last executing test programs: 1.456493752s ago: executing program 4 (id=347): prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x8, 0x40, 0x7fff0000}]}) io_submit(0x0, 0x0, 0x0) 1.396008134s ago: executing program 4 (id=353): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x1c0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000040)={0x1, &(0x7f0000000200)=[{0x6, 0xf5, 0x9, 0x7fff0000}]}) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00') 1.378950104s ago: executing program 4 (id=355): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x700, 0x0, 0xfffffffffffffd25) setsockopt$inet_tcp_int(r0, 0x6, 0x25, &(0x7f0000000000), 0x4) 1.331865605s ago: executing program 1 (id=358): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) fcntl$lock(r0, 0x25, &(0x7f00000031c0)={0x0, 0x0, 0x0, 0x2}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x1}) 1.315384185s ago: executing program 1 (id=360): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x700, 0x0, 0xfffffffffffffd25) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x3, 0x4) 704.822257ms ago: executing program 0 (id=369): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000080)=0x1, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/17, 0x11}, 0xfffffffe}], 0x1, 0x2, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="1f", 0x1}], 0x1}, 0x8c0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x193a, 0x4) recvmmsg(r0, &(0x7f00000005c0), 0x40000000000026c, 0x0, 0x0) 679.242507ms ago: executing program 0 (id=370): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000004"], 0x50) io_uring_enter(r3, 0x2219, 0x7721, 0x16, 0x0, 0x0) dup3(r1, r0, 0x0) 613.417808ms ago: executing program 0 (id=371): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000036000/0x2000)=nil, &(0x7f0000594000/0x4000)=nil, &(0x7f0000f36000/0x2000)=nil, &(0x7f0000918000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c12000/0x2000)=nil, &(0x7f000003f000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0x30}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1f0000000400000060b8", @ANYRES32, @ANYBLOB="102bce7000"], 0x50) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 548.05465ms ago: executing program 0 (id=372): r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendmmsg$inet(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000180)={0x2, 0x4e23, @empty}, 0x10, 0x0}}], 0x1, 0x20004840) shutdown(r0, 0x1) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r1, 0x0, 0x7ffff000, 0x0) 547.69174ms ago: executing program 0 (id=373): r0 = socket(0x11, 0x3, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000f5ffffffffffffff000000", @ANYRES32, @ANYBLOB='\x00\x00'], 0x50) io_uring_enter(r3, 0x2219, 0x7721, 0x16, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0xe000202b}) epoll_pwait(r2, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r4 = dup3(r0, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000300)={0x200f}) 540.02117ms ago: executing program 4 (id=374): prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x1, 0xe, 0x7ffffffe}]}) setitimer(0x2, 0x0, 0x0) 512.751091ms ago: executing program 4 (id=375): r0 = socket(0xa, 0x3, 0xff) setsockopt$inet6_int(r0, 0x29, 0x4, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x2}], 0x1, 0x4020, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6c370c8900083c0120010000000000000000000000000000fe8000000000000000000000000000aaff"], 0x0) 499.713281ms ago: executing program 0 (id=376): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r1, 0x2) r2 = open(&(0x7f0000000180)='.\x00', 0x10000, 0x2) r3 = open(&(0x7f0000000300)='.\x00', 0x100000, 0x0) flock(r2, 0x1) flock(r3, 0x1) 438.159122ms ago: executing program 1 (id=380): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000080)=0x1, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/17, 0x11}, 0xfffffffe}], 0x1, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="1f", 0x1}], 0x1}, 0x8c0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x193a, 0x4) recvmmsg(r0, &(0x7f00000005c0), 0x40000000000026c, 0x0, 0x0) 437.919772ms ago: executing program 1 (id=381): r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3f}}], 0x20) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) 411.662472ms ago: executing program 4 (id=382): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x700, 0x0, 0xfffffffffffffd25) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0xa, 0x4) 411.189102ms ago: executing program 1 (id=383): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000006040)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000003c0)="0f2f", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000005c40)=[{&(0x7f00000000c0)='_', 0xfe3c}], 0x1}}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000100)="19", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000025c0), 0x1}}], 0x4, 0x608d8d0) 395.087213ms ago: executing program 1 (id=384): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x700, 0x0, 0xfffffffffffffd25) setsockopt$inet_tcp_int(r0, 0x6, 0x25, &(0x7f0000000000), 0x4) 325.209454ms ago: executing program 3 (id=386): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x9, @ipv4={'\x00', '\xff\xff', @loopback}, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000140)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x2, @empty, 0xfffffffe}, 