last executing test programs: 1.196493773s ago: executing program 4 (id=5): recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc094, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x10000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) unshare(0x62040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 1.135841963s ago: executing program 1 (id=2): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000500)={[{@i_version}, {@usrquota}, {@bh}]}, 0x1, 0x523, &(0x7f0000000c00)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x14c) write$binfmt_elf32(r0, &(0x7f0000000900)=ANY=[], 0x58) fallocate(r3, 0x0, 0x9, 0x2000403) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xc, r0, 0x0, 0x0, 0x2, 0xfffefffffdffffff}) 671.543486ms ago: executing program 0 (id=14): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0xf4) r3 = dup2(r2, r2) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8}) ioctl$BLKTRACESETUP(r3, 0x1276, 0x0) 656.724796ms ago: executing program 3 (id=15): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r1, 0x0, 0x4ab}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) 640.904766ms ago: executing program 0 (id=16): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000140)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000200), 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="980000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8800000000000000000000000000010c0002800500010000000000080007"], 0x98}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[], 0x98}, 0x1, 0x0, 0x0, 0x20040800}, 0x0) 508.334157ms ago: executing program 2 (id=3): r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x10b8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000ffff00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085ec00008200000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="16000000000000000400000002"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='rxrpc_local\x00', r2}, 0x18) r3 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[], 0x10b8}, 0x4000000) 479.879347ms ago: executing program 3 (id=17): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3801000010000100feffffff00010000fe880000000000000000000000000001fc010000000000000000000000000001000107144e230005000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000004d46c0000007f000001000000000000000000000000000000000000000092010000000000000600000000000000ffff0000000000001c250800000000000200000000000000f8ff07000000ffff0000000000000000ffffffffffffffff00000000000000001f00000000000000feffffffffffffff02000000fcffffff000000002abd700004350000020001002000000000000000480003006465666c617465"], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000010200fd000005000500000000000a"], 0x70}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x3ef, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=@newsa={0x138, 0x1a, 0x1, 0xfffffffe, 0x100, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x71c, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@dev={0xac, 0x14, 0x14, 0x25}, {0x0, 0x192, 0x9ba3, 0xffff, 0x8251c, 0x5, 0xfffffffffffffffc}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0xfffffffa, 0x3fc}, 0x80, 0x3500, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x844) 448.877218ms ago: executing program 2 (id=18): r0 = socket$inet(0x2, 0x3, 0x5) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000080)=0xfffffffa, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @multicast1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) write$binfmt_elf64(r0, 0x0, 0x40) 415.378548ms ago: executing program 0 (id=19): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffcc1, 0x840, 0x0, 0x56) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r1, 0x100000) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x604ab000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000001380)=""/4080, 0xfffffffffffffdcc, 0x0, 0x0, 0xffffffffffffff29}, &(0x7f0000000000)=0x40) 385.147428ms ago: executing program 2 (id=20): r0 = socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1, 0x0, 0xde6}, 0x18) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syzkaller0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x1a, r2, 0x1, 0x8, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) 354.305918ms ago: executing program 3 (id=21): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r3, &(0x7f0000000140)='./file0\x00') openat(r3, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664fa4) 321.908008ms ago: executing program 0 (id=22): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) 302.626178ms ago: executing program 3 (id=23): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%+9llu \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_register(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01022dbd7000ffdb652520e7000109001f0070687931000000000a0001007770616e33000000050020"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 284.725879ms ago: executing program 1 (id=24): openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) personality(0x500006) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) personality(0x5000004) 185.202879ms ago: executing program 0 (id=25): syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0x1218088, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x4a, 0x2d1, &(0x7f0000000c80)="$eJzs3U9rI2UcB/DfpOlk1ENy8CTCDrgHT4vdm3hJkV0Qe3LJYfWgxd0FaYKwCwX/YNyTVy8ePPgKBMGL72IvvgPBq+DNFRZGZjLTTGraJtpUbD+fS3995vnO8zzp0zQ55OkHL08O7uXx4PHnv0SWJdEZxjCeJjGITjS+jAXDrwMA+D97WhTxezGzTi6JiGxz0wIANmi1v//defnjhUwLANigO3fffXt3b+/WO1lkcXvy1eGofGdffp1d330QH8U47sdr0Y9nEdXrhPqNf1nfLopi2s1Lg7g+mR6OyuTk/Sf1/Xd/i6jyO9GPwVGserVR5d/au7VTxfNeKz8t5/F8Pf6wzN+Mfrx4FF7I35zl83Y+Rmm8+kpr/jeiHz9/GB/HOO5Vk5jnv9jJ8zeLb/747L1yemU+mR6OelW/uWLrIn8uAAAAAAAAAAAAAAAAAAAAAABcbjfy5vCd/Fpcn5RN9fk7W8/Suk/dZTBPlddnVdI0tc4HKk2L+G52pOD2wnjz83268VK3fbAgAAAAAAAAAAAAAAAAAAAAXF2PPvn0YH88vv/wXIrmNIBuRPx5J+Kf3mfYarkWp3fu1WPuj8edulzo8yRtt8RW0yeJOHUa5SLO6WE5q3guOzbnpvj+h3KB69wwa7W8vnyB22et627v3+6NZncd7CfLx+pF05LVm+TbNGLeJ40Vx0pPulREe/udteR06aX+2mtPX6iK6Yl9imTJFm0Vb/w6u163JHHslyitHtWlo2/XRSt+bG+stJ8jm8X//lyRVKd19DbxNAQAAAAAAAAAAAAAAAAAACx8xrv87qfFi49PjXYKHwUGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4JKY////NYppHV6hcxoPH/3HSwQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAK+CsAAP//cutM2w==") bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) socket$rds(0x15, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb85000000430000"], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x2b, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xaf) 