last executing test programs: 534.59925ms ago: executing program 4 (id=5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303, 0x37}, "475566172f45f011", "bd14060000000000000092f94413582b", "00001000", "4e67cb72f328ac2f"}, 0x28) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) 386.075143ms ago: executing program 4 (id=6): openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b\x00\x00\x00\b'], 0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000004040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000004140)={0x0, 0x0, &(0x7f0000004100)={&(0x7f0000004080)={0x68, r3, 0x1, 0x70bd29, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0xfffffffe, @link='broadcast-link\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0xc0000}, 0x40080) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5, 0x0, 0xfffffffffffffffd}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000600)) pipe2(&(0x7f0000000c40), 0x4800) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="000000000000000f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000f80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000e00)=ANY=[@ANYRESOCT=r1, @ANYBLOB="2c4bad0600985af7f74ed5313f0f7a4a7a4848e04290af601224650e85e94bf90c9d6309623e9b8ea2cd5754cb4b7789231e1b343fc5abb598d0c824b34a7d1fa4eed42dc72d1b621148d33cf0a2d9a8bd6e"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) 327.050214ms ago: executing program 2 (id=3): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r2, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) read(r5, &(0x7f0000032440)=""/102364, 0x18fdc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='xdp_cpumap_enqueue\x00', r1}, 0x18) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r6, 0x0, 0x2a, &(0x7f0000000400)={0x2, {{0x2, 0x4, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) setsockopt$inet_MCAST_LEAVE_GROUP(r6, 0x0, 0x2d, &(0x7f00000004c0)={0xbae, {{0x2, 0x4e23, @remote}}}, 0x88) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r7, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r9, 0x0, 0x800000000006}, 0x6e) socket$inet6_sctp(0xa, 0x1, 0x84) syz_io_uring_setup(0x5c2, &(0x7f00000002c0)={0x0, 0x3594, 0x10, 0x1003, 0x21e}, &(0x7f0000000240), &(0x7f0000000340)) unshare(0x8040600) 267.114685ms ago: executing program 3 (id=4): mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r2, 0x0, 0xffffffffffffffff}, 0x18) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_9p2000}]}}) 259.260475ms ago: executing program 0 (id=1): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffff"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r2, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r7, 0x0, 0x7, 0x9) write$P9_RWRITE(r7, &(0x7f0000000040)={0xb}, 0x11000) read(r6, &(0x7f0000032440)=""/102364, 0x18fdc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='xdp_cpumap_enqueue\x00', r1}, 0x18) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r8, 0x0, 0x2a, &(0x7f0000000400)={0x2, {{0x2, 0x4, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) setsockopt$inet_MCAST_LEAVE_GROUP(r8, 0x0, 0x2d, &(0x7f00000004c0)={0xbae, {{0x2, 0x4e23, @remote}}}, 0x88) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r11, 0x0, 0x800000000006}, 0x6e) r12 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r12, 0x84, 0x81, &(0x7f0000000280)='\x00\x00\x00\x00', 0x4) r13 = syz_io_uring_setup(0x5c2, &(0x7f00000002c0)={0x0, 0x3594, 0x10, 0x1003, 0x21e}, &(0x7f0000000240)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r14, 0x4, &(0x7f0000000080)=0x2a5cc081, 0x0, 0x4) syz_io_uring_submit(r14, r15, &(0x7f00000004c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x80, 0x2, 0x0, 0x127, 0x0, 0x1, {0x1}}) io_uring_enter(r13, 0x6efc, 0x3900, 0xb, 0x0, 0x0) io_uring_register$IORING_REGISTER_SYNC_CANCEL(r13, 0x18, &(0x7f00000000c0)={0x1, 0xffffffffffffffff, 0x0, {0x5, 0x5}, 0x1}, 0x1) unshare(0x8040600) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r12, 0x84, 0x15, &(0x7f00000000c0), 0x1) 147.449227ms ago: executing program 1 (id=2): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000000), &(0x7f00000000c0)=r1}, 0x20) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead85847817353d2dbad05dd5", 0x1c, 0xfffffffffffffffd) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000010900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000025940000000c0a01030000000000000000070000080900020073797a31000000000900010073797a30000000006800038064000080080003400000000258000b802c0001800a0001006c696d69740000001c0002800c00014000000000000000030c0002400000000000000010140001800c0001"], 0x118}}, 0x0) 119.537188ms ago: executing program 4 (id=7): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x5f, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x18) r1 = open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f00000001c0)=0x5, 0xfe60) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r4}, 0x10) io_setup(0x3, &(0x7f0000000340)) copy_file_range(r1, 0x0, r1, 0x0, 0x101, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0xf, 0x0, 0x7fff8000}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000040)=ANY=[@ANYRES64=r1, @ANYRESOCT=r5, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xf}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='rxrpc_local\x00', r7, 0x0, 0x80000001}, 0x18) r8 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[], 0x10b8}, 0x4000000) close_range(r5, 0xffffffffffffffff, 0x0) 118.704798ms ago: executing program 3 (id=8): openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b'], 0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000004040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000004140)={0x0, 