0x1c, &(0x7f0000000b40)=[{&(0x7f0000000a40)="fbd3", 0x2}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20080058) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @empty, 0x6}, 0x1c) 325.045544ms ago: executing program 3 (id=387): r0 = shmat(0x0, &(0x7f0000f62000/0x1000)=nil, 0x7000) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace(0x8, r1) wait4(0x0, 0x0, 0x0, 0x0) shmdt(r0) 288.069585ms ago: executing program 3 (id=388): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, 0x0) r4 = fcntl$dupfd(r2, 0x406, r1) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r2, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000100)={0x1}) close_range(r0, 0xffffffffffffffff, 0x0) 287.640695ms ago: executing program 3 (id=389): r0 = socket(0xa, 0x3, 0xff) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000140)=0x100007, 0x4) recvmmsg(r0, 0x0, 0x0, 0x40000102, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa3986dd6c370c89000c2c0120010000000000000000000000000001fe8000000000000000000000000000aaff"], 0x0) 232.011766ms ago: executing program 3 (id=390): socket(0x2, 0x3, 0xff) socket(0x2, 0x3, 0xff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') socket(0x2, 0x3, 0xff) pread64(r0, &(0x7f0000000040)=""/48, 0x30, 0x200087) 231.783426ms ago: executing program 3 (id=391): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x11) recvfrom$inet(r0, 0x0, 0x0, 0x700, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x3, 0x4) 80.025959ms ago: executing program 2 (id=396): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000000)='N', 0x1}], 0x1, 0x0, 0x0, 0x804c040}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='\a', 0x1}, {0x0, 0x30}], 0x2, &(0x7f0000000340)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0x0, 0x41, 0x808, 0x2, 0xffffffff, 0x3, 0x7fffffff}}], 0x30}, 0x0) 79.757399ms ago: executing program 2 (id=397): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000180)=0x7, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000340)=0x63ba, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000380)=0x4, 0x4) sendmmsg$inet6(r0, &(0x7f0000000400)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x800, @loopback}, 0x1c, 0x0}}], 0x1, 0x60040000) recvmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)=""/129, 0x81}, 0xdb30}], 0x1, 0x40002042, 0x0) 79.595969ms ago: executing program 2 (id=398): r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r0, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}, 0x20000000}, {{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000240)="b9", 0x1}], 0x1}}], 0x2, 0x0) 72.137609ms ago: executing program 2 (id=399): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x482, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xfffffffb, 0x7, 0x1, 0xfffffffa, 0x14, "db8f3d2b00"}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x0, 0x40000000, 0x0, 0x2, 0x83}) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) ppoll(&(0x7f00000000c0)=[{r1, 0x208e}], 0x1, 0x0, 0x0, 0x0) 57.214849ms ago: executing program 2 (id=400): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = eventfd2(0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000004"], 0x50) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1fd, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 0s ago: executing program 2 (id=401): mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x11c0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x3}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000540)='\x02A\xbb\xcc\x96\x0eo\x1f\xe2@\xcc\xb1Yg\x00\x00\x00\x00\x00\x00', 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000036000/0x2000)=nil, &(0x7f0000594000/0x4000)=nil, &(0x7f0000f36000/0x2000)=nil, &(0x7f0000918000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c12000/0x2000)=nil, &(0x7f000003f000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0x30}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x148640, 0x78e22799f4a46f8e) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.112' (ED25519) to the list of known hosts. [ 33.144787][ T29] audit: type=1400 audit(1757169919.697:62): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.145963][ T3294] cgroup: Unknown subsys name 'net' [ 33.167549][ T29] audit: type=1400 audit(1757169919.697:63): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.194957][ T29] audit: type=1400 audit(1757169919.717:64): avc: denied { unmount } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.334352][ T3294] cgroup: Unknown subsys name 'cpuset' [ 33.340889][ T3294] cgroup: Unknown subsys name 'rlimit' [ 33.502144][ T29] audit: type=1400 audit(1757169920.047:65): avc: denied { setattr } for pid=3294 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.529281][ T29] audit: type=1400 audit(1757169920.047:66): avc: denied { create } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 33.549866][ T29] audit: type=1400 audit(1757169920.057:67): avc: denied { write } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.566110][ T3296] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 33.570297][ T29] audit: type=1400 audit(1757169920.057:68): avc: denied { read } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.599283][ T29] audit: type=1400 audit(1757169920.057:69): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.602749][ T3294] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 33.624170][ T29] audit: type=1400 audit(1757169920.057:70): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 33.656167][ T29] audit: type=1400 audit(1757169920.127:71): avc: denied { relabelto } for pid=3296 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 35.517865][ T3309] chnl_net:caif_netlink_parms(): no params data found [ 35.574070][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 35.595852][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 35.623235][ T3309] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.630401][ T3309] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.637651][ T3309] bridge_slave_0: entered allmulticast mode [ 35.644168][ T3309] bridge_slave_0: entered promiscuous mode [ 35.663393][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 35.672364][ T3309] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.679453][ T3309] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.686664][ T3309] bridge_slave_1: entered allmulticast mode [ 35.693209][ T3309] bridge_slave_1: entered promiscuous mode [ 35.728829][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.750612][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.786065][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 35.805693][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.812812][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.820039][ T3303] bridge_slave_0: entered allmulticast mode [ 35.826456][ T3303] bridge_slave_0: entered promiscuous mode [ 35.838968][ T3309] team0: Port device team_slave_0 added [ 35.849610][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.856812][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.863990][ T3303] bridge_slave_1: entered allmulticast mode [ 35.870416][ T3303] bridge_slave_1: entered promiscuous mode [ 35.882089][ T3309] team0: Port device team_slave_1 added [ 35.888005][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.895199][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.902538][ T3304] bridge_slave_0: entered allmulticast mode [ 35.909129][ T3304] bridge_slave_0: entered promiscuous mode [ 35.935406][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.942488][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.949986][ T3304] bridge_slave_1: entered allmulticast mode [ 35.956420][ T3304] bridge_slave_1: entered promiscuous mode [ 35.968849][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.001080][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.012827][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.019983][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.027186][ T3306] bridge_slave_0: entered allmulticast mode [ 36.033483][ T3306] bridge_slave_0: entered promiscuous mode [ 36.040248][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.047333][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.073290][ T3309] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.085242][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.094542][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.101498][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.127481][ T3309] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.150814][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.158003][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.166332][ T3306] bridge_slave_1: entered allmulticast mode [ 36.172804][ T3306] bridge_slave_1: entered promiscuous mode [ 36.180229][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.212021][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.219127][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.226351][ T3313] bridge_slave_0: entered allmulticast mode [ 36.232777][ T3313] bridge_slave_0: entered promiscuous mode [ 36.250884][ T3304] team0: Port device team_slave_0 added [ 36.258026][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.267790][ T3303] team0: Port device team_slave_0 added [ 36.273737][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.280892][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.288157][ T3313] bridge_slave_1: entered allmulticast mode [ 36.294681][ T3313] bridge_slave_1: entered promiscuous mode [ 36.307096][ T3304] team0: Port device team_slave_1 added [ 36.314043][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.324858][ T3303] team0: Port device team_slave_1 added [ 36.360068][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.376854][ T3309] hsr_slave_0: entered promiscuous mode [ 36.382951][ T3309] hsr_slave_1: entered promiscuous mode [ 36.401659][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.408736][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.434663][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.451281][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.460944][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.467924][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.493937][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.510260][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.517339][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.543475][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.557694][ T3306] team0: Port device team_slave_0 added [ 