last executing test programs: 2.540966336s ago: executing program 4 (id=1337): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x4001, 0x3, 0x200, 0xd0, 0x0, 0x148, 0xd0, 0x148, 0x168, 0x240, 0x240, 0x168, 0x240, 0x7fffffe, 0x0, {[{{@ip={@private=0xa010102, @local, 0xffffffff, 0x0, 'ip6gretap0\x00', 'nicvf0\x00', {}, {}, 0x88, 0x3, 0x8}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x85d, 0xf, [0x10, 0x32, 0x1e, 0x23, 0x2b, 0x25, 0x3f, 0x17, 0x19, 0x22, 0x2c, 0x3d, 0x7, 0x3f, 0x1e, 0x31], 0x0, 0x2, 0x2}}}, {{@ip={@rand_addr=0x64010101, @local, 0xffffffff, 0x0, 'tunl0\x00', 'veth1\x00', {0xff}, {}, 0x2e, 0x3, 0x4}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x0, 0x7ff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000080)=0x1, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x28040041, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8c0) recvmmsg(r0, &(0x7f00000005c0), 0x40000000000026c, 0x0, 0x0) 2.458068333s ago: executing program 3 (id=1341): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2d}}, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0x106}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)=@ipv6_newnexthop={0x18, 0x68, 0x1, 0x0, 0xfffffffe}, 0x18}, 0x1, 0x0, 0x0, 0x20008800}, 0x40040d1) sendto$inet6(r1, &(0x7f0000002a00)='D', 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f0000000240)) 1.640629139s ago: executing program 4 (id=1354): r0 = socket$igmp6(0xa, 0x3, 0x2) socket$inet6(0xa, 0x3, 0x100) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x8, 0x3, 0x4c8, 0x170, 0xffffffff, 0xffffffff, 0x170, 0xffffffff, 0x3f8, 0xffffffff, 0xffffffff, 0x3f8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0x148, 0x170, 0x0, {}, [@common=@unspec=@helper={{0x48}}, @common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x41, 0x1ff, 0x6, 0xb0e2, 0x10001, 0x84e, 0xfffffffb, 0x18, 0x8}, {0x1}}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'erspan0\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'vcan0\x00', {0x3, 0x0, 0x41, 0x0, 0x2, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x528) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00ed6a", 0x14, 0x2c, 0x0, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {[], {{0x1100, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 1.639281199s ago: executing program 4 (id=1355): socket(0x2, 0x3, 0xff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000300)=0xa8) pselect6(0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, &(0x7f0000000240)={0x1f, 0x0, 0x0, 0x3}, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x2000b3d) ioctl$TIOCSETD(r1, 0x5423, 0x0) 1.608704432s ago: executing program 2 (id=1357): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) setsockopt$inet_int(r0, 0x0, 0x21, &(0x7f0000000000)=0x8001, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fdinfo/4\x00') exit(0x3ff) pread64(r1, &(0x7f0000002140)=""/17, 0x11, 0x0) 1.552728757s ago: executing program 3 (id=1358): syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x9, 0x6, "977904", 0x14, 0x6, 0xff, @dev={0xfe, 0x80, '\x00', 0x39}, @local, {[], {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x1, 0x0, 0x5, 0x2, 0x7, 0x0, 0x3}}}}}}}, 0x0) 1.552407737s ago: executing program 3 (id=1359): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) open(&(0x7f0000000080)='./file1\x00', 0x64842, 0x86) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x9]}, 0x8, 0x80800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f00008dc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r1 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89d, 0xc000, 0xa, 0x20002f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xfff0}, {0xe, 0xffff}}}, 0x24}}, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r5 = socket$unix(0x1, 0x1, 0x0) connect$unix(r5, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 1.19873006s ago: executing program 0 (id=1360): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="20c048210440d8394cdcb9ee88a6b7584a3f07b1b1d67f42b2dda515bffbb8de861e60", 0x23}, {&(0x7f0000000800)="f6b328c40d4cc969a0513b8ffd72381d4ef4a89954104d4a81db2fa3c0f906a33482e2821787ac54c0c62da54d1c77255c322358d0e272be2ccacf8f689f0115afd7305a1ce39e8b54734910", 0x4c}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000005c0)="9ee7181532f8d436961a98", 0xb}, {&(0x7f0000000180)="b72363326fbcbfbfa6412ef4a1b80095f810c9aefb9eff687f3c90a0e74b5b9826dab01cbd21c428f54b94833dc79bdeb7f856a8b0dca450ba30c49c33665f39bd32244f9f986b61d0a8e9a81b6a92226376ab348bb52858c9522ad9b9383502876a7f0ec770f6b273d76feefdff062dc7a7f89d8b86a267c1e49e79c7af99c9d7fa7f488c2c50c5f2382182d59577fb7ea1f8d9da98c06b44532d7ac879d127c43fe1a87664d1f797e82934841ead61519eba18b0ea388e0037f19f3bb6056f432b2d55686df8ec441a6ea9bc80b90c2b325debe8ffd8e12170e228439cc0e0317cd98e206f70df268f3b2fe9a1e8d0063ffadb0c44cae039", 0xf9}, {&(0x7f00000006c0)="09a1c6d346e6a33f49a2f83513c60a820df71c2f", 0x14}, {&(0x7f0000001240)="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", 0x12e}], 0x4}}], 0x2, 0x48090) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000340)='dctcp', 0x5) sendto$inet(r0, &(0x7f0000000580)="17", 0x501, 0x10008095, 0x0, 0x0) 1.173244152s ago: executing program 0 (id=1361): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x3d) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) getdents64(r1, &(0x7f0000000100)=""/49, 0x31) getdents64(r1, 0xfffffffffffffffe, 0x29) 1.119844097s ago: executing program 0 (id=1362): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) close(0x3) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7a, &(0x7f0000000340)={r3, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(r1, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000"], 0x30}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000040)={0x0, 0x7, 0xd1}, 0x8) 1.048677854s ago: executing program 0 (id=1363): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @empty}], 