last executing test programs: 351.929334ms ago: executing program 1 (id=2): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24044836}, 0xc094) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000000)=@fragment={0x5c, 0x0, 0x1, 0x0, 0x0, 0xd, 0x65}, 0x8) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x1f00) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x18) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x2, 0x3, 0x801, 0x0, &(0x7f0000000040), 0xfffffffc) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) mincore(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x51, &(0x7f0000000080)={0xa, 0x4e1e, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, 0x1c) syz_read_part_table(0x5d4, &(0x7f0000000000)="$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") r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x4}, 0x18) socket$key(0xf, 0x3, 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) 241.814385ms ago: executing program 3 (id=4): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0xb76e}, 0x223, 0x1, 0xfffffffc, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x800, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200a}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYRESOCT=r5], 0xc0}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000000)='rtc_alarm_irq_enable\x00', r7}, 0x18) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x842, 0x0) writev(r9, &(0x7f0000000a40)=[{&(0x7f00000003c0)="ff071d6ce89d96666b08e828be032f55097076e40148c200000000fb00000200"/50, 0x32}, {&(0x7f0000000bc0)="d18a876f8f46c153dde8db040cc7e763ba2fab29aca1a1a2e0a38bc757e61b5aab090000000000000051ed697ff263589940cf437f1efae8e2342bb1adc1c9d8febaecb3aef2d7650869408a287d92d06f5d660a68f3f0a39e926d8dbd6f8d9de335fe4c520feaffc62c3435ab63a2f77234987d3b1130d31bd78fb28883050a1b8dd4ea2cdc62703eb86600dba7da620ad621c21b75893f334cfc82a3931e8cf3dfa12d31fa32797f5a940475fd8947bde48c8126a44eb9d229126e34e0d8aace15047ccd5bd0932270c88dac48e0bbb2af55a35efca697fe5435b19f", 0xdd}, {&(0x7f0000000000)="a9e47d4ed965685b48214fff756364b93155b267f07697b50eede6ed45f973d3da857dba0deed519dc9a7267b99f19a1b405e7d2", 0x34}, {&(0x7f00000001c0)="10", 0x1}], 0x4) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team_slave_1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="12000000090000000800000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r11, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)=r10}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r12, &(0x7f00000005c0), 0x0}, 0x20) fstatfs(0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000280)={@remote}, 0x14) 20.25958ms ago: executing program 0 (id=1): r0 = syz_mount_image$iso9660(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="63727566742c6d61703d6e6f726d616c2c73657373696f6e3d3078303030303030303030303030303031362c636865636b3d72656c617865642c00da9c02cf387b84b8da3110c57871aeacd25b6e0adf2b58f19125f24368a9aa7c25211440d1fe426d3e94175022c4f7afa24904b183ec46c4efcf5daf3d78dba636236d10"], 0x1, 0x519, &(0x7f00000013c0)="$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") r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1e00, 0x21}, 0x94) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=0xffffffffffffffff, 0x8, 0x0, 0x1ff, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0), &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32=r8, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000c00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) fstatfs(r9, &(0x7f0000000200)=""/133) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000140), 0x5, r7}, 0x38) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES8=r5], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000000c0)='kfree\x00', r10}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_read_part_table(0x618, &(0x7f0000002200)="$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") r11 = gettid() r12 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') recvmsg$unix(r12, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000180)=""/89, 0x59}, {0x0}, {0x0}, {0x0}, {&(0x7f00000007c0)=""/199, 0xc7}, {&(0x7f00000008c0)=""/223, 0xdf}, {&(0x7f00000006c0)=""/179, 0xb3}, {&(0x7f00000009c0)=""/222, 0xde}, {&(0x7f00000002c0)=""/69, 0x45}], 0x9, &(0x7f0000001c00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x140) fchdir(r12) mount$9p_unix(&(0x7f0000000780)='./mnt\x00', &(0x7f0000000040)='./mnt\x00', 0x0, 0x291095, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r11}, &(0x7f0000bbdffc)) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r2, r4, 0x25, 0x2, @val=@netkit={@void, @value=r2, @void, @void, r6}}, 0x1c) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000000054d1e51fed7432291a00001722d06be7030b95208674ac2dd693a811d8", @ANYRES32=r13, @ANYRESDEC=r0], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x2a}, 0x94) 0s ago: executing program 2 (id=3): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @local}], 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r5 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$sock_inet_SIOCSARP(r5, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @local}, 0x4a, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r4, {0x0, 0x4}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0xfffffffd, 0x400, 0x3, 0x6, 0x7}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) r6 = getpid() r7 = syz_pidfd_open(r6, 0x0) process_madvise(r7, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)=')', 0x1}], 0x2, 0x17, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000380)='N', 0x2a000}], 0x1, 0x0, 0x0, 0x804c040}, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @local}}}, 0x84) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.28' (ED25519) to the list of known hosts. [ 33.881972][ T29] audit: type=1400 audit(1757459169.788:62): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.883138][ T3295] cgroup: Unknown subsys name 'net' [ 33.904729][ T29] audit: type=1400 audit(1757459169.788:63): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.932325][ T29] audit: type=1400 audit(1757459169.818:64): avc: denied { unmount } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.109362][ T3295] cgroup: Unknown subsys name 'cpuset' [ 34.115770][ T3295] cgroup: Unknown subsys name 'rlimit' [ 34.267680][ T29] audit: type=1400 audit(1757459170.168:65): avc: denied { setattr } for pid=3295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.292339][ T29] audit: type=1400 audit(1757459170.178:66): avc: denied { create } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.312914][ T29] audit: type=1400 audit(1757459170.178:67): avc: denied { write } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.333291][ T29] audit: type=1400 audit(1757459170.178:68): avc: denied { read } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.341855][ T3298] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.353616][ T29] audit: type=1400 audit(1757459170.178:69): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.387045][ T29] audit: type=1400 audit(1757459170.178:70): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 34.410523][ T29] audit: type=1400 audit(1757459170.278:71): avc: denied { relabelto } for pid=3298 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 34.466298][ T3295] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 36.341507][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 36.379404][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 36.413616][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 36.422661][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 36.473128][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 36.501753][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.508983][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.516164][ T3307] bridge_slave_0: entered allmulticast mode [ 36.522865][ T3307] bridge_slave_0: entered promiscuous mode [ 36.549400][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.556520][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.563797][ T3307] bridge_slave_1: entered allmulticast mode [ 36.570267][ T3307] bridge_slave_1: entered promiscuous mode [ 36.576573][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.583687][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.590861][ T3316] bridge_slave_0: entered allmulticast mode [ 36.597265][ T3316] bridge_slave_0: entered promiscuous mode [ 36.620979][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.628130][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.635513][ T3316] bridge_slave_1: entered allmulticast mode [ 36.642934][ T3316] bridge_slave_1: entered promiscuous mode [ 36.656609][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.663719][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.670892][ T3310] bridge_slave_0: entered allmulticast mode [ 36.677347][ T3310] bridge_slave_0: entered promiscuous mode [ 36.698959][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.706069][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.713255][ T3313] bridge_slave_0: entered allmulticast mode [ 36.719768][ T3313] bridge_slave_0: entered promiscuous mode [ 36.728062][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.735261][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.742588][ T3310] bridge_slave_1: entered allmulticast mode [ 36.749132][ T3310] bridge_slave_1: entered promiscuous mode [ 36.756380][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.775365][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.782495][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.790753][ T3313] bridge_slave_1: entered allmulticast mode [ 36.797166][ T3313] bridge_slave_1: entered promiscuous mode [ 36.807172][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.826803][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.837112][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.861476][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.871881][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.892225][ T3307] team0: Port device team_slave_0 added [ 36.897964][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.905133][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.912541][ T3305] bridge_slave_0: entered allmulticast mode [ 36.919027][ T3305] bridge_slave_0: entered promiscuous mode [ 36.936300][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.951075][ T3307] team0: Port device team_slave_1 added [ 36.957536][ T3310] team0: Port device team_slave_0 added [ 36.963407][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.970656][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.977937][ T3305] bridge_slave_1: entered allmulticast mode [ 36.984472][ T3305] bridge_slave_1: entered promiscuous mode [ 36.997041][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.011911][ T3310] team0: Port device team_slave_1 added [ 37.028371][ T3316] team0: Port device team_slave_0 added [ 37.060574][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.070338][ T3316] team0: Port device team_slave_1 added [ 37.077025][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.086903][ T3313] team0: Port device team_slave_0 added [ 37.093002][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.100020][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.126037][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.137297][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.144419][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.170326][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.191782][ T3313] team0: Port device team_slave_1 added [ 37.197923][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.204994][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.230977][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.241924][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.248915][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.274852][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.306081][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.313068][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.339000][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.350590][ T3305] team0: Port device team_slave_0 added [ 37.369502][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.376502][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.402475][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.413968][ T3305] team0: Port device team_slave_1 added [ 37.425408][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.432519][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.458622][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.472118][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.479100][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.505028][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.550395][ T3310] hsr_slave_0: entered promiscuous mode [ 37.556505][ T3310] hsr_slave_1: entered promiscuous mode [ 37.570574][ T3307] hsr_slave_0: entered promiscuous mode [ 37.576549][ T3307] hsr_slave_1: entered promiscuous mode [ 37.582547][ T3307] debugfs: 'hsr0' already exists in 'hsr' [ 37.588289][ T3307] Cannot create hsr debugfs directory [ 37.594548][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.601593][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.627558][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.647725][ T3316] hsr_slave_0: entered promiscuous mode [ 37.653792][ T3316] hsr_slave_1: entered promiscuous mode [ 37.659799][ T3316] debugfs: 'hsr0' already exists in 'hsr' [ 37.665523][ T3316] Cannot create hsr debugfs directory [ 37.671282][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.678391][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.704662][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.760145][ T3305] hsr_slave_0: entered promiscuous mode [ 37.766283][ T3305] hsr_slave_1: entered promiscuous mode [ 37.772256][ T3305] debugfs: 'hsr0' already exists in 'hsr' [ 37.778015][ T3305] Cannot create hsr debugfs directory [ 37.790614][ T3313] hsr_slave_0: entered promiscuous mode [ 37.796641][ T3313] hsr_slave_1: entered promiscuous mode [ 37.802717][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 37.808508][ T3313] Cannot create hsr debugfs directory [ 37.995413][ T3316] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 38.006060][ T3316] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 38.020307][ T3316] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 38.031728][ T3316] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 38.051062][ T3305] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 38.060093][ T3305] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 38.069523][ T3305] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 38.078417][ T3305] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 38.115822][ T3310] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 38.124915][ T3310] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 38.140997][ T3310] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 38.150146][ T3310] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 38.177356][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.200075][ T3307] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 38.217120][ T3307] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 38.229468][ T3307] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 38.242291][ T3307] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 38.251675][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.277427][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.284555][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.301581][ T2596] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.308756][ T2596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.317562][ T3313] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 38.327337][ T3313] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 38.336430][ T3313] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 38.349997][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.357003][ T3313] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 38.377164][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.393525][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.417151][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.424256][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.453797][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.460889][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.473388][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.508195][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.520654][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.527780][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.540284][ T3310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.556250][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.568349][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.575549][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.607684][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.616663][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.623794][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.632744][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.639857][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.695032][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.708022][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.749178][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.769892][ T1084] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.777080][ T1084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.810275][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.817391][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.861102][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.874986][ T3316] veth0_vlan: entered promiscuous mode [ 38.893046][ T3310] veth0_vlan: entered promiscuous mode [ 38.900776][ T3316] veth1_vlan: entered promiscuous mode [ 38.909980][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.930337][ T3310] veth1_vlan: entered promiscuous mode [ 38.942744][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.969449][ T3316] veth0_macvtap: entered promiscuous mode [ 38.989219][ T3316] veth1_macvtap: entered promiscuous mode [ 39.002324][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.022019][ T3310] veth0_macvtap: entered promiscuous mode [ 39.030973][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.053254][ T3310] veth1_macvtap: entered promiscuous mode [ 39.068747][ T31] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.077626][ T2596] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.103141][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.110602][ T2596] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.125999][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.143261][ T2596] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.162140][ T3307] veth0_vlan: entered promiscuous mode [ 39.174287][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 