36.568774][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.575802][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.601806][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.622530][ T3306] team0: Port device team_slave_1 added [ 36.650500][ T3313] team0: Port device team_slave_0 added [ 36.679446][ T3313] team0: Port device team_slave_1 added [ 36.688313][ T3303] hsr_slave_0: entered promiscuous mode [ 36.694390][ T3303] hsr_slave_1: entered promiscuous mode [ 36.700224][ T3303] debugfs: 'hsr0' already exists in 'hsr' [ 36.705976][ T3303] Cannot create hsr debugfs directory [ 36.718528][ T3304] hsr_slave_0: entered promiscuous mode [ 36.724609][ T3304] hsr_slave_1: entered promiscuous mode [ 36.730539][ T3304] debugfs: 'hsr0' already exists in 'hsr' [ 36.736312][ T3304] Cannot create hsr debugfs directory [ 36.742044][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.749122][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.775095][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.786285][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.793279][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.819227][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.842975][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.849994][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.876031][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.905820][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.912803][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.939000][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.989718][ T3306] hsr_slave_0: entered promiscuous mode [ 36.995897][ T3306] hsr_slave_1: entered promiscuous mode [ 37.001802][ T3306] debugfs: 'hsr0' already exists in 'hsr' [ 37.007548][ T3306] Cannot create hsr debugfs directory [ 37.047853][ T3313] hsr_slave_0: entered promiscuous mode [ 37.053933][ T3313] hsr_slave_1: entered promiscuous mode [ 37.059790][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 37.065652][ T3313] Cannot create hsr debugfs directory [ 37.181456][ T3309] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.190334][ T3309] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.216086][ T3309] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.234219][ T3309] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.258726][ T3304] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.267725][ T3304] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.278116][ T3304] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.290138][ T3304] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.320882][ T3303] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.330301][ T3303] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.339109][ T3303] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.348222][ T3303] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.398481][ T3306] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.408421][ T3306] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.418277][ T3306] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.427536][ T3306] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.468300][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.481754][ T3313] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.490697][ T3313] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.499806][ T3313] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.509207][ T3313] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.521747][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.556074][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.565356][ T3309] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.578045][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.585194][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.594410][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.601467][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.620557][ T1428] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.627758][ T1428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.636359][ T1428] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.643484][ T1428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.659556][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.711158][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.723606][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.737199][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.764093][ T1428] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.771328][ T1428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.781365][ T1428] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.788477][ T1428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.800824][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.816971][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.835465][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.842578][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.858212][ T3309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.870010][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.877124][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.894530][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.908036][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.915228][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.927875][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.934956][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.015619][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.080397][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.140099][ T3304] veth0_vlan: entered promiscuous mode [ 38.154699][ T3304] veth1_vlan: entered promiscuous mode [ 38.164737][ T3309] veth0_vlan: entered promiscuous mode [ 38.185387][ T3309] veth1_vlan: entered promiscuous mode [ 38.197656][ T3304] veth0_macvtap: entered promiscuous mode [ 38.205493][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.215256][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.231564][ T3304] veth1_macvtap: entered promiscuous mode [ 38.258438][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.267907][ T3309] veth0_macvtap: entered promiscuous mode [ 38.279759][ T3309] veth1_macvtap: entered promiscuous mode [ 38.301341][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.318336][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.336435][ T2071] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.346654][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.363436][ T3303] veth0_vlan: entered promiscuous mode [ 38.369843][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 38.369860][ T29] audit: type=1400 audit(1757169924.907:81): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/root/syzkaller.b0iAjD/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.391480][ T2071] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.409714][ T29] audit: type=1400 audit(1757169924.937:82): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 38.431911][ T29] audit: type=1400 audit(1757169924.937:83): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/root/syzkaller.b0iAjD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 38.457236][ T29] audit: type=1400 audit(1757169924.937:84): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 38.479000][ T29] audit: type=1400 audit(1757169924.937:85): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/root/syzkaller.b0iAjD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 38.505579][ T29] audit: type=1400 audit(1757169924.937:86): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/root/syzkaller.b0iAjD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3766 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 38.533650][ T29] audit: type=1400 audit(1757169924.937:87): avc: denied { unmount } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 38.554376][ T29] audit: type=1400 audit(1757169924.957:88): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 38.577136][ T29] audit: type=1400 audit(1757169924.957:89): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="gadgetfs" ino=3770 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 38.581954][ T3303] veth1_vlan: entered promiscuous mode [ 38.606785][ T3304] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.626467][ T2071] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.639466][ T29] audit: type=1400 audit(1757169925.187:90): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 38.641577][ T3313] veth0_vlan: entered promiscuous mode [ 38.679712][ T2071] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.695698][ T2071] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.710181][ T3313] veth1_vlan: entered promiscuous mode [ 38.722206][ T2071] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.755669][ T3313] veth0_macvtap: entered promiscuous mode [ 38.763072][ T3303] veth0_macvtap: entered promiscuous mode [ 38.770772][ T2071] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.787034][ T3303] veth1_macvtap: entered promiscuous mode [ 38.795792][ T3313] veth1_macvtap: entered promiscuous mode [ 38.802607][ T2071] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.817324][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.831159][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.841662][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.851352][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.868522][ T2071] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.894989][ T37] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.917666][ T37] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.935811][ T3306] veth0_vlan: entered promiscuous mode [ 38.966208][ T37] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.000954][ T3306] veth1_vlan: entered promiscuous mode [ 39.029013][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.077821][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.095573][ T3306] veth0_macvtap: entered promiscuous mode [ 39.115754][ T3306] veth1_macvtap: entered promiscuous mode [ 39.156121][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.165706][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.173027][ T37] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.212339][ T37] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.221388][ T3437] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.269139][ T3437] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.288458][ T3437] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.328793][ T3437] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.381196][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 43.381211][ T29] audit: type=1400 audit(1757169929.927:135): avc: denied { name_bind } for pid=3801 comm="syz.3.141" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 44.719262][ T29] audit: type=1400 audit(1757169931.267:136): avc: denied { watch watch_reads } for pid=3875 comm="syz.3.171" path="/proc/81/net" dev="proc" ino=6349 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 45.495029][ T29] audit: type=1326 audit(1757169932.047:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3937 comm="syz.4.199" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd0e30debe9 code=0x0 [ 45.742796][ T29] audit: type=1400 audit(1757169932.287:138): avc: denied { lock } for pid=3957 comm="syz.2.208" path="socket:[5683]" dev="sockfs" ino=5683 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 46.684141][ T29] audit: type=1400 audit(1757169933.217:139): avc: denied { write } for pid=3997 comm="syz.4.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 47.275505][ T29] audit: type=1326 audit(1757169933.827:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.4.254" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fd0e30debe9 code=0x0 [ 47.558704][ T29] audit: type=1326 audit(1757169934.107:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4078 comm="syz.2.264" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fde7b58ebe9 code=0x0 [ 47.602202][ T29] audit: type=1400 audit(1757169934.147:142): avc: denied { accept } for pid=4076 comm="syz.1.263" lport=52347 faddr=::ffff:10.1.1.0 fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 47.857577][ T29] audit: type=1400 audit(1757169934.407:143): avc: denied { execute } for pid=4126 comm="syz.0.287" path="/37/cpuacct.usage_sys" dev="tmpfs" ino=205 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 48.163563][ T29] audit: type=1400 audit(1757169934.707:144): avc: denied { write } for pid=4162 comm="syz.4.304" lport=54887 faddr=::ffff:100.1.1.0 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 48.702419][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 48.702435][ T29] audit: type=1326 audit(1757169935.247:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 48.731822][ T29] audit: type=1326 audit(1757169935.247:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 48.755359][ T29] audit: type=1326 audit(1757169935.247:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 49.017947][ T29] audit: type=1326 audit(1757169935.247:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 49.041305][ T29] audit: type=1326 audit(1757169935.247:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=35 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 49.064619][ T29] audit: type=1326 audit(1757169935.247:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 49.088142][ T29] audit: type=1326 audit(1757169935.247:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 49.111740][ T29] audit: type=1326 audit(1757169935.247:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 49.135230][ T29] audit: type=1326 audit(1757169935.247:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 49.158585][ T29] audit: type=1326 audit(1757169935.247:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.4.325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7fd0e30debe9 code=0x7ffc0000 [ 49.262900][ T4210] syz.2.320 (4210) used greatest stack depth: 10232 bytes left [ 49.669437][ T4305] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 49.734194][ T4306] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 50.222358][ T4319] syz.4.374 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 50.895231][ T4383] ================================================================== [ 50.903365][ T4383] BUG: KCSAN: data-race in fifo_open / wait_for_partner [ 50.910320][ T4383] [ 50.912643][ T4383] read-write to 0xffff888118791aec of 4 bytes by task 4382 on cpu 0: [ 50.920707][ T4383] fifo_open+0x86/0x5d0 [ 50.924880][ T4383] do_dentry_open+0x646/0xa20 [ 50.929599][ T4383] vfs_open+0x37/0x1e0 [ 50.933704][ T4383] path_openat+0x1c5e/0x2170 [ 50.938328][ T4383] do_filp_open+0x109/0x230 [ 50.942859][ T4383] do_sys_openat2+0xa6/0x110 [ 50.947480][ T4383] __x64_sys_openat+0xf2/0x120 [ 50.952278][ T4383] x64_sys_call+0x2e9c/0x2ff0 [ 50.956983][ T4383] do_syscall_64+0xd2/0x200 [ 50.961533][ T4383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 50.967450][ T4383] [ 50.969773][ T4383] read to 0xffff888118791aec of 4 bytes by task 4383 on cpu 1: [ 50.977321][ T4383] wait_for_partner+0xb5/0x1c0 [ 50.982126][ T4383] fifo_open+0x462/0x5d0 [ 50.986387][ T4383] do_dentry_open+0x646/0xa20 [ 50.991081][ T4383] vfs_open+0x37/0x1e0 [ 50.995186][ T4383] path_openat+0x1c5e/0x2170 [ 50.999823][ T4383] do_filp_open+0x109/0x230 [ 51.004347][ T4383] do_sys_openat2+0xa6/0x110 [ 51.008960][ T4383] __x64_sys_open+0xe6/0x110 [ 51.013617][ T4383] x64_sys_call+0x1457/0x2ff0 [ 51.018303][ T4383] do_syscall_64+0xd2/0x200 [ 51.022826][ T4383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 51.028726][ T4383] [ 51.031050][ T4383] value changed: 0x00000001 -> 0x00000002 [ 51.036809][ T4383] [ 51.039149][ T4383] Reported by Kernel Concurrency Sanitizer on: [ 51.045326][ T4383] CPU: 1 UID: 0 PID: 4383 Comm: syz.2.401 Not tainted syzkaller #0 PREEMPT(voluntary) [ 51.054967][ T4383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 51.065041][ T4383] ==================================================================