last executing test programs: 10.926410464s ago: executing program 3 (id=4): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x181) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000080)='configfs\x00', 0x200, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x8880, 0x85) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r0, 0x50000000, 0x1) getdents64(r0, 0x0, 0x4f) getdents64(r0, 0x0, 0x0) 10.831102605s ago: executing program 3 (id=7): r0 = syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) fchdir(r1) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r2 = syz_open_procfs(r0, &(0x7f0000000100)='maps\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xc3490000) pread64(r2, &(0x7f0000000140), 0x5e, 0x4) 10.243323968s ago: executing program 2 (id=21): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x800, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x8, 0x4}}]}}]}, 0x48}}, 0x20040084) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000008c0)=@newqdisc={0x8c, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r4, {0xf}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x4, [0xc, 0x5, 0x0, 0xf, 0x10, 0x2, 0x4, 0x2, 0x0, 0x6, 0x3, 0x7, 0x8, 0x4, 0x10, 0x4], 0x3, [0xb, 0x3, 0xad1e, 0x2002, 0x1, 0x4, 0x2, 0xd06, 0xff05, 0x2, 0xb, 0x3, 0x5, 0x6, 0xd, 0x100], [0xfff1, 0x5, 0xffff, 0xfff5, 0x4, 0x8, 0x1, 0x9, 0x5, 0x2, 0xc, 0x40, 0xfffc, 0x3, 0x1]}}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=@newqdisc={0x8c, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffe00, {0x0, 0x0, 0x0, r7, {0x7}, {0xffff}, {0xfff2, 0xffe1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0xe, [0xc, 0x5, 0x0, 0xf, 0x10, 0x2, 0x4, 0x2, 0xf, 0x6, 0x6, 0x1, 0x8, 0x4, 0x10, 0x4], 0x3, [0xb, 0x5, 0x7fff, 0x2002, 0x1, 0x0, 0x2, 0xd06, 0xff05, 0x8000, 0xb, 0x3, 0x5, 0x6, 0xd, 0x100], [0x2, 0x5, 0x2, 0xfff5, 0x4, 0x8, 0x7, 0x9, 0x5, 0x2, 0xc, 0x40, 0xfffc, 0x3, 0x1, 0x1]}}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) 10.136219519s ago: executing program 2 (id=22): r0 = socket$inet(0x2, 0x2, 0x1) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000440)=0x1, 0x4) sendmsg$inet(r0, 0x0, 0x24008004) 10.095128509s ago: executing program 2 (id=23): syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) syz_emit_ethernet(0x56, &(0x7f00000002c0)={@link_local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x1c, 0x2c, 0x0, @remote, @local, {[@routing={0x0, 0x0, 0x0, 0xe}], {{0x8000, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 10.053567809s ago: executing program 2 (id=25): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xa, 0x4, 0xdd, 0xa}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) 9.99248012s ago: executing program 2 (id=26): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x181) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000080)='configfs\x00', 0x200, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') inotify_init1(0x0) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x50000000, 0x1) getdents64(0xffffffffffffffff, 0x0, 0x4f) getdents64(0xffffffffffffffff, 0x0, 0x0) 9.890996191s ago: executing program 2 (id=28): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x9b}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 8.123361461s ago: executing program 4 (id=74): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a40), 0xffffffffffffffff) clock_adjtime(0x0, &(0x7f0000000000)={0x1, 0x6, 0x4, 0x0, 0x7, 0x100000000000002, 0x652, 0x7, 0x8000009654, 0x1, 0x1a, 0x0, 0x400, 0x8000000007, 0x80000000000000, 0xcc0, 0x1, 0x2, 0x94d6, 0x10800000000001, 0x0, 0x808, 0x0, 0xfffffffffffffffa, 0x80003, 0xf64d}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00', @ANYRES16=r0, @ANYBLOB="010000000000fcdbdf25120000001800018014000200766574683000000000000000080000000800090000000000080007"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x2004c0a0) 8.105347401s ago: executing program 4 (id=76): sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3, 0x3, 0x101, 0x0, 0x0, {0x2, 0x0, 0x2}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x1ea}}]}, 0x20}, 0x1, 0x0, 0x0, 0x840}, 0x44804) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x10000d2, &(0x7f0000000300)=ANY=[@ANYBLOB="646f74732c6e66732c71756965742c6e6f646f74732c636865636b3d7374726963742c6e66733d7374616c655f72772c646f74732c6572726f72733d636f6e74696e7565008000000000000074732c00", @ANYRES8, @ANYRES64, @ANYRES64, @ANYRESHEX, @ANYRESDEC, @ANYRES32], 0x1, 0x23d, &(0x7f0000000a40)="$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") lgetxattr(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trusted.'], 