode #2: comm syz.1.8: corrupted inode contents [ 35.842186][ T3499] EXT4-fs error (device loop1): __ext4_ext_dirty:206: inode #2: comm syz.1.8: mark_inode_dirty error [ 35.913870][ T3310] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.071649][ T3506] ================================================================== [ 36.080426][ T3506] BUG: KCSAN: data-race in filemap_splice_read / filemap_splice_read [ 36.089344][ T3506] [ 36.091782][ T3506] write to 0xffff88811385a9a8 of 8 bytes by task 3493 on cpu 1: [ 36.100064][ T3506] filemap_splice_read+0x4f4/0x740 [ 36.105496][ T3506] ext4_file_splice_read+0x8f/0xb0 [ 36.112789][ T3506] splice_direct_to_actor+0x26c/0x680 [ 36.119517][ T3506] do_splice_direct+0xda/0x150 [ 36.124899][ T3506] do_sendfile+0x380/0x650 [ 36.129644][ T3506] __x64_sys_sendfile64+0x105/0x150 [ 36.135699][ T3506] x64_sys_call+0x2bb4/0x3000 [ 36.140422][ T3506] do_syscall_64+0xd2/0x200 [ 36.145544][ T3506] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.151661][ T3506] [ 36.154032][ T3506] write to 0xffff88811385a9a8 of 8 bytes by task 3506 on cpu 0: [ 36.162420][ T3506] filemap_splice_read+0x4f4/0x740 [ 36.167945][ T3506] ext4_file_splice_read+0x8f/0xb0 [ 36.173681][ T3506] splice_direct_to_actor+0x26c/0x680 [ 36.179632][ T3506] do_splice_direct+0xda/0x150 [ 36.184699][ T3506] do_sendfile+0x380/0x650 [ 36.189686][ T3506] __x64_sys_sendfile64+0x105/0x150 [ 36.195023][ T3506] x64_sys_call+0x2bb4/0x3000 [ 36.199757][ T3506] do_syscall_64+0xd2/0x200 [ 36.204761][ T3506] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.210979][ T3506] [ 36.213342][ T3506] value changed: 0x0000000000000415 -> 0x0000000000000416 [ 36.220620][ T3506] [ 36.223258][ T3506] Reported by Kernel Concurrency Sanitizer on: [ 36.229946][ T3506] CPU: 0 UID: 0 PID: 3506 Comm: syz.2.3 Not tainted syzkaller #0 PREEMPT(voluntary) [ 36.240525][ T3506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 36.250857][ T3506] ================================================================== [ 36.470672][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.