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000068c000/0xc000)=nil, &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x1, 0x800000c1}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="16"], 0x50) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000001c0)='N', 0x1}], 0x1, 0x0, 0x0, 0xc04c000}, 0x0) 776.631609ms ago: executing program 4 (id=1365): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400"], 0x50) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e24, @empty}}, 0xf2a, 0x714, 0x38e8, 0x8, 0x80, 0x40008, 0x40}, &(0x7f0000000140)=0x9c) 734.090863ms ago: executing program 2 (id=1366): setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0x1b3a, 0x4) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 733.403343ms ago: executing program 2 (id=1367): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @empty, 0x3}], 0x1c) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x5, 0x30}, 0xc) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @loopback, 0x4}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000000c0)="88", 0x1}], 0x1}, 0x4048043) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x0, 0xfff, 0xfffffffa}, 0x10) shutdown(r1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x5, 0x3, 0xf06, 0x1, 0x94, 0xfffffffd, 0x5}, 0x9c) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x13f, 0x3}}, 0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e60, 0xfffffff2, @empty}}, 0xffffec47, 0x9, 0xffff1896, 0x100, 0x25, 0x7fff}, 0x9c) 672.826148ms ago: executing program 4 (id=1368): syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x291, &(0x7f0000000280)="$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") r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x120) getdents64(r0, 0xfffffffffffffffe, 0x41) 619.543183ms ago: executing program 4 (id=1369): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x4}, 0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0, 0x2a4e}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @empty}], 0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x5}, 0x8) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000001c0)='N', 0x1}], 0x1, 0x0, 0x0, 0xc04c000}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x1}, 0x8) 516.699173ms ago: executing program 2 (id=1370): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0x100120}], 0x1}, 0x0) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 452.788059ms ago: executing program 2 (id=1371): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa02, {{0x6000000, 0x0, 0x3073, @private0={0xfc, 0x0, '\x00', 0x10}}, {0xa, 0x1c, 0x8ae5, @dev={0xfe, 0x80, '\x00', 0xe}, 0x1}, r1, 0x8}}, 0x48) 452.469879ms ago: executing program 2 (id=1372): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r3, &(0x7f0000000500)=[{{&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='p'], 0x70}}], 0x1, 0x2000c044) write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc) io_setup(0x5, &(0x7f0000000440)=0x0) io_submit(r4, 0x1, &(0x7f00000005c0)=[&(0x7f0000000600)={0x0, 0x0, 0x0, 0x5, 0x404, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) splice(r0, 0x0, r2, 0x0, 0x7151, 0x0) 440.60443ms ago: executing program 3 (id=1373): socket$inet_tcp(0x2, 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/devices\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0xa, 0x20012f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40005}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 409.908332ms ago: executing program 3 (id=1374): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) open(&(0x7f0000000080)='./file1\x00', 0x64842, 0x86) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r1 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89c, 0xc000, 0xa, 0x20002f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xfff0}, {0xe, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x80e42, 0x0) read(r3, &(0x7f0000000040)=""/148, 0xffffff96) 354.340588ms ago: executing program 3 (id=1375): socket(0x2, 0x3, 0xff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000300)=0xa8) pselect6(0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, &(0x7f0000000240)={0x1f, 0x0, 0x0, 0x3}, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x2000b3d) ioctl$TIOCSETD(r1, 0x5423, 0x0) 234.785489ms ago: executing program 0 (id=1376): r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/49, 0x31) getdents64(r0, 0xfffffffffffffffe, 0x29) 172.731964ms ago: executing program 0 (id=1377): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0)={0x2, 0x4e20}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000340), &(0x7f0000000040)=@tcp=r0}, 0x20) sendto$inet(r0, &(0x7f0000000180)='\f', 0x1, 0x400002d, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000400)=""/229, 0xe5, 0x10001, 0x0, 0x0) 128.378158ms ago: executing program 1 (id=1380): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000200000000000000000000008500000041"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xf, 0x0, &(0x7f0000000500)="b973295358aef04543c1b88d672d48", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 68.752534ms ago: executing program 1 (id=1381): r0 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newtfilter={0x64, 0x2c, 0xf3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, {0xb, 0xa}, {0x2, 0xfff3}, {0xd, 0x300}}, [@filter_kind_options=@f_basic={{0xa}, {0x34, 0x2, [@TCA_BASIC_EMATCHES={0x28, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, 0x0, 0x1, [@TCF_EM_META={0x18, 0x1, 0x0, 0x0, {{0x7, 0x4, 0x4}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x5, 0xe, 0x1}, {0x5, 0xc0}}}]}}]}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0xf, 0xf}}]}}]}, 0x64}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) 68.498554ms ago: executing program 1 (id=1382): r0 = open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x2f0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$tcp_mem(r0, &(0x7f0000000240)={0xfffffffffffffffe, 0x2c, 0x0, 0x2c, 0x0, 0x2c}, 0x48) 68.203974ms ago: executing program 1 (id=1383): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x19, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r2, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = socket$inet_udp(0x2, 0x2, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) setsockopt$inet_int(r3, 0x0, 0x6, &(0x7f0000000180)=0x1f5, 0x4) 29.453028ms ago: executing program 1 (id=1384): socket$inet_tcp(0x2, 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/devices\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0xa, 0x20012f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40005}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 0s ago: executing program 1 (id=1385): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x5}, 0x48) syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000240)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x501, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.152' (ED25519) to the list of known hosts. [ 35.694235][ T29] audit: type=1400 audit(1766919847.126:62): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 35.717448][ T29] audit: type=1400 audit(1766919847.146:63): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 35.719730][ T3310] cgroup: Unknown subsys name 'net' [ 35.745227][ T29] audit: type=1400 audit(1766919847.176:64): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 35.862395][ T3310] cgroup: Unknown subsys name 'cpuset' [ 35.868706][ T3310] cgroup: Unknown subsys name 'rlimit' [ 36.020550][ T29] audit: type=1400 audit(1766919847.446:65): avc: denied { setattr } for pid=3310 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 36.051837][ T29] audit: type=1400 audit(1766919847.456:66): avc: denied { create } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.072351][ T29] audit: type=1400 audit(1766919847.456:67): avc: denied { write } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.092846][ T29] audit: type=1400 audit(1766919847.456:68): avc: denied { read } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.113123][ T3313] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 36.113140][ T29] audit: type=1400 audit(1766919847.476:69): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.146594][ T29] audit: type=1400 audit(1766919847.476:70): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 36.170090][ T29] audit: type=1400 audit(1766919847.476:71): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 36.200496][ T3310] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 38.055901][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 38.124805][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 38.133909][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.141275][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.148840][ T3320] bridge_slave_0: entered allmulticast mode [ 38.155334][ T3320] bridge_slave_0: entered promiscuous mode [ 38.163522][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.170646][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.178014][ T3320] bridge_slave_1: entered allmulticast mode [ 38.184452][ T3320] bridge_slave_1: entered promiscuous mode [ 38.216494][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.229217][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.273669][ T3320] team0: Port device team_slave_0 added [ 38.287828][ T3320] team0: Port device team_slave_1 added [ 38.318919][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.325973][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.352126][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.372896][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 38.389036][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.396063][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.422018][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.432823][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.439941][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.447151][ T3321] bridge_slave_0: entered allmulticast mode [ 38.453684][ T3321] bridge_slave_0: entered promiscuous mode [ 38.470739][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.478023][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.485331][ T3321] bridge_slave_1: entered allmulticast mode [ 38.491891][ T3321] bridge_slave_1: entered promiscuous mode [ 38.506854][ T3324] chnl_net:caif_netlink_parms(): no params data found [ 38.556480][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.573694][ T3320] hsr_slave_0: entered promiscuous mode [ 38.579798][ T3320] hsr_slave_1: entered promiscuous mode [ 38.597082][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.626544][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.633789][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.641098][ T3323] bridge_slave_0: entered allmulticast mode [ 38.647677][ T3323] bridge_slave_0: entered promiscuous mode [ 38.667067][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.674228][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.681472][ T3323] bridge_slave_1: entered allmulticast mode [ 38.688051][ T3323] bridge_slave_1: entered promiscuous mode [ 38.697682][ T3321] team0: Port device team_slave_0 added [ 38.715593][ T3321] team0: Port device team_slave_1 added [ 38.721345][ T3332] chnl_net:caif_netlink_parms(): no params data found [ 38.756688][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.765897][ T3324] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.773073][ T3324] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.780254][ T3324] bridge_slave_0: entered allmulticast mode [ 38.786841][ T3324] bridge_slave_0: entered promiscuous mode [ 38.806432][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.815711][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.822857][ T3324] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.830203][ T3324] bridge_slave_1: entered allmulticast mode [ 38.836645][ T3324] bridge_slave_1: entered promiscuous mode [ 38.843186][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.850132][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.876438][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.909790][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.916834][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.942780][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.959068][ T3323] team0: Port device team_slave_0 added [ 38.978931][ T3323] team0: Port device team_slave_1 added [ 38.985872][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.996890][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.066541][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.073553][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.099814][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.115244][ T3321] hsr_slave_0: entered promiscuous mode [ 39.121305][ T3321] hsr_slave_1: entered promiscuous mode [ 39.127370][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 39.133197][ T3321] Cannot create hsr debugfs directory [ 39.139461][ T3324] team0: Port device team_slave_0 added [ 39.147931][ T3332] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.155124][ T3332] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.162377][ T3332] bridge_slave_0: entered allmulticast mode [ 39.168802][ T3332] bridge_slave_0: entered promiscuous mode [ 39.175546][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.182561][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.208517][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.223023][ T3324] team0: Port device team_slave_1 added [ 39.230805][ T3332] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.238085][ T3332] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.245240][ T3332] bridge_slave_1: entered allmulticast mode [ 39.251665][ T3332] bridge_slave_1: entered promiscuous mode [ 39.290649][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.297711][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.323765][ T3324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.335917][ T3332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.355708][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.363000][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.388946][ T3324] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.400640][ T3332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.414829][ T3323] hsr_slave_0: entered promiscuous mode [ 39.421264][ T3323] hsr_slave_1: entered promiscuous mode [ 39.427320][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 39.433174][ T3323] Cannot create hsr debugfs directory [ 39.458802][ T3332] team0: Port device team_slave_0 added [ 39.471036][ T3332] team0: Port device team_slave_1 added [ 39.523404][ T3332] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.530365][ T3332] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.556531][ T3332] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.569672][ T3324] hsr_slave_0: entered promiscuous mode [ 39.576017][ T3324] hsr_slave_1: entered promiscuous mode [ 39.582020][ T3324] debugfs: 'hsr0' already exists in 'hsr' [ 39.587747][ T3324] Cannot create hsr debugfs directory [ 39.601289][ T3332] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.608302][ T3332] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.634322][ T3332] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.668137][ T3320] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 39.681021][ T3320] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 39.707591][ T3320] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 39.729297][ T3332] hsr_slave_0: entered promiscuous mode [ 39.735564][ T3332] hsr_slave_1: entered promiscuous mode [ 39.741445][ T3332] debugfs: 'hsr0' already exists in 'hsr' [ 39.747240][ T3332] Cannot create hsr debugfs directory [ 39.752858][ T3320] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 39.843084][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 39.853858][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 39.872589][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 39.886625][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 39.934087][ T3323] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 39.947963][ T3323] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 39.965480][ T3323] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 39.977521][ T3323] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 39.999269][ T3324] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 40.009131][ T3324] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 40.022796][ T3324] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 40.034735][ T3324] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 40.069986][ T3332] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 40.088738][ T3332] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 40.097485][ T3332] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 40.108272][ T3332] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 40.120240][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.156535][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.165499][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.179150][ T1709] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.186258][ T1709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.199273][ T1709] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.206354][ T1709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.239627][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.257128][ T1709] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.264218][ T1709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.278390][ T390] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.285492][ T390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.313545][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.324296][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.335743][ T3324] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.353659][ T2492] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.360883][ T2492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.370560][ T2492] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.377853][ T2492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.407263][ T3321] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.424709][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.440846][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.447997][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.459430][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.466734][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.480359][ T3332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.498490][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.512058][ T3332] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.526021][ T1475] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.533138][ T1475] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.547865][ T1475] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.555476][ T1475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.581246][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.635501][ T3332] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.676284][ T3324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.741373][ T3320] veth0_vlan: entered promiscuous mode [ 40.763561][ T3320] veth1_vlan: entered promiscuous mode [ 40.781537][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.807427][ T3321] veth0_vlan: entered promiscuous mode [ 40.816137][ T3332] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.834166][ T3320] veth0_macvtap: entered promiscuous mode [ 40.850456][ T3320] veth1_macvtap: entered promiscuous mode [ 40.858061][ T3321] veth1_vlan: entered promiscuous mode [ 40.894009][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.909808][ T3324] veth0_vlan: entered promiscuous mode [ 40.924337][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.937362][ T3324] veth1_vlan: entered promiscuous mode [ 40.952137][ T390] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.965753][ T3321] veth0_macvtap: entered promiscuous mode [ 40.975536][ T390] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.993619][ T3321] veth1_macvtap: entered promiscuous mode [ 41.003973][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 41.003989][ T29] audit: type=1400 audit(1766919852.436:85): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.0HAiJH/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.022440][ T3324] veth0_macvtap: entered promiscuous mode [ 41.045899][ T29] audit: type=1400 audit(1766919852.436:86): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 41.067997][ T29] audit: type=1400 audit(1766919852.436:87): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.0HAiJH/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 41.093344][ T29] audit: type=1400 audit(1766919852.436:88): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 41.115619][ T29] audit: type=1400 audit(1766919852.436:89): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.0HAiJH/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 41.122544][ T390] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.142237][ T29] audit: type=1400 audit(1766919852.436:90): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.0HAiJH/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4091 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 41.161177][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.178467][ T29] audit: type=1400 audit(1766919852.466:91): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 41.178561][ T29] audit: type=1400 audit(1766919852.476:92): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.192965][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.205587][ T29] audit: type=1400 audit(1766919852.476:93): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="gadgetfs" ino=5129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 41.260463][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 41.283752][ T390] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.307139][ T29] audit: type=1400 audit(1766919852.736:94): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 41.310468][ T390] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.341227][ T3324] veth1_macvtap: entered promiscuous mode [ 41.369632][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.390046][ T390] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.399479][ T390] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.417979][ T3332] veth0_vlan: entered promiscuous mode [ 41.437269][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.445006][ T390] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.462072][ T3323] veth0_vlan: entered promiscuous mode [ 41.487743][ T3323] veth1_vlan: entered promiscuous mode [ 41.506926][ T1709] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.520322][ T3332] veth1_vlan: entered promiscuous mode [ 41.538897][ T1709] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.568874][ T3323] veth0_macvtap: entered promiscuous mode [ 41.580574][ T1709] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.600117][ T3332] veth0_macvtap: entered promiscuous mode [ 41.618483][ T1709] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.628671][ T3323] veth1_macvtap: entered promiscuous mode [ 41.637717][ T3507] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 41.652197][ T3332] veth1_macvtap: entered promiscuous