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 8.015728271s ago: executing program 4 (id=79): close(0x3) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7a, &(0x7f0000000340)={r1, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000000000017c"], 0x30, 0x180}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000580)={0x0, 0x7, 0x20}, 0xc) 7.914987722s ago: executing program 4 (id=81): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x800, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x8, 0x4}}]}}]}, 0x48}}, 0x20040084) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000008c0)=@newqdisc={0x8c, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r4, {0xf}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x4, [0xc, 0x5, 0x0, 0xf, 0x10, 0x2, 0x4, 0x2, 0x0, 0x6, 0x3, 0x7, 0x8, 0x4, 0x10, 0x4], 0x3, [0xb, 0x3, 0xad1e, 0x2002, 0x1, 0x4, 0x2, 0xd06, 0xff05, 0x2, 0xb, 0x3, 0x5, 0x6, 0xd, 0x100], [0xfff1, 0x5, 0xffff, 0xfff5, 0x4, 0x8, 0x1, 0x9, 0x5, 0x2, 0xc, 0x40, 0xfffc, 0x3, 0x1]}}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=@newqdisc={0x8c, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffe00, {0x0, 0x0, 0x0, 0x0, {0x7}, {0xffff}, {0xfff2, 0xffe1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0xe, [0xc, 0x5, 0x0, 0xf, 0x10, 0x2, 0x4, 0x2, 0xf, 0x6, 0x6, 0x1, 0x8, 0x4, 0x10, 0x4], 0x3, [0xb, 0x5, 0x7fff, 0x2002, 0x1, 0x0, 0x2, 0xd06, 0xff05, 0x8000, 0xb, 0x3, 0x5, 0x6, 0xd, 0x100], [0x2, 0x5, 0x2, 0xfff5, 0x4, 0x8, 0x7, 0x9, 0x5, 0x2, 0xc, 0x40, 0xfffc, 0x3, 0x1, 0x1]}}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) 7.868405992s ago: executing program 4 (id=83): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x181) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000080)='configfs\x00', 0x200, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x8880, 0x85) inotify_init1(0x0) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r0, 0x50000000, 0x1) getdents64(r0, 0x0, 0x4f) getdents64(r0, 0x0, 0x0) 7.762985593s ago: executing program 4 (id=85): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000004100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) 7.566937254s ago: executing program 0 (id=89): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000006a00831300000000"], 0x28}, 0x1, 0x0, 0x0, 0x4009050}, 0x2400800c) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000000000000000005000600010000000800090001000000050002"], 0x44}}, 0x0) 7.566502344s ago: executing program 0 (id=90): socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) r2 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81901) socket(0x10, 0x803, 0x8) socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x2) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005000000000000008000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000018010000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) setresuid(0x0, 0xee01, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 7.424037545s ago: executing program 0 (id=92): r0 = syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000100)='maps\x00') 7.317613556s ago: executing program 0 (id=95): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x8, 0xdd, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000880), &(0x7f0000000000)=""/10, 0x2}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x3, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}}, &(0x7f0000000000)='GPL\x00'}, 0x94) 7.255897446s ago: executing program 0 (id=96): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x181) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000080)='configfs\x00', 0x200, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x8880, 0x85) inotify_init1(0x0) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r0, 0x50000000, 0x1) getdents64(r0, 0x0, 0x4f) getdents64(r0, 0x0, 0x0) 7.075140757s ago: executing program 0 (id=98): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') pread64(r0, &(0x7f0000001300)=""/4118, 0x1016, 0x0) 371.171627ms ago: executing program 1 (id=148): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@gettfilter={0x24, 0x2e, 0x205, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0xc, 0xc}, {0x9, 0xfff1}, {0xfff2, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x2004c001}, 0x4041080) 290.610988ms ago: executing program 1 (id=149): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180900000020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x18) r1 = io_uring_setup(0x456, &(0x7f00000000c0)={0x0, 0x3, 0x1000, 0x1004003, 0x3c}) io_uring_register$IORING_REGISTER_CLONE_BUFFERS(r1, 0x1e, 0x0, 0x1) 195.081408ms