39.174304][ T29] audit: type=1400 audit(1757459175.078:81): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.TgdSvr/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.189380][ T3313] veth0_vlan: entered promiscuous mode [ 39.212551][ T29] audit: type=1400 audit(1757459175.088:82): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 39.226283][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.234600][ T29] audit: type=1400 audit(1757459175.088:83): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.TgdSvr/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 39.245723][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.268728][ T29] audit: type=1400 audit(1757459175.088:84): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 39.268764][ T29] audit: type=1400 audit(1757459175.088:85): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.TgdSvr/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 39.268798][ T29] audit: type=1400 audit(1757459175.088:86): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.TgdSvr/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4052 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.281114][ T37] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.299365][ T29] audit: type=1400 audit(1757459175.088:87): avc: denied { unmount } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.300268][ T29] audit: type=1400 audit(1757459175.118:88): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.404205][ T29] audit: type=1400 audit(1757459175.118:89): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="gadgetfs" ino=4058 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.429455][ T3307] veth1_vlan: entered promiscuous mode [ 39.432005][ T3316] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.451908][ T29] audit: type=1400 audit(1757459175.358:90): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.465694][ T3307] veth0_macvtap: entered promiscuous mode [ 39.492681][ T3313] veth1_vlan: entered promiscuous mode [ 39.501341][ T37] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.525698][ T3307] veth1_macvtap: entered promiscuous mode [ 39.551654][ T3305] veth0_vlan: entered promiscuous mode [ 39.562363][ T3305] veth1_vlan: entered promiscuous mode [ 39.568968][ T3313] veth0_macvtap: entered promiscuous mode [ 39.577970][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.586661][ T3313] veth1_macvtap: entered promiscuous mode [ 39.599885][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.615333][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.633611][ T2596] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.650676][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.669709][ T3305] veth0_macvtap: entered promiscuous mode [ 39.691895][ T2596] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.714744][ T3305] veth1_macvtap: entered promiscuous mode [ 39.744104][ T2596] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.762592][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.783653][ T2596] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.805902][ T2596] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.815345][ T3485] loop0: detected capacity change from 0 to 164 [ 39.827609][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.846652][ T37] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.855618][ T37] ================================================================== [ 39.863719][ T37] BUG: KCSAN: data-race in console_flush_all / console_flush_all [ 39.871546][ T37] [ 39.873880][ T37] write to 0xffffffff86a20b98 of 8 bytes by task 3485 on cpu 0: [ 39.881518][ T37] console_flush_all+0x35a/0x730 [ 39.886474][ T37] console_unlock+0xa1/0x330 [ 39.891082][ T37] vprintk_emit+0x388/0x650 [ 39.895600][ T37] vprintk_default+0x26/0x30 [ 39.900199][ T37] vprintk+0x1d/0x30 [ 39.904112][ T37] _printk+0x79/0xa0 [ 39.908033][ T37] isofs_fill_super+0x1253/0x1270 [ 39.913080][ T37] get_tree_bdev_flags+0x28e/0x300 [ 39.918214][ T37] get_tree_bdev+0x1f/0x30 [ 39.922650][ T37] isofs_get_tree+0x1c/0x30 [ 39.927182][ T37] vfs_get_tree+0x57/0x1d0 [ 39.931614][ T37] do_new_mount+0x207/0x5e0 [ 39.936148][ T37] path_mount+0x4a4/0xb20 [ 39.940493][ T37] __se_sys_mount+0x28f/0x2e0 [ 39.945184][ T37] __x64_sys_mount+0x67/0x80 [ 39.949788][ T37] x64_sys_call+0x2b4d/0x2ff0 [ 39.954567][ T37] do_syscall_64+0xd2/0x200 [ 39.959090][ T37] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.965005][ T37] [ 39.967423][ T37] read to 0xffffffff86a20b98 of 8 bytes by task 37 on cpu 1: [ 39.974797][ T37] console_flush_all+0x563/0x730 [ 39.979748][ T37] console_unlock+0xa1/0x330 [ 39.984351][ T37] vprintk_emit+0x388/0x650 [ 39.988862][ T37] dev_vprintk_emit+0x242/0x2a0 [ 39.993724][ T37] dev_printk_emit+0x84/0xb0 [ 39.998330][ T37] __netdev_printk+0x35c/0x3e0 [ 40.003120][ T37] netdev_info+0x9b/0xd0 [ 40.007379][ T37] nsim_udp_tunnel_set_port+0x13b/0x160 [ 40.012945][ T37] __udp_tunnel_nic_device_sync+0x564/0x9c0 [ 40.018851][ T37] udp_tunnel_nic_device_sync_work+0x5d/0x5f0 [ 40.024926][ T37] process_scheduled_works+0x4cb/0x9d0 [ 40.030407][ T37] worker_thread+0x582/0x770 [ 40.035020][ T37] kthread+0x489/0x510 [ 40.039094][ T37] ret_from_fork+0xda/0x150 [ 40.043611][ T37] ret_from_fork_asm+0x1a/0x30 [ 40.048387][ T37] [ 40.050715][ T37] value changed: 0x0000000000000689 -> 0x000000000000068a [ 40.057821][ T37] [ 40.060144][ T37] Reported by Kernel Concurrency Sanitizer on: [ 40.066312][ T37] CPU: 1 UID: 0 PID: 37 Comm: kworker/u8:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 40.076045][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 40.086112][ T37] Workqueue: udp_tunnel_nic udp_tunnel_nic_device_sync_work [ 40.093418][ T37] ================================================================== [ 40.156448][ T3487] Zero length message leads to an empty skb [ 40.259758][ T3485] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 40.419666][ T37] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.429932][ T37] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.441314][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.450280][ T3474] loop1: detected capacity change from 0 to 2048 [ 40.459666][ T37] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.469356][ T51] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.480330][ T51] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0