179.764529ms ago: executing program 3 (id=26): creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[@ANYBLOB="f8000000", @ANYRES16=r3, @ANYBLOB="0100000000000000000001000000040004800800020001000000080001000000000004000880cc0008"], 0xf8}}, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000200)) 149.683039ms ago: executing program 2 (id=27): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) 86.47669ms ago: executing program 1 (id=28): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000380)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x7, 0x7}, {}, {0x8, 0x2}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0xfffffffd, 0x400, 0x7, 0x6, 0x7}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0x0, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000700)={0x0, 0x1e5, &(0x7f00000006c0)={&(0x7f0000000440)=@deltaction={0x28, 0x32, 0x101, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 59.79314ms ago: executing program 3 (id=29): r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) 12.11062ms ago: executing program 0 (id=30): r0 = socket(0x1e, 0x4, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r2, 0x0, 0xf7}, 0x18) r3 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x65}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) dup3(r2, r3, 0x0) 0s ago: executing program 2 (id=31): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) close_range(r2, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.64' (ED25519) to the list of known hosts. [ 25.478740][ T29] audit: type=1400 audit(1761978932.672:62): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.501804][ T29] audit: type=1400 audit(1761978932.692:63): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.502501][ T3302] cgroup: Unknown subsys name 'net' [ 25.529683][ T29] audit: type=1400 audit(1761978932.722:64): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.625873][ T3302] cgroup: Unknown subsys name 'cpuset' [ 25.632061][ T3302] cgroup: Unknown subsys name 'rlimit' [ 25.751317][ T29] audit: type=1400 audit(1761978932.942:65): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.774606][ T29] audit: type=1400 audit(1761978932.942:66): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.795154][ T29] audit: type=1400 audit(1761978932.942:67): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.815730][ T29] audit: type=1400 audit(1761978932.942:68): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.836045][ T29] audit: type=1400 audit(1761978932.952:69): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.843080][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.860909][ T29] audit: type=1400 audit(1761978932.952:70): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.892799][ T29] audit: type=1400 audit(1761978933.062:71): avc: denied { relabelto } for pid=3306 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.938521][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.033740][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 27.052668][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 27.139378][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 27.157299][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.164409][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.171602][ T3319] bridge_slave_0: entered allmulticast mode [ 27.178027][ T3319] bridge_slave_0: entered promiscuous mode [ 27.196799][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.203879][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.211113][ T3313] bridge_slave_0: entered allmulticast mode [ 27.217399][ T3313] bridge_slave_0: entered promiscuous mode [ 27.224168][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.231260][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.238445][ T3313] bridge_slave_1: entered allmulticast mode [ 27.244971][ T3313] bridge_slave_1: entered promiscuous mode [ 27.251467][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.258563][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.265838][ T3319] bridge_slave_1: entered allmulticast mode [ 27.272014][ T3319] bridge_slave_1: entered promiscuous mode [ 27.283099][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 27.321853][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.332523][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.354489][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.364774][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.404591][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.411710][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.418900][ T3314] bridge_slave_0: entered allmulticast mode [ 27.425447][ T3314] bridge_slave_0: entered promiscuous mode [ 27.433574][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.440670][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.447859][ T3314] bridge_slave_1: entered allmulticast mode [ 27.454271][ T3314] bridge_slave_1: entered promiscuous mode [ 27.465868][ T3313] team0: Port device team_slave_0 added [ 27.472244][ T3319] team0: Port device team_slave_0 added [ 27.486861][ T3313] team0: Port device team_slave_1 added [ 27.497710][ T3319] team0: Port device team_slave_1 added [ 27.515791][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.529092][ T3327] chnl_net:caif_netlink_parms(): no params data found [ 