ago: executing program 1 (id=150): mkdirat(0xffffffffffffff9c, 0x0, 0x181) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000080)='configfs\x00', 0x200, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x8880, 0x85) inotify_init1(0x0) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r0, 0x50000000, 0x1) getdents64(r0, 0x0, 0x4f) getdents64(r0, 0x0, 0x0) 194.756268ms ago: executing program 1 (id=151): syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000280)='./file1\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x1, 0x1237, &(0x7f00000006c0)="$eJzs3E1rXFUYAOB3kon5qPlQ61cXeqgbV5cmC1eCBklBMgupRmgFcWonOOQ6E3KHQERtXbkV/Bfi0p0g/gE3/gWX3bjsQrjivZNk0qStlTJj6fNs7ptz3jfnXA4MnMs99/ab332+s11k2+1BTDUaMbUbke6kSDEVh17ZrK9Xr22ut1obV1K6vP7B6hsppaVXf/noyx8v/jo49+FPSz/Pxm8rH9/+cy0ibv2T/1m3SN0i9fqD1E7X+/1B+3remY5usZOl9F7eaRed1O0Vnb3R/rSd93d3D1K7d2NxYXevUxSp3TtIO52DNOin5nBKvZRlWVpcCO5p5lTLJ3c3bv1wpyzLiLKciaeiLMtyPhbiXDwdi7FULeIz8Ww8F+fj+XghXoyX4uUqa4x3AQAAAAAAAAAAAAAAAAAAAE+A+53/X44V5/8BAAAAAAAAAAAAAAAAAABgDN6/em1zvdXauJLSXET+7f7W/lZ9rfvXt6MbeXTiUizHX1Gd/q/V8eV3WxuXUmUlvslvDutv7m9Nn6xfrT4nMKxvVn2H9at1fTpZPxsLo/VrsRznzx5/7Yz6me8jXn9tpD6L5fj90+hHHjeqsY/rv15N6Z1b9ZziaPwLVd6xRjRG/2yOZ30AAADgUcjSkaP9+9sj+/csO91f74/r+od4PnDX/r4ZF+yhJ644+GKnneedvZPB3KmWBwWNiPjXyfcKGsNHLGfmxFzEf/7PYw2mHrZqerga908+/O7m5G/wcQvm/x/TeKyCif0kMUbHi36y/Y+LR+H8+GcFAAAAAAAAAADAgzyydwajcdb7v82o3yybHR3zrfgqm9wdAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPA3O3AsAAAAACDM3zqNjg0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgpAAAAP//d+24Qg==") chroot(&(0x7f0000000300)='./file0/../file0/file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x1) 66.577569ms ago: executing program 1 (id=152): bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x25, 0x3, @val=@kprobe_multi=@addrs={0x1, 0x2, 0x0, &(0x7f0000000000)=[0xffffffffffffffff, 0xfffffffffffffffb], 0x2}}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x40400, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) write$cgroup_subtree(r0, &(0x7f0000000000), 0xfe3a) 0s ago: executing program 1 (id=153): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000180)=0x7f, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) recvmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}, 0xffffffff}], 0x1, 0x10000, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.161' (ED25519) to the list of known hosts. [ 20.228463][ T29] audit: type=1400 audit(1762429116.471:62): avc: denied { mounton } for pid=3247 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.251423][ T29] audit: type=1400 audit(1762429116.501:63): avc: denied { mount } for pid=3247 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.252144][ T3247] cgroup: Unknown subsys name 'net' [ 20.279055][ T29] audit: type=1400 audit(1762429116.531:64): avc: denied { unmount } for pid=3247 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.400397][ T3247] cgroup: Unknown subsys name 'cpuset' [ 20.406516][ T3247] cgroup: Unknown subsys name 'rlimit' [ 20.535330][ T29] audit: type=1400 audit(1762429116.781:65): avc: denied { setattr } for pid=3247 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.558666][ T29] audit: type=1400 audit(1762429116.781:66): avc: denied { create } for pid=3247 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.579097][ T29] audit: type=1400 audit(1762429116.781:67): avc: denied { write } for pid=3247 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.599456][ T29] audit: type=1400 audit(1762429116.781:68): avc: denied { read } for pid=3247 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.619707][ T29] audit: type=1400 audit(1762429116.791:69): avc: denied { mounton } for pid=3247 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.621672][ T3304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.644523][ T29] audit: type=1400 audit(1762429116.791:70): avc: denied { mount } for pid=3247 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.676346][ T29] audit: type=1400 audit(1762429116.911:71): avc: denied { relabelto } for pid=3304 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.723273][ T3247] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.578496][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 22.658738][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 22.718621][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 22.736057][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.743206][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.750462][ T3321] bridge_slave_0: entered allmulticast mode [ 22.756810][ T3321] bridge_slave_0: entered promiscuous mode [ 