mode [ 41.672529][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.692397][ T3332] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.703352][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.714367][ T3332] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.743807][ T52] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.758016][ T52] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.773074][ T52] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.797822][ T52] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.812453][ T52] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.850149][ T52] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.877893][ T52] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.043132][ T52] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.356196][ T3615] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 44.294224][ T3706] syz.1.93 (3706) used greatest stack depth: 9608 bytes left [ 44.955968][ T3798] io-wq is not configured for unbound workers [ 46.040374][ T29] kauditd_printk_skb: 166 callbacks suppressed [ 46.040390][ T29] audit: type=1326 audit(1766919857.466:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf715ef749 code=0x7ffc0000 [ 46.101801][ T29] audit: type=1326 audit(1766919857.506:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf715ef749 code=0x7ffc0000 [ 46.125469][ T29] audit: type=1326 audit(1766919857.506:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fdf715ef749 code=0x7ffc0000 [ 46.148814][ T29] audit: type=1326 audit(1766919857.506:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf715ef749 code=0x7ffc0000 [ 46.172940][ T29] audit: type=1326 audit(1766919857.506:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=426 compat=0 ip=0x7fdf715ef749 code=0x7ffc0000 [ 46.196228][ T29] audit: type=1326 audit(1766919857.526:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a6d60f749 code=0x7ffc0000 [ 46.219574][ T29] audit: type=1326 audit(1766919857.526:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a6d60f749 code=0x7ffc0000 [ 46.243151][ T29] audit: type=1326 audit(1766919857.526:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a6d60f749 code=0x7ffc0000 [ 46.266836][ T29] audit: type=1326 audit(1766919857.526:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f2a6d60f749 code=0x7ffc0000 [ 46.290382][ T29] audit: type=1326 audit(1766919857.526:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a6d60f749 code=0x7ffc0000 [ 47.534878][ T4052] netlink: 'syz.2.249': attribute type 6 has an invalid length. [ 48.476710][ T4133] process 'syz.1.284' launched './file0' with NULL argv: empty string added [ 48.651109][ T4150] syz.1.291 (4150) used greatest stack depth: 9400 bytes left [ 50.273055][ T4299] sctp: [Deprecated]: syz.2.355 (pid 4299) Use of struct sctp_assoc_value in delayed_ack socket option. [ 50.273055][ T4299] Use struct sctp_sack_info instead [ 51.439993][ T29] kauditd_printk_skb: 182 callbacks suppressed [ 51.440008][ T29] audit: type=1326 audit(1766919862.866:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.469618][ T29] audit: type=1326 audit(1766919862.866:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.506942][ T29] audit: type=1326 audit(1766919862.876:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.530371][ T29] audit: type=1326 audit(1766919862.876:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.553882][ T29] audit: type=1326 audit(1766919862.876:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.577190][ T29] audit: type=1326 audit(1766919862.876:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.601263][ T29] audit: type=1326 audit(1766919862.876:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.624835][ T29] audit: type=1326 audit(1766919862.876:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.648233][ T29] audit: type=1326 audit(1766919862.876:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.671576][ T29] audit: type=1326 audit(1766919862.876:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4391 comm="syz.4.397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836ea9f749 code=0x7ffc0000 [ 51.839821][ T4414] sctp: [Deprecated]: syz.3.407 (pid 4414) Use of int in max_burst socket option. [ 51.839821][ T4414] Use struct sctp_assoc_value instead [ 52.308106][ T4451] dummy0: entered allmulticast mode [ 52.324186][ T4450] dummy0: left allmulticast mode [ 52.894563][ T4496] netlink: 4 bytes leftover after parsing attributes in process `syz.3.441'. [ 53.057585][ T4506] Driver unsupported XDP return value 0 on prog (id 2) dev N/A, expect packet loss! [ 53.237350][ T4519] capability: warning: `syz.1.451' uses deprecated v2 capabilities in a way that may be insecure [ 54.307951][ T4560] loop1: detected capacity change from 0 to 128 [ 54.329943][ T4558] loop0: detected capacity change from 0 to 2048 [ 54.352149][ T4560] syz.1.468: attempt to access beyond end of device [ 54.352149][ T4560] loop1: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 54.451996][ T3311] loop0: p1 p2 p4 [ 54.455939][ T3311] loop0: p1 size 4278190080 extends beyond EOD, truncated [ 54.479164][ T3311] loop0: p2 size 4864 extends beyond EOD, truncated [ 54.501125][ T3311] loop0: p4 size 262144 extends beyond EOD, truncated [ 54.526907][ T4558] loop0: p1 p2 p4 [ 54.536293][ T4558] loop0: p1 size 4278190080 extends beyond EOD, truncated [ 54.564273][ T4558] loop0: p2 size 4864 extends beyond EOD, truncated [ 54.588692][ T4558] loop0: p4 size 262144 extends beyond EOD, truncated [ 54.883090][ T4568] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 54.895456][ T3311] udevd[3311]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 54.923132][ T3314] udevd[3314]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 54.934516][ T4569] udevd[4569]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 56.515423][ T4733] loop0: detected capacity change