27.546421][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.553378][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.579326][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.591137][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.606973][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.614009][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.621171][ T3317] bridge_slave_0: entered allmulticast mode [ 27.627468][ T3317] bridge_slave_0: entered promiscuous mode [ 27.633967][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.641041][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.667066][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.682675][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.689684][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.715615][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.731200][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.738262][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.764183][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.775125][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.782156][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.789303][ T3317] bridge_slave_1: entered allmulticast mode [ 27.795565][ T3317] bridge_slave_1: entered promiscuous mode [ 27.813593][ T3314] team0: Port device team_slave_0 added [ 27.837784][ T3314] team0: Port device team_slave_1 added [ 27.844557][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.876578][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.893610][ T3319] hsr_slave_0: entered promiscuous mode [ 27.899725][ T3319] hsr_slave_1: entered promiscuous mode [ 27.907475][ T3313] hsr_slave_0: entered promiscuous mode [ 27.913455][ T3313] hsr_slave_1: entered promiscuous mode [ 27.919818][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 27.925748][ T3313] Cannot create hsr debugfs directory [ 27.931654][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.938664][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.965429][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.990674][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.997668][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.023594][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.041432][ T3317] team0: Port device team_slave_0 added [ 28.047212][ T3327] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.054261][ T3327] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.061393][ T3327] bridge_slave_0: entered allmulticast mode [ 28.067712][ T3327] bridge_slave_0: entered promiscuous mode [ 28.074424][ T3327] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.081580][ T3327] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.088714][ T3327] bridge_slave_1: entered allmulticast mode [ 28.095179][ T3327] bridge_slave_1: entered promiscuous mode [ 28.109286][ T3317] team0: Port device team_slave_1 added [ 28.140872][ T3327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.169064][ T3327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.204452][ T3314] hsr_slave_0: entered promiscuous mode [ 28.210466][ T3314] hsr_slave_1: entered promiscuous mode [ 28.216310][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 28.222100][ T3314] Cannot create hsr debugfs directory [ 28.227962][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.235023][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.261000][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.277225][ T3327] team0: Port device team_slave_0 added [ 28.283701][ T3327] team0: Port device team_slave_1 added [ 28.289960][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.297003][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.322921][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.373751][ T3327] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.380791][ T3327] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.406785][ T3327] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.426437][ T3317] hsr_slave_0: entered promiscuous mode [ 28.432389][ T3317] hsr_slave_1: entered promiscuous mode [ 28.438491][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 28.444221][ T3317] Cannot create hsr debugfs directory [ 28.454854][ T3327] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.461837][ T3327] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.487805][ T3327] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.557836][ T3327] hsr_slave_0: entered promiscuous mode [ 28.563914][ T3327] hsr_slave_1: entered promiscuous mode [ 28.570013][ T3327] debugfs: 'hsr0' already exists in 'hsr' [ 28.575798][ T3327] Cannot create hsr debugfs directory [ 28.642064][ T3313] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.657486][ T3313] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.672900][ T3313] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.687776][ T3313] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.716268][ T3319] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.727391][ T3319] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.739528][ T3319] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.751139][ T3319] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.769658][ T3314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.787611][ T3314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 28.800364][ T3314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 28.816780][ T3314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.835559][ T3317] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.852029][ T3317] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.860647][ T3317] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.871014][ T3317] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.892482][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.915879][ T3327] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.924702][ T3327] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.937978][ T3327] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.955331][ T3327] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.969544][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.982069][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.992162][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.000108][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.007258][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.023141][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.030250][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.055532][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.065958][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.079852][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.087110][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.096034][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.103083][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.117956][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.125075][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.133757][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.140807][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.161770][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.195764][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.223515][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.232672][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.255568][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.268732][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.275844][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.286214][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.293253][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.318440][ T3327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.332375][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.381961][ T3317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.400167][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.410864][ T3327] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.429755][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.456850][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.464134][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.482661][ T3313] veth0_vlan: entered promiscuous mode [ 29.490362][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.497489][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.525160][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.533678][ T3313] veth1_vlan: entered promiscuous mode [ 29.573271][ T3313] veth0_macvtap: entered promiscuous mode [ 29.597289][ T3313] veth1_macvtap: entered promiscuous mode [ 29.626131][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.648074][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.664821][ T39] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.692719][ T1949] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.719235][ T3317] veth0_vlan: entered promiscuous mode [ 29.735875][ T3314] veth0_vlan: entered promiscuous mode [ 29.745152][ T1949] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.756938][ T3313] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.762619][ T3317] veth1_vlan: entered promiscuous mode [ 29.778405][ T52] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.793081][ T3327] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.816560][ T3314] veth1_vlan: entered promiscuous mode [ 29.830437][ T3319] veth0_vlan: entered promiscuous mode [ 29.863418][ T3317] veth0_macvtap: entered promiscuous mode [ 29.871395][ T3317] veth1_macvtap: entered promiscuous mode [ 29.889868][ T3319] veth1_vlan: entered promiscuous mode [ 29.903278][ T3314] veth0_macvtap: entered promiscuous mode [ 29.916659][ T3314] veth1_macvtap: entered promiscuous mode [ 29.944402][ T3319] veth0_macvtap: entered promiscuous mode [ 29.954625][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.966937][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.977847][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.989844][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 29.997463][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.005037][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.013084][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.014666][ T3319] veth1_macvtap: entered promiscuous mode [ 30.020617][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.033428][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.033743][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.042956][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.048431][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.048454][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.070429][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.078032][ T3423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.087108][ T3423] hid-generic 0000:0000:0000.0001: hidraw0: HID v8.00 Device [syz0] on syz0 [ 30.098749][ T3327] veth0_vlan: entered promiscuous mode [ 30.104470][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.113950][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.123958][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.164140][ T3487] fido_id[3487]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 30.187017][ T3327] veth1_vlan: entered promiscuous mode [ 30.200532][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.234470][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.273615][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.287869][ T3327] veth0_macvtap: entered promiscuous mode [ 30.294407][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.340011][ T3502] loop1: detected capacity change from 0 to 512 [ 30.349506][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.355516][ T3502] EXT4-fs: Ignoring removed i_version option [ 30.364429][ T3502] EXT4-fs: Ignoring removed bh option [ 30.385929][ T3327] veth1_macvtap: entered promiscuous mode [ 30.406001][ T39] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.417658][ T3327] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.417819][ T3505] netlink: 19 bytes leftover after parsing attributes in process `syz.0.11'. [ 30.434162][ T39] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.443411][ T39] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.459784][ T3502] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 30.460283][ T3327] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.482897][ T3502] ext4 filesystem being mounted at /0/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 30.527514][ T39] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.544078][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 30.544095][ T29] audit: type=1400 audit(1761978937.732:118): avc: denied { mount } for pid=3509 comm="syz.3.12" name="/" dev="ramfs" ino=4057 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 30.572379][ T29] audit: type=1400 audit(1761978937.732:119): avc: denied { create } for pid=3511 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 30.599633][ T39] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.605810][ T29] audit: type=1400 audit(1761978937.742:120): avc: denied { add_name } for pid=3501 comm="syz.1.2" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 30.628625][ T29] audit: type=1400 audit(1761978937.742:121): avc: denied { create } for pid=3501 comm="syz.1.2" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 30.648576][ T29] audit: type=1400 audit(1761978937.742:122): avc: denied { connect } for pid=3511 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 30.668002][ T29] audit: type=1400 audit(1761978937.742:123): avc: denied { name_connect } for pid=3511 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 30.688011][ T29] audit: type=1400 audit(1761978937.762:124): avc: denied { listen } for pid=3511 comm="syz.0.13" lport=54309 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 30.710745][ T29] audit: type=1400 audit(1761978937.762:125): avc: denied { accept } for pid=3511 comm="syz.0.13" lport=54309 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 30.733776][ T29] audit: type=1400 audit(1761978937.762:126): avc: denied { write } for pid=3511 comm="syz.0.13" lport=54309 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 30.757154][ T29] audit: type=1400 audit(1761978937.762:127): avc: denied { setopt } for pid=3511 comm="syz.0.13" lport=54309 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 30.806382][ T2606] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.835770][ T2606] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.857753][ T2606] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.859557][ T3521] netlink: 4 bytes leftover after parsing attributes in process `syz.0.16'. [ 30.895214][ T2606] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.992950][ T3521] netlink: 4 bytes leftover after parsing attributes in process `syz.0.16'. [ 31.175827][ T3317] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.315296][ T3545] netlink: 200 bytes leftover after parsing attributes in process `syz.3.26'. [ 31.372540][ T3549] loop0: detected capacity change from 0 to 256 [ 31.415604][ T3551] netlink: 12 bytes leftover after parsing attributes in process `syz.1.28'. [ 31.424460][ T3551] netlink: 12 bytes leftover after parsing attributes in process `syz.1.28'. [ 31.504250][ T3558] ================================================================== [ 31.512388][ T3558] BUG: KCSAN: data-race in __bpf_get_stackid / bcmp [ 31.519012][ T3558] [ 31.521350][ T3558] write to 0xffff88811cf98010 of 136 bytes by task 3560 on cpu 1: [ 31.529263][ T3558] __bpf_get_stackid+0x761/0x800 [ 31.534248][ T3558] bpf_get_stackid+0xe9/0x120 [ 31.538958][ T3558] bpf_get_stackid_raw_tp+0xf6/0x120 [ 31.544295][ T3558] bpf_prog_53f0063d4d7f65ce+0x2a/0x32 [ 31.549764][ T3558] bpf_trace_run2+0x107/0x1c0 [ 31.554469][ T3558] kfree+0x351/0x400 [ 31.558392][ T3558] security_context_to_sid_core+0x375/0x3b0 [ 31.564323][ T3558] security_context_to_sid_force+0x30/0x40 [ 31.570167][ T3558] selinux_inode_post_setxattr+0xa5/0x2b0 [ 31.576007][ T3558] security_inode_post_setxattr+0x94/0xc0 [ 31.581755][ T3558] __vfs_setxattr_noperm+0x38a/0x410 [ 31.587070][ T3558] __vfs_setxattr_locked+0x1af/0x1d0 [ 31.592378][ T3558] vfs_setxattr+0x132/0x270 [ 31.596901][ T3558] filename_setxattr+0x1ad/0x400 [ 31.601866][ T3558] path_setxattrat+0x2c9/0x310 [ 31.606696][ T3558] __x64_sys_lsetxattr+0x71/0x90 [ 31.611656][ T3558] x64_sys_call+0x287b/0x3000 [ 31.616359][ T3558] do_syscall_64+0xd2/0x200 [ 31.620973][ T3558] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 31.626965][ T3558] [ 31.629297][ T3558] read to 0xffff88811cf98058 of 8 bytes by task 3558 on cpu 0: [ 31.636947][ T3558] bcmp+0x23/0x90 [ 31.640607][ T3558] __bpf_get_stackid+0x371/0x800 [ 31.645577][ T3558] bpf_get_stackid+0xe9/0x120 [ 31.650306][ T3558] bpf_get_stackid_raw_tp+0xf6/0x120 [ 31.655645][ T3558] bpf_prog_53f0063d4d7f65ce+0x2a/0x32 [ 31.661217][ T3558] bpf_trace_run2+0x107/0x1c0 [ 31.665915][ T3558] kfree+0x351/0x400 [ 31.669839][ T3558] tipc_group_delete+0x207/0x290 [ 31.674798][ T3558] tipc_sk_leave+0xa9/0x270 [ 31.679326][ T3558] tipc_release+0x83/0xd20 [ 31.683753][ T3558] sock_close+0x6b/0x150 [ 31.688021][ T3558] __fput+0x29b/0x650 [ 31.692010][ T3558] ____fput+0x1c/0x30 [ 31.695998][ T3558] task_work_run+0x131/0x1a0 [ 31.700613][ T3558] exit_to_user_mode_loop+0xed/0x110 [ 31.705913][ T3558] do_syscall_64+0x1d6/0x200 [ 31.710527][ T3558] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 31.716533][ T3558] [ 31.718863][ T3558] value changed: 0xffffffff8191f20c -> 0xffffffff8198c84f [ 31.725984][ T3558] [ 31.728319][ T3558] Reported by Kernel Concurrency Sanitizer on: [ 31.734475][ T3558] CPU: 0 UID: 0 PID: 3558 Comm: syz.2.31 Not tainted syzkaller #0 PREEMPT(voluntary) [ 31.744036][ T3558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 31.754111][ T3558] ==================================================================