22.765502][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.772569][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.779923][ T3321] bridge_slave_1: entered allmulticast mode [ 22.786102][ T3321] bridge_slave_1: entered promiscuous mode [ 22.794850][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.802013][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.809196][ T3316] bridge_slave_0: entered allmulticast mode [ 22.815514][ T3316] bridge_slave_0: entered promiscuous mode [ 22.824067][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.831225][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.838303][ T3316] bridge_slave_1: entered allmulticast mode [ 22.844723][ T3316] bridge_slave_1: entered promiscuous mode [ 22.854996][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 22.878031][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 22.895189][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 22.909397][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 22.926011][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 22.966745][ T3316] team0: Port device team_slave_0 added [ 22.974796][ T3321] team0: Port device team_slave_0 added [ 22.984847][ T3316] team0: Port device team_slave_1 added [ 22.993496][ T3321] team0: Port device team_slave_1 added [ 23.023618][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.030707][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.037905][ T3314] bridge_slave_0: entered allmulticast mode [ 23.044322][ T3314] bridge_slave_0: entered promiscuous mode [ 23.058792][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.065814][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 23.091713][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.103034][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.109981][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 23.135938][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.146718][ T3324] chnl_net:caif_netlink_parms(): no params data found [ 23.157720][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.164922][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.172052][ T3314] bridge_slave_1: entered allmulticast mode [ 23.178420][ T3314] bridge_slave_1: entered promiscuous mode [ 23.184542][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.191491][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 23.217553][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.235045][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.242198][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.249279][ T3317] bridge_slave_0: entered allmulticast mode [ 23.255781][ T3317] bridge_slave_0: entered promiscuous mode [ 23.265746][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.272831][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.279970][ T3317] bridge_slave_1: entered allmulticast mode [ 23.286351][ T3317] bridge_slave_1: entered promiscuous mode [ 23.297293][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.304272][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 23.330264][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.358105][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.375250][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.385266][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.406133][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.439611][ T3314] team0: Port device team_slave_0 added [ 23.447103][ T3321] hsr_slave_0: entered promiscuous mode [ 23.453199][ T3321] hsr_slave_1: entered promiscuous mode [ 23.469331][ T3316] hsr_slave_0: entered promiscuous mode [ 23.475286][ T3316] hsr_slave_1: entered promiscuous mode [ 23.481145][ T3316] debugfs: 'hsr0' already exists in 'hsr' [ 23.486854][ T3316] Cannot create hsr debugfs directory [ 23.492884][ T3314] team0: Port device team_slave_1 added [ 23.507570][ T3324] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.514665][ T3324] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.521872][ T3324] bridge_slave_0: entered allmulticast mode [ 23.528317][ T3324] bridge_slave_0: entered promiscuous mode [ 23.535384][ T3317] team0: Port device team_slave_0 added [ 23.550911][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.558007][ T3324] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.566948][ T3324] bridge_slave_1: entered allmulticast mode [ 23.573452][ T3324] bridge_slave_1: entered promiscuous mode [ 23.580408][ T3317] team0: Port device team_slave_1 added [ 23.612520][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.619465][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 