from 0 to 128 [ 56.525199][ T4733] syz.0.546: attempt to access beyond end of device [ 56.525199][ T4733] loop0: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 57.234260][ T4773] loop3: detected capacity change from 0 to 2048 [ 57.282324][ T3311] loop3: p1 p2 p4 [ 57.288608][ T3311] loop3: p1 size 4278190080 extends beyond EOD, truncated [ 57.304270][ T3311] loop3: p2 size 4864 extends beyond EOD, truncated [ 57.384697][ T3311] loop3: p4 size 262144 extends beyond EOD, truncated [ 57.395463][ T4773] loop3: p1 p2 p4 [ 57.401734][ T4773] loop3: p1 size 4278190080 extends beyond EOD, truncated [ 57.412392][ T4773] loop3: p2 size 4864 extends beyond EOD, truncated [ 57.420067][ T4773] loop3: p4 size 262144 extends beyond EOD, truncated [ 57.485363][ T4582] udevd[4582]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 57.495206][ T3311] udevd[3311]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 57.505757][ T4581] udevd[4581]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 57.546019][ T4581] udevd[4581]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 57.557250][ T3311] udevd[3311]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 57.564323][ T4582] udevd[4582]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 57.918113][ T4822] loop4: detected capacity change from 0 to 128 [ 57.938474][ T4822] syz.4.588: attempt to access beyond end of device [ 57.938474][ T4822] loop4: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 58.333449][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 58.333467][ T29] audit: type=1400 audit(1766919869.766:490): avc: denied { read } for pid=4829 comm="syz.4.592" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 58.362500][ T29] audit: type=1400 audit(1766919869.766:491): avc: denied { open } for pid=4829 comm="syz.4.592" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 59.033387][ T4897] loop0: detected capacity change from 0 to 128 [ 59.061497][ T4897] syz.0.624: attempt to access beyond end of device [ 59.061497][ T4897] loop0: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 59.218457][ T29] audit: type=1326 audit(1766919870.646:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4912 comm="syz.2.631" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88a10bf749 code=0x7ffc0000 [ 59.241777][ T29] audit: type=1326 audit(1766919870.646:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4912 comm="syz.2.631" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88a10bf749 code=0x7ffc0000 [ 59.265135][ T29] audit: type=1326 audit(1766919870.646:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4912 comm="syz.2.631" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88a10bf749 code=0x7ffc0000 [ 59.316666][ T29] audit: type=1326 audit(1766919870.726:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4912 comm="syz.2.631" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f88a10bf749 code=0x7ffc0000 [ 59.340217][ T29] audit: type=1326 audit(1766919870.726:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4912 comm="syz.2.631" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88a10bf749 code=0x7ffc0000 [ 59.363519][ T29] audit: type=1326 audit(1766919870.726:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4912 comm="syz.2.631" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88a10bf749 code=0x7ffc0000 [ 59.386818][ T29] audit: type=1326 audit(1766919870.726:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4912 comm="syz.2.631" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88a10bf749 code=0x7ffc0000 [ 59.410244][ T29] audit: type=1326 audit(1766919870.726:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4912 comm="syz.2.631" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88a10bf749 code=0x7ffc0000 [ 60.999322][ T5036] loop0: detected capacity change from 0 to 128 [ 61.675160][ T5067] loop3: detected capacity change from 0 to 128 [ 61.811453][ T5083] loop3: detected capacity change from 0 to 128 [ 62.888440][ T5183] loop2: detected capacity change from 0 to 128 [ 63.809876][ T5280] loop1: detected capacity change from 0 to 128 [ 63.998786][ T5302] loop1: detected capacity change from 0 to 128 [ 64.941802][ T5388] process '/newroot/214/file0' started with executable stack [ 66.183641][ T5453] loop3: detected capacity change from 0 to 128 [ 66.211513][ T5453] syz.3.880: attempt to access beyond end of device [ 66.211513][ T5453] loop3: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 69.440286][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 69.440304][ T29] audit: type=1400 audit(1766919880.866:529): avc: denied { write } for pid=5741 comm="syz.2.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 69.988963][ T5767] loop4: detected capacity change from 0 to 128 [ 69.999731][ T5767] syz.4.1028: attempt to access beyond end of device [ 69.999731][ T5767] loop4: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 70.521452][ T29] audit: type=1400 audit(1766919881.946:530): avc: denied { remount } for pid=5791 comm="syz.4.1041" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 70.576710][ T5802] loop4: detected capacity change from 0 to 128 [ 70.592476][ T5802] syz.4.1044: attempt to access beyond end of device [ 70.592476][ T5802] loop4: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 70.627403][ T5804] netlink: 'syz.2.1045': attribute type 1 has an invalid length. [ 70.649892][ T5804] 8021q: adding VLAN 0 to HW filter on device bond1 [ 70.751169][ T5815] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 71.010734][ T5847] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 71.105616][ T5859] loop3: detected capacity change from 0 to 128 [ 71.126941][ T5859] syz.3.1071: attempt to access beyond end of device [ 71.126941][ T5859] loop3: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 71.365622][ T5880] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 