0x0, &(0x7f0000004100)={&(0x7f0000004080)={0x68, r3, 0x1, 0x70bd29, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0xfffffffe, @link='broadcast-link\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0xc0000}, 0x40080) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5, 0x0, 0xfffffffffffffffd}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000600)) pipe2(&(0x7f0000000c40), 0x4800) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="000000000000000f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000f80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000e00)=ANY=[@ANYRESOCT=r1, @ANYBLOB="2c4bad0600985af7f74ed5313f0f7a4a7a4848e04290af601224650e85e94bf90c9d6309623e9b8ea2cd5754cb4b7789231e1b343fc5abb598d0c824b34a7d1fa4eed42dc72d1b621148d33cf0a2d9a8bd6e"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) 0s ago: executing program 4 (id=9): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x110c230000, 0x3, 0x2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r2, 0x0, 0xf, &(0x7f0000000140)="e9", 0x1) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000005c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f0000000140)='2', 0xff10, 0x8000c61) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000640)=[@in={0x2, 0x4e22, @local}, @in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x20) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x482, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000740)=ANY=[], 0xff2e) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x83, "00000000000000000000ffff00"}) r6 = syz_open_pts(r5, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[], 0x361, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000200)=ANY=[], 0x9, 0x1) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000000000020"], 0x24, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x5, 0x4, [0x5, 0x7, 0x4, 0x6]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000300)={r7, 0x10001, 0x5, 0x7f4}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents(r8, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.235' (ED25519) to the list of known hosts. [ 24.106711][ T29] audit: type=1400 audit(1758757021.593:62): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.107570][ T3294] cgroup: Unknown subsys name 'net' [ 24.129407][ T29] audit: type=1400 audit(1758757021.593:63): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.156726][ T29] audit: type=1400 audit(1758757021.623:64): avc: denied { unmount } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.309552][ T3294] cgroup: Unknown subsys name 'cpuset' [ 24.315553][ T3294] cgroup: Unknown subsys name 'rlimit' [ 24.424909][ T29] audit: type=1400 audit(1758757021.913:65): avc: denied { setattr } for pid=3294 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.452432][ T29] audit: type=1400 audit(1758757021.913:66): avc: denied { create } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.472923][ T29] audit: type=1400 audit(1758757021.913:67): avc: denied { write } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.493298][ T29] audit: type=1400 audit(1758757021.913:68): avc: denied { read } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.513557][ T29] audit: type=1400 audit(1758757021.943:69): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.520537][ T3297] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.538332][ T29] audit: type=1400 audit(1758757021.943:70): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.570069][ T29] audit: type=1400 audit(1758757022.043:71): avc: denied { relabelto } for pid=3297 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.615683][ T3294] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.478616][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 26.516974][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 26.547475][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 26.583528][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.590685][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.597875][ T3312] bridge_slave_0: entered allmulticast mode [ 26.604584][ T3312] bridge_slave_0: entered promiscuous mode [ 26.617311][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 26.630197][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.637233][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.644442][ T3312] bridge_slave_1: entered allmulticast mode [ 26.650947][ T3312] bridge_slave_1: entered promiscuous mode [ 26.663384][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 26.701856][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.728107][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.745986][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.753084][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.760291][ T3313] bridge_slave_0: entered allmulticast mode [ 26.766759][ T3313] bridge_slave_0: entered promiscuous mode [ 26.779887][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.786947][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.794071][ T3305] bridge_slave_0: entered allmulticast mode [ 26.800390][ T3305] bridge_slave_0: entered promiscuous mode [ 26.815389][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.822468][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.829561][ T3313] bridge_slave_1: entered allmulticast mode [ 26.835765][ T3313] bridge_slave_1: entered promiscuous mode [ 26.850771][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.857874][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.865197][ T3305] bridge_slave_1: entered allmulticast mode [ 26.871508][ T3305] bridge_slave_1: entered promiscuous mode [ 26.881379][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.888412][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.895668][ T3310] bridge_slave_0: entered allmulticast mode [ 26.902012][ T3310] bridge_slave_0: entered promiscuous mode [ 26.918239][ T3312] team0: Port device team_slave_0 added [ 26.933256][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.940329][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.947561][ T3310] bridge_slave_1: entered allmulticast mode [ 26.953857][ T3310] bridge_slave_1: entered promiscuous mode [ 26.960846][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.975588][ T3312] team0: Port device team_slave_1 added [ 26.981282][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.988313][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.995415][ T3304] bridge_slave_0: entered allmulticast mode [ 27.001721][ T3304] bridge_slave_0: entered promiscuous mode [ 27.008267][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.015310][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.022393][ T3304] bridge_slave_1: entered allmulticast mode [ 27.028753][ T3304] bridge_slave_1: entered promiscuous mode [ 27.035995][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.050793][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.069367][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.088118][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.098318][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.116695][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.139956][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.146902][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.172857][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.184469][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.194233][ T3305] team0: Port device team_slave_0 added [ 27.200418][ T3313] team0: Port device team_slave_0 added [ 27.210759][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.217689][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.243642][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.258519][ T3305] team0: Port device team_slave_1 added [ 27.264910][ T3313] team0: Port device team_slave_1 added [ 27.276580][ T3310] team0: Port device team_slave_0 added [ 27.290086][ T3304] team0: Port device team_slave_0 added [ 27.311354][ T3310] team0: Port device team_slave_1 added [ 27.317626][ T3304] team0: Port device team_slave_1 added [ 27.327921][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.334876][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.360746][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.371660][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.378676][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.404718][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.422188][ T3312] hsr_slave_0: entered promiscuous mode [ 27.428043][ T3312] hsr_slave_1: entered promiscuous mode [ 27.448105][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.455094][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.481028][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.492000][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.498988][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.524905][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.540711][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.547637][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.573535][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.602555][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.609524][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.635437][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.646467][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.653429][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.679404][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.703254][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.710221][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.736093][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.769844][ T3313] hsr_slave_0: entered promiscuous mode [ 27.775788][ T3313] hsr_slave_1: entered promiscuous mode [ 27.781698][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 27.787419][ T3313] Cannot create hsr debugfs directory [ 27.797182][ T3305] hsr_slave_0: entered promiscuous mode [ 27.803471][ T3305] hsr_slave_1: entered promiscuous mode [ 27.809364][ T3305] debugfs: 'hsr0' already exists in 'hsr' [ 27.815073][ T3305] Cannot create hsr debugfs directory [ 27.832952][ T3304] hsr_slave_0: entered promiscuous mode [ 27.838955][ T3304] hsr_slave_1: entered promiscuous mode [ 27.844808][ T3304] debugfs: 'hsr0' already exists in 'hsr' [ 27.850543][ T3304] Cannot create hsr debugfs directory [ 27.881856][ T3310] hsr_slave_0: entered promiscuous mode [ 27.887820][ T3310] hsr_slave_1: entered promiscuous mode [ 27.894299][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 27.900059][ T3310] Cannot create hsr debugfs directory [ 28.061993][ T3312] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.070671][ T3312] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.081559][ T3312] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.090309][ T3312] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.113212][ T3313] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.126577][ T3313] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.135947][ T3313] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.144580][ T3313] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.167211][ T3305] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.180052][ T3305] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.192517][ T3305] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.207140][ T3305] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.236302][ T3310] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.248686][ T3310] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.258398][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.268753][ T3310] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.289414][ T3310] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.302313][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.319167][ T1430] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.326292][ T1430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.335479][ T1430] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.342519][ T1430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.378170][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.385567][ T3304] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.394381][ T3304] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 28.408407][ T3304] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 28.417200][ T3304] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.429693][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.454847][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.471160][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.485081][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.492163][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.500607][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.507644][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.518388][ T1902] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.525542][ T1902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.535580][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.542698][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.593169][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.610114][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.621469][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.634500][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.676611][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.685595][ T145] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.692740][ T145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.701542][ T145] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.708634][ T145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.726571][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.752942][ T1430] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.760025][ T1430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.771867][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.783197][ T1430] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.790348][ T1430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.818526][ T3304] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 28.828971][ T3304] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.851688][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.903486][ T3312] veth0_vlan: entered promiscuous mode [ 28.918190][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.935003][ T3312] veth1_vlan: entered promiscuous mode [ 28.954413][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.970334][ T3305] veth0_vlan: entered promiscuous mode [ 28.985605][ T3312] veth0_macvtap: entered promiscuous mode [ 29.013441][ T3312] veth1_macvtap: entered promiscuous mode [ 29.029859][ T3305] veth1_vlan: entered promiscuous mode [ 29.070074][ T3313] veth0_vlan: entered promiscuous mode [ 29.080309][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.097756][ T3305] veth0_macvtap: entered promiscuous mode [ 29.108257][ T3305] veth1_macvtap: entered promiscuous mode [ 29.116303][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.131277][ T51] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.149410][ T3313] veth1_vlan: entered promiscuous mode [ 29.160399][ T51] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.171264][ T3304] veth0_vlan: entered promiscuous mode [ 29.177379][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 29.177433][ T29] audit: type=1400 audit(1758757026.663:81): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.XKQ3hm/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 29.185709][ T3304] veth1_vlan: entered promiscuous mode [ 29.213898][ T29] audit: type=1400 audit(1758757026.663:82): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 29.221890][ T3313] veth0_macvtap: entered promiscuous mode [ 29.235892][ T29] audit: type=1400 audit(1758757026.663:83): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.XKQ3hm/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 29.251609][ T3310] veth0_vlan: entered promiscuous mode [ 29.266650][ T29] audit: type=1400 audit(1758757026.673:84): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 29.273586][ T51] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.293873][ T29] audit: type=1400 audit(1758757026.673:85): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.XKQ3hm/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 29.310759][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.329182][ T29] audit: type=1400 audit(1758757026.673:86): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.XKQ3hm/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 29.340143][ T3313] veth1_macvtap: entered promiscuous mode [ 29.363581][ T29] audit: type=1400 audit(1758757026.673:87): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 29.384274][ T3304] veth0_macvtap: entered promiscuous mode [ 29.394472][ T29] audit: type=1400 audit(1758757026.703:88): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 29.399655][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.417252][ T29] audit: type=1400 audit(1758757026.703:89): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="gadgetfs" ino=4699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 29.425340][ T51] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.459708][ T3304] veth1_macvtap: entered promiscuous mode [ 29.470409][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.476974][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.495017][ T3310] veth1_vlan: entered promiscuous mode [ 29.503103][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.504330][ T29] audit: type=1400 audit(1758757026.993:90): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 29.514797][ T31] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.553879][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.563664][ T31] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.582172][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.590817][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.598669][ T31] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.619092][ T31] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.634546][ T3310] veth0_macvtap: entered promiscuous mode [ 29.655973][ T31] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.677844][ T3310] veth1_macvtap: entered promiscuous mode [ 29.687167][ T31] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.707987][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.715453][ T31] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.726546][ T31] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.743096][ T3484] hub 8-0:1.0: USB hub found [ 29.754726][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.764679][ T31] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.769796][ T3484] hub 8-0:1.0: 8 ports detected [ 29.795691][ T1430] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.833139][ T1430] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.851909][ T1430] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.866194][ T1430] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.876050][ T1430] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.886611][ T1430] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.977156][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 29.985916][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 30.008481][ T3505] hub 8-0:1.0: USB hub found [ 30.022743][ T3505] hub 8-0:1.0: 8 ports detected [ 30.064309][ T3520] loop4: detected capacity change from 0 to 128 [ 30.071745][ T3298] ================================================================== [ 30.074550][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 30.079823][ T3298] BUG: KCSAN: data-race in set_nlink / set_nlink [ 30.079848][ T3298] [ 30.079854][ T3298] read to 0xffff8881071695f0 of 4 bytes by task 2995 on cpu 1: [ 30.079867][ T3298] set_nlink+0x29/0xb0 [ 30.079887][ T3298] kernfs_iop_permission+0x1e2/0x220 [ 30.113863][ T3298] inode_permission+0x1ca/0x310 [ 30.118710][ T3298] link_path_walk+0x162/0x900 [ 30.123388][ T3298] path_lookupat+0x63/0x2a0 [ 30.127880][ T3298] filename_lookup+0x147/0x340 [ 30.132637][ T3298] vfs_statx+0x9d/0x390 [ 30.136782][ T3298] vfs_fstatat+0x115/0x170 [ 30.141190][ T3298] __se_sys_newfstatat+0x55/0x260 [ 30.146204][ T3298] __x64_sys_newfstatat+0x55/0x70 [ 30.151222][ T3298] x64_sys_call+0x135a/0x2ff0 [ 30.155886][ T3298] do_syscall_64+0xd2/0x200 [ 30.160381][ T3298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 30.166260][ T3298] [ 30.168567][ T3298] write to 0xffff8881071695f0 of 4 bytes by task 3298 on cpu 0: [ 30.176175][ T3298] set_nlink+0x99/0xb0 [ 30.180230][ T3298] kernfs_iop_permission+0x1e2/0x220 [ 30.185511][ T3298] inode_permission+0x1ca/0x310 [ 30.190352][ T3298] link_path_walk+0x162/0x900 [ 30.195019][ T3298] path_openat+0x1de/0x2170 [ 30.199509][ T3298] do_filp_open+0x109/0x230 [ 30.204001][ T3298] do_sys_openat2+0xa6/0x110 [ 30.208583][ T3298] __x64_sys_openat+0xf2/0x120 [ 30.213341][ T3298] x64_sys_call+0x2e9c/0x2ff0 [ 30.218002][ T3298] do_syscall_64+0xd2/0x200 [ 30.222498][ T3298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 30.228380][ T3298] [ 30.230685][ T3298] value changed: 0x00000008 -> 0x00000009 [ 30.236380][ T3298] [ 30.238683][ T3298] Reported by Kernel Concurrency Sanitizer on: [ 30.244824][ T3298] CPU: 0 UID: 0 PID: 3298 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 30.254093][ T3298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 30.264130][ T3298] ================================================================== [ 30.277730][ T3520] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 30.304531][ T3520] ext4 filesystem being mounted at /3/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 30.318133][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 30.344743][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 30.353681][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 30.389812][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 30.398470][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 30.407149][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 30.904111][ T3312] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09.