23.645369][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.671968][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.678914][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 23.704819][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.720330][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.729643][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.736657][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 23.762579][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.779104][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.793048][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.800100][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 23.826045][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.867398][ T3324] team0: Port device team_slave_0 added [ 23.873959][ T3324] team0: Port device team_slave_1 added [ 23.891037][ T3314] hsr_slave_0: entered promiscuous mode [ 23.896963][ T3314] hsr_slave_1: entered promiscuous mode [ 23.902785][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 23.908486][ T3314] Cannot create hsr debugfs directory [ 23.945338][ T3317] hsr_slave_0: entered promiscuous mode [ 23.951381][ T3317] hsr_slave_1: entered promiscuous mode [ 23.957231][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 23.962963][ T3317] Cannot create hsr debugfs directory [ 23.968673][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.975645][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.001591][ T3324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.030598][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.037543][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.063486][ T3324] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.151122][ T3324] hsr_slave_0: entered promiscuous mode [ 24.157150][ T3324] hsr_slave_1: entered promiscuous mode [ 24.163018][ T3324] debugfs: 'hsr0' already exists in 'hsr' [ 24.168725][ T3324] Cannot create hsr debugfs directory [ 24.174264][ T3316] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 24.194169][ T3316] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 24.202717][ T3316] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 24.211581][ T3316] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 24.248448][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 24.263769][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 24.272266][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 24.294433][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 24.328917][ T3317] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 24.350647][ T3317] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 24.371234][ T3314] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 24.381183][ T3317] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 24.389659][ T3317] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 24.398427][ T3314] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 24.406958][ T3314] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 24.415682][ T3314] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 24.426415][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.451562][ T3324] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 24.464888][ T3324] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 24.476505][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.483833][ T3324] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 24.493194][ T3324] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 24.507006][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.514072][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.525531][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.532588][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.558359][ T3316] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 24.568817][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 24.609275][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.631277][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.644719][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.655172][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.673079][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.680153][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.695152][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.702269][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.714295][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.727401][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.740362][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.747396][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.757606][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.764646][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.778830][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.788443][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 