71.373546][ T5883] Zero length message leads to an empty skb [ 72.274796][ T5934] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 72.421467][ T5944] loop4: detected capacity change from 0 to 128 [ 72.436337][ T5944] syz.4.1108: attempt to access beyond end of device [ 72.436337][ T5944] loop4: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 72.790608][ T5977] binfmt_misc: register: failed to install interpreter file ./file2 [ 72.908623][ T5975] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 73.842672][ T6041] loop2: detected capacity change from 0 to 128 [ 73.957146][ T6041] syz.2.1148: attempt to access beyond end of device [ 73.957146][ T6041] loop2: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 74.651175][ T29] audit: type=1400 audit(1766919886.076:531): avc: denied { mounton } for pid=6061 comm="syz.1.1158" path="/265/file0" dev="tmpfs" ino=1363 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 75.277726][ T6095] syzkaller0: entered promiscuous mode [ 76.477392][ T6162] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1195'. [ 76.497236][ T6162] devtmpfs: Unknown parameter 'dirsnc' [ 76.630171][ T6172] loop4: detected capacity change from 0 to 256 [ 76.637144][ T6172] ======================================================= [ 76.637144][ T6172] WARNING: The mand mount option has been deprecated and [ 76.637144][ T6172] and is ignored by this kernel. Remove the mand [ 76.637144][ T6172] option from the mount to silence this warning. [ 76.637144][ T6172] ======================================================= [ 77.364825][ T6216] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 77.669384][ T29] audit: type=1400 audit(1766919889.096:532): avc: denied { ioctl } for pid=6231 comm="syz.2.1224" path="socket:[12910]" dev="sockfs" ino=12910 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 77.946405][ T29] audit: type=1400 audit(1766919889.376:533): avc: denied { bind } for pid=6237 comm="syz.0.1226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.006663][ T6240] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 78.077881][ T6248] loop0: detected capacity change from 0 to 256 [ 78.110966][ T29] audit: type=1400 audit(1766919889.536:534): avc: denied { read write } for pid=6247 comm="syz.0.1231" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 78.134857][ T29] audit: type=1400 audit(1766919889.536:535): avc: denied { open } for pid=6247 comm="syz.0.1231" path="/dev/input/event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 78.628868][ T29] audit: type=1400 audit(1766919890.056:536): avc: denied { view } for pid=6281 comm="syz.2.1245" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 78.902262][ T6296] loop4: detected capacity change from 0 to 128 [ 78.936652][ T29] audit: type=1400 audit(1766919890.366:537): avc: denied { ioctl } for pid=6297 comm="syz.4.1253" path="socket:[13003]" dev="sockfs" ino=13003 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 78.961958][ T6298] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1253'. [ 78.971016][ T6298] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1253'. [ 79.271008][ T6323] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1265'. [ 79.292415][ T6323] bond1: (slave ip6gretap1): Enslaving as an active interface with an up link [ 79.304823][ T6323] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1265'. [ 79.322149][ T6323] bond1 (unregistering): (slave ip6gretap1): Releasing backup interface [ 79.333776][ T6323] bond1 (unregistering): Released all slaves [ 79.722625][ T6346] loop4: detected capacity change from 0 to 128 [ 81.085776][ T6416] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 83.038388][ T6495] sctp: [Deprecated]: syz.1.1336 (pid 6495) Use of int in max_burst socket option deprecated. [ 83.038388][ T6495] Use struct sctp_assoc_value instead [ 85.117409][ T6575] loop4: detected capacity change from 0 to 128 [ 85.614755][ T6601] loop1: detected capacity change from 0 to 128 [ 85.706104][ T29] audit: type=1400 audit(1766919897.136:538): avc: denied { bpf } for pid=6609 comm="syz.1.1383" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 85.773386][ T29] audit: type=1400 audit(1766919897.206:539): avc: denied { perfmon } for pid=6613 comm="syz.1.1385" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 85.795526][ T6614] ================================================================== [ 85.803628][ T6614] BUG: KCSAN: data-race in bq_flush_to_queue / cpu_map_kthread_run [ 85.811532][ T6614] [ 85.813864][ T6614] write to 0xffff88811b3ba140 of 8 bytes by task 6615 on cpu 0: [ 85.821498][ T6614] cpu_map_kthread_run+0x529/0x1560 [ 85.826708][ T6614] kthread+0x489/0x510 [ 85.830802][ T6614] ret_from_fork+0x149/0x290 [ 85.835407][ T6614] ret_from_fork_asm+0x1a/0x30 [ 85.840183][ T6614] [ 85.842523][ T6614] read to 0xffff88811b3ba140 of 8 bytes by task 6614 on cpu 1: [ 85.850090][ T6614] bq_flush_to_queue+0x124/0x350 [ 85.855039][ T6614] __cpu_map_flush+0x38/0x80 [ 85.859635][ T6614] xdp_do_flush+0xf9/0x160 [ 85.864060][ T6614] bpf_test_run_xdp_live+0xd67/0x11d0 [ 85.869453][ T6614] bpf_prog_test_run_xdp+0x525/0x970 [ 85.874758][ T6614] bpf_prog_test_run+0x204/0x340 [ 85.879731][ T6614] __sys_bpf+0x4c0/0x7c0 [ 85.883980][ T6614] __x64_sys_bpf+0x41/0x50 [ 85.888447][ T6614] x64_sys_call+0x28e1/0x3000 [ 85.893134][ T6614] do_syscall_64+0xca/0x2b0 [ 85.897653][ T6614] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.903637][ T6614] [ 85.905968][ T6614] value changed: 0xffff88811d38c070 -> 0x0000000000000000 [ 85.913075][ T6614] [ 85.915398][ T6614] Reported by Kernel Concurrency Sanitizer on: [ 85.921573][ T6614] CPU: 1 UID: 0 PID: 6614 Comm: syz.1.1385 Not tainted syzkaller #0 PREEMPT(voluntary) [ 85.931330][ T6614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 85.941393][ T6614] ==================================================================