24.797313][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.804380][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.815811][ T3324] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.829248][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.836375][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.853884][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.860963][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.875105][ T3317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 24.888856][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.895981][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.965254][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 24.995173][ T3324] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 25.029316][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.042168][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.092190][ T3324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.106324][ T3316] veth0_vlan: entered promiscuous mode [ 25.126290][ T3316] veth1_vlan: entered promiscuous mode [ 25.170501][ T3317] veth0_vlan: entered promiscuous mode [ 25.186292][ T3317] veth1_vlan: entered promiscuous mode [ 25.193408][ T3316] veth0_macvtap: entered promiscuous mode [ 25.207505][ T3316] veth1_macvtap: entered promiscuous mode [ 25.220932][ T3317] veth0_macvtap: entered promiscuous mode [ 25.236750][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.260629][ T3317] veth1_macvtap: entered promiscuous mode [ 25.268503][ T3324] veth0_vlan: entered promiscuous mode [ 25.275702][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.285123][ T3321] veth0_vlan: entered promiscuous mode [ 25.296108][ T3324] veth1_vlan: entered promiscuous mode [ 25.306846][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.316132][ T3321] veth1_vlan: entered promiscuous mode [ 25.341263][ T3314] veth0_vlan: entered promiscuous mode [ 25.348490][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.358494][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.373237][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 25.373288][ T29] audit: type=1400 audit(1762429121.621:81): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.uQNCPy/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 25.403732][ T29] audit: type=1400 audit(1762429121.621:82): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 25.425806][ T29] audit: type=1400 audit(1762429121.621:83): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.uQNCPy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 25.450986][ T29] audit: type=1400 audit(1762429121.621:84): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 25.472788][ T29] audit: type=1400 audit(1762429121.621:85): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.uQNCPy/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 25.499269][ T29] audit: type=1400 audit(1762429121.621:86): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.uQNCPy/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3841 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 25.526576][ T29] audit: type=1400 audit(1762429121.621:87): avc: denied { unmount } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 25.547712][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.556481][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.565200][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.573989][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.583635][ T29] audit: type=1400 audit(1762429121.661:88): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 25.584765][ T3321] veth0_macvtap: entered promiscuous mode [ 25.606404][ T29] audit: type=1400 audit(1762429121.661:89): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="gadgetfs" ino=4655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 25.615588][ T3314] veth1_vlan: entered promiscuous mode [ 25.640929][ T3316] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 25.645307][ T3324] veth0_macvtap: entered promiscuous mode [ 25.662313][ T31] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.671775][ T3324] veth1_macvtap: entered promiscuous mode [ 25.685750][ T3321] veth1_macvtap: entered promiscuous mode [ 25.692998][ T31] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.696210][ T29] audit: type=1400 audit(1762429121.951:90): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 25.709110][ T31] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.749620][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.761259][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.777781][ T3314] veth0_macvtap: entered promiscuous mode [ 25.793354][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.802145][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.809602][ T3314] veth1_macvtap: entered promiscuous mode [ 25.836635][ T2815] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.871068][ T31] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.882591][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.902115][ T31] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.918900][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.936999][ T31] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.968778][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.021111][ T31] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.067704][ T31] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.081071][ T31] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.095443][ T31] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.109648][ T31] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.123709][ T31] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.133034][ T31] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.529616][ T3528] loop4: detected capacity change from 0 to 8192 [ 26.545139][ T3528] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 26.851848][ T3545] ======================================================= [ 26.851848][ T3545] WARNING: The mand mount option has been deprecated and [ 26.851848][ T3545] and is ignored by this kernel. Remove the mand [ 26.851848][ T3545] option from the mount to silence this warning. [ 26.851848][ T3545] ======================================================= [ 27.041104][ T3556] netlink: 'syz.1.34': attribute type 4 has an invalid length. [ 27.042594][ T3550] capability: warning: `syz.4.31' uses deprecated v2 capabilities in a way that may be insecure [ 27.223466][ T3567] loop1: detected capacity change from 0 to 512 [ 27.276468][ T3567] FAT-fs (loop1): error, corrupted directory (invalid entries) [ 27.602099][ T3586] netlink: 'syz.0.47': attribute type 4 has an invalid length. [ 27.747211][ T3598] loop0: detected capacity change from 0 to 512 [ 27.804815][ T3598] FAT-fs (loop0): error, corrupted directory (invalid entries) [ 27.851990][ T3602] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.878009][ T3602] bridge_slave_1 (unregistering): left allmulticast mode [ 27.885139][ T3602] bridge_slave_1 (unregistering): left promiscuous mode [ 27.892139][ T3602] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.188304][ T3624] netlink: 'syz.4.62': attribute type 4 has an invalid length. [ 28.498468][ T3646] Driver unsupported XDP return value 0 on prog (id 17) dev N/A, expect packet loss! [ 28.619695][ T3658] loop4: detected capacity change from 0 to 512 [ 28.640332][ T3658] FAT-fs (loop4): error, corrupted directory (invalid entries) [ 29.659385][ T3703] loop1: detected capacity change from 0 to 8192 [ 29.685622][ T3703] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 31.629052][ T3727] loop1: detected capacity change from 0 to 8192 [ 31.690075][ T3727] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 32.782215][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 32.782231][ T29] audit: type=1400 audit(1762429129.031:142): avc: denied { name_bind } for pid=3735 comm="syz.1.113" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 34.509846][ T29] audit: type=1400 audit(1762429130.751:143): avc: denied { write } for pid=3771 comm="syz.1.128" lport=55843 faddr=::ffff:100.1.1.0 fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 34.771996][ T3784] netlink: 'syz.1.134': attribute type 4 has an invalid length. [ 35.145717][ T3798] loop1: detected capacity change from 0 to 8192 [ 35.160966][ T3798] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 36.267137][ T3813] netlink: 'syz.1.147': attribute type 4 has an invalid length. [ 36.561224][ T3822] loop1: detected capacity change from 0 to 8192 [ 36.589843][ T3822] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 37.386213][ T3324] ================================================================== [ 37.394323][ T3324] BUG: KCSAN: data-race in dentry_unlink_inode / step_into [ 37.401531][ T3324] [ 37.403883][ T3324] write to 0xffff888106ef7e70 of 8 bytes by task 3314 on cpu 1: [ 37.411508][ T3324] dentry_unlink_inode+0x65/0x260 [ 37.416616][ T3324] __dentry_kill+0x18d/0x4b0 [ 37.421213][ T3324] dput+0x5e/0xd0 [ 37.424849][ T3324] __fput+0x444/0x650 [ 37.428831][ T3324] fput_close_sync+0x6e/0x120 [ 37.433592][ T3324] __x64_sys_close+0x56/0xf0 [ 37.438182][ T3324] x64_sys_call+0x273c/0x3000 [ 37.442853][ T3324] do_syscall_64+0xd2/0x200 [ 37.447356][ T3324] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.453251][ T3324] [ 37.455563][ T3324] read to 0xffff888106ef7e70 of 8 bytes by task 3324 on cpu 0: [ 37.463101][ T3324] step_into+0x122/0x7f0 [ 37.467354][ T3324] path_openat+0x13e8/0x2170 [ 37.471938][ T3324] do_filp_open+0x109/0x230 [ 37.476433][ T3324] do_sys_openat2+0xa6/0x110 [ 37.481098][ T3324] __x64_sys_openat+0xf2/0x120 [ 37.485858][ T3324] x64_sys_call+0x2eab/0x3000 [ 37.490554][ T3324] do_syscall_64+0xd2/0x200 [ 37.495049][ T3324] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.501016][ T3324] [ 37.503329][ T3324] value changed: 0xffff88811a8c6268 -> 0x0000000000000000 [ 37.510426][ T3324] [ 37.512738][ T3324] Reported by Kernel Concurrency Sanitizer on: [ 37.518895][ T3324] CPU: 0 UID: 0 PID: 3324 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 37.528794][ T3324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 37.538845][ T3324] ================================================================== [ 41.531294][ T3324] ================================================================== [ 41.539399][ T3324] BUG: KCSAN: data-race in dentry_unlink_inode / step_into [ 41.546603][ T3324] [ 41.548917][ T3324] write to 0xffff888106fe37b0 of 8 bytes by task 3316 on cpu 1: [ 41.556538][ T3324] dentry_unlink_inode+0x65/0x260 [ 41.561556][ T3324] __dentry_kill+0x18d/0x4b0 [ 41.566162][ T3324] dput+0x5e/0xd0 [ 41.569801][ T3324] __fput+0x444/0x650 [ 41.573774][ T3324] fput_close_sync+0x6e/0x120 [ 41.578447][ T3324] __x64_sys_close+0x56/0xf0 [ 41.583033][ T3324] x64_sys_call+0x273c/0x3000 [ 41.587707][ T3324] do_syscall_64+0xd2/0x200 [ 41.592215][ T3324] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.598102][ T3324] [ 41.600415][ T3324] read to 0xffff888106fe37b0 of 8 bytes by task 3324 on cpu 0: [ 41.607954][ T3324] step_into+0x122/0x7f0 [ 41.612311][ T3324] path_openat+0x13e8/0x2170 [ 41.616891][ T3324] do_filp_open+0x109/0x230 [ 41.621394][ T3324] do_sys_openat2+0xa6/0x110 [ 41.625977][ T3324] __x64_sys_openat+0xf2/0x120 [ 41.630739][ T3324] x64_sys_call+0x2eab/0x3000 [ 41.635420][ T3324] do_syscall_64+0xd2/0x200 [ 41.639919][ T3324] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.645806][ T3324] [ 41.648132][ T3324] value changed: 0xffff88811ab755a8 -> 0x0000000000000000 [ 41.655227][ T3324] [ 41.657541][ T3324] Reported by Kernel Concurrency Sanitizer on: [ 41.663679][ T3324] CPU: 0 UID: 0 PID: 3324 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 41.673573][ T3324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 41.683628][ T3324] ================================================================== [ 45.797786][ T3317] ================================================================== [ 45.805893][ T3317] BUG: KCSAN: data-race in dentry_unlink_inode / step_into [ 45.813095][ T3317] [ 45.815409][ T3317] write to 0xffff88811a93e3f0 of 8 bytes by task 3316 on cpu 0: [ 45.823027][ T3317] dentry_unlink_inode+0x65/0x260 [ 45.828044][ T3317] __dentry_kill+0x18d/0x4b0 [ 45.832630][ T3317] dput+0x5e/0xd0 [ 45.836268][ T3317] __fput+0x444/0x650 [ 45.840237][ T3317] fput_close_sync+0x6e/0x120 [ 45.844904][ T3317] __x64_sys_close+0x56/0xf0 [ 45.849488][ T3317] x64_sys_call+0x273c/0x3000 [ 45.854160][ T3317] do_syscall_64+0xd2/0x200 [ 45.858674][ T3317] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.864564][ T3317] [ 45.866873][ T3317] read to 0xffff88811a93e3f0 of 8 bytes by task 3317 on cpu 1: [ 45.874406][ T3317] step_into+0x122/0x7f0 [ 45.878651][ T3317] path_openat+0x13e8/0x2170 [ 45.883237][ T3317] do_filp_open+0x109/0x230 [ 45.887728][ T3317] do_sys_openat2+0xa6/0x110 [ 45.892401][ T3317] __x64_sys_openat+0xf2/0x120 [ 45.897167][ T3317] x64_sys_call+0x2eab/0x3000 [ 45.901848][ T3317] do_syscall_64+0xd2/0x200 [ 45.906343][ T3317] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.912228][ T3317] [ 45.914539][ T3317] value changed: 0xffff88811a8bc4d0 -> 0x0000000000000000 [ 45.921629][ T3317] [ 45.923938][ T3317] Reported by Kernel Concurrency Sanitizer on: [ 45.930077][ T3317] CPU: 1 UID: 0 PID: 3317 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 45.939956][ T3317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 45.950092][ T3317] ==================================================================