last executing test programs: 1.149923322s ago: executing program 1 (id=59): socket$igmp(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000240)={@val={0x3, 0x800}, @val={0x0, 0x0, 0x0, 0xfffc, 0xffff}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x1400, 0x0, 0xfe, 0x1, 0x0, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x19}}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x15, 0x4, 0x1, 0x1c, 0x10, 0x67, 0x7, 0x7a, 0x2, 0x401, @multicast2, @remote, {[@timestamp_addr={0x44, 0x14, 0x5d, 0x1, 0x5, [{@rand_addr=0x64010102, 0x7ff}, {@rand_addr=0x64010102, 0xd058}]}, @rr={0x7, 0xf, 0x17, [@remote, @empty, @remote]}, @timestamp_addr={0x44, 0x14, 0xf5, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x23c}, {@broadcast, 0x2}]}, @timestamp={0x44, 0x8, 0xda, 0x0, 0x6, [0xe55]}]}}}}}, 0x7e) 1.113958327s ago: executing program 4 (id=61): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="fc0000001d000724ab09254ec100070007ab08001b000000f0ffff002100057e0000000000000e000039000000039815fad151ba0101099cecb94b46fe0000000a00020025", 0xffffff0c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0xffffffffffff8000, 0x0) close(r3) close(r0) 926.391241ms ago: executing program 4 (id=67): syz_open_dev$sg(0x0, 0x3, 0x100) syz_clone(0x22000211, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0xa0402, 0x0) io_setup(0x1, &(0x7f0000002500)=0x0) io_submit(r1, 0x2, &(0x7f00000011c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x5, r0, &(0x7f0000000380)="a3", 0x1, 0xe3}, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x453, r0, 0x0, 0x0, 0x1}]) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 909.414963ms ago: executing program 2 (id=68): setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x11e) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) rmdir(&(0x7f0000000040)='./cgroup/../file0\x00') pread64(r1, &(0x7f0000000400)=""/208, 0xd0, 0x1) 858.23281ms ago: executing program 2 (id=72): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x2000c16, &(0x7f0000000280)={[{@usrquota}, {@nodelalloc}]}, 0xff, 0x25e, &(0x7f0000000e80)="$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") r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2141, 0x59) pwrite64(r1, &(0x7f0000000140)="f6", 0xffffff07, 0x8000c61) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 631.131229ms ago: executing program 1 (id=74): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newsa={0x138, 0x10, 0x1, 0x70bd2b, 0x0, {{@in6=@private1, @in=@private=0xa010100, 0x0, 0xecdf}, {@in=@broadcast, 0x0, 0x32}, @in6=@private0, {0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {0x0, 0x400800}, {0x1000}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x2c}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x4050) 571.924247ms ago: executing program 4 (id=77): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f00000000c0), 0x10) close_range(r1, 0xffffffffffffffff, 0x0) 507.862285ms ago: executing program 4 (id=79): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000000040), 0x4) 441.169883ms ago: executing program 4 (id=80): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 437.680934ms ago: executing program 3 (id=81): openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x40042, 0x100) mount$9p_fd(0x0, 0x0, 0x0, 0x4898, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f00000002c0)={[{@norecovery}, {@max_batch_time={'max_batch_time', 0x3d, 0x2327}}]}, 0xee, 0x480, &(0x7f00000012c0)="$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") 403.667008ms ago: executing program 2 (id=82): r0 = syz_io_uring_setup(0x3942, &(0x7f0000000700)={0x0, 0xa011, 0x10100, 0x0, 0x1cb}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB=';'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x2a, 0x0, r3, 0x0, 0x0, 0x0, 0x12042, 0x1}) io_uring_enter(r0, 0x8005d62, 0x88c6, 0x0, 0x0, 0xfffffffffffffe9a) 396.422779ms ago: executing program 4 (id=83): r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)={0x20000014}) connect$unix(r2, &(0x7f0000000340)=@file={0x0, './file1\x00'}, 0x6e) 282.153754ms ago: executing program 2 (id=84): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) unshare(0x22020400) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000980)=ANY=[@ANYBLOB="240000003f000500000000000000df25047c0000040000000c0001"], 0x24}, 0x1, 0x0, 0x0, 0x48800}, 0x0) 270.034275ms ago: executing program 0 (id=85): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) chroot(0x0) 234.27331ms ago: executing program 1 (id=86): r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x4e, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10, 0x7, 0x0, 0x4}}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000680)={'syztnl1\x00', 0x0}) 191.951235ms ago: executing program 3 (id=87): r0 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r2, 0xfffffffffffffffd, 0x58) 191.507956ms ago: executing program 0 (id=88): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000fbdb0cf81c000000180001801400020074756e6c30"], 0x2c}}, 0x0) 163.121939ms ago: executing program 3 (id=89): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r2}, 0x18) sendto$inet6(r0, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) 150.868111ms ago: executing program 2 (id=90): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) 133.395253ms ago: executing program 0 (id=91): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000050b6850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0x80}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000001c0)={0x8, 0x0, 0x0, 'queue0\x00', 0x3}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000500)={0x0, 0xe, 0x1, 'queue0\x00'}) 102.632267ms ago: executing program 3 (id=92): bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x50) unshare(0x2c020400) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, 0x0, 0x0) 95.973498ms ago: executing program 1 (id=93): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x20d00, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) acct(&(0x7f0000000040)='./file0\x00') 82.613429ms ago: executing program 0 (id=94): r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r0, &(0x7f0000000600)={0x2, 0x4e23, 0x0, @private0, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x4000000, @ipv4={'\x00', '\xff\xff', @remote}, 0x31e3}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e230e22ac1414bb925aa80020007b00090080007f000001e809000000ff0000f03ac71002000000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 76.49062ms ago: executing program 2 (id=95): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x84c, 0x20000000, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = io_uring_setup(0x512, &(0x7f0000000640)={0x0, 0xdda8, 0x800, 0x503fc, 0x2e0}) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendmsg$rds(r1, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x44, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 63.687312ms ago: executing program 3 (id=96): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000580)={0x1, 0x7ab0715dca68fed7, 0x0, {}, {}, {}, 0x4, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "b8ee0816756b62187804752330b2b55830d7228ef1593c0639bd084bba0bfd8db72f70e5b2e7f90e11cbc6ec61a03fc316d5d47970907af5fc4a27f6cf718909"}}, 0x20000600}}, 0x0) 40.087515ms ago: executing program 0 (id=97): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffe}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setrlimit(0x40000000000008, &(0x7f0000000100)={0x3, 0x9}) 39.505455ms ago: executing program 1 (id=98): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='kfree\x00', r1, 0x0, 0xbc3}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)={0x28, 0x18, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x800, 0x0, 0x0, @ipv4=@multicast2}, @nested={0xc, 0x8, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @uid=r3}]}]}, 0x28}}, 0x0) 7.781149ms ago: executing program 3 (id=99): r0 = syz_io_uring_setup(0x16c4, &(0x7f0000000380)={0x0, 0x5121, 0x80, 0x3, 0x258}, &(0x7f0000000280)=0x0, &(0x7f0000000600)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_SYMLINKAT={0x26, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000140)='./file1\x00'}) io_uring_enter(r0, 0x47ba, 0x0, 0x0, 0x0, 0x0) 6.915609ms ago: executing program 1 (id=100): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r3 = fcntl$dupfd(r2, 0x406, r2) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x3, 0x0, 0x0, 0x7995}, 0xfcb5, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 0s ago: executing program 0 (id=101): getpid() r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r2, 0x0, 0x14, 0x0, &(0x7f0000000080)="f6f4e9a10000502468da5eb1c6b2feff8833c000", 0x0, 0x86, 0x0, 0x31, 0x0, &(0x7f0000000000)="daf9e846ab156efc71b59652333536dbfd26a6d0546366e36eb77dd0aaa2dbe567d168904cf0d5bce1771889c98ffc0abf", 0x0}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.29' (ED25519) to the list of known hosts. [ 33.731497][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 33.731514][ T29] audit: type=1400 audit(1768523698.022:70): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.760660][ T29] audit: type=1400 audit(1768523698.052:71): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.762897][ T3309] cgroup: Unknown subsys name 'net' [ 33.788552][ T29] audit: type=1400 audit(1768523698.082:72): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.927726][ T3309] cgroup: Unknown subsys name 'cpuset' [ 33.933988][ T3309] cgroup: Unknown subsys name 'rlimit' [ 34.085658][ T29] audit: type=1400 audit(1768523698.372:73): avc: denied { setattr } for pid=3309 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.109048][ T29] audit: type=1400 audit(1768523698.382:74): avc: denied { create } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.129613][ T29] audit: type=1400 audit(1768523698.382:75): avc: denied { write } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.150033][ T29] audit: type=1400 audit(1768523698.382:76): avc: denied { read } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.170411][ T29] audit: type=1400 audit(1768523698.392:77): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.195276][ T29] audit: type=1400 audit(1768523698.392:78): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 34.208836][ T3311] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 34.218586][ T29] audit: type=1400 audit(1768523698.402:79): avc: denied { read } for pid=3048 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 34.266589][ T3309] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 36.070523][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 36.097868][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 36.202230][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 36.220004][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.227262][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.234509][ T3323] bridge_slave_0: entered allmulticast mode [ 36.241220][ T3323] bridge_slave_0: entered promiscuous mode [ 36.249941][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.257281][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.264518][ T3323] bridge_slave_1: entered allmulticast mode [ 36.271045][ T3323] bridge_slave_1: entered promiscuous mode [ 36.293875][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 36.312725][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.319849][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.327105][ T3319] bridge_slave_0: entered allmulticast mode [ 36.333532][ T3319] bridge_slave_0: entered promiscuous mode [ 36.355417][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.362574][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.369968][ T3319] bridge_slave_1: entered allmulticast mode [ 36.376638][ T3319] bridge_slave_1: entered promiscuous mode [ 36.389464][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.417365][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.434940][ T3325] chnl_net:caif_netlink_parms(): no params data found [ 36.457895][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.483165][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.506639][ T3323] team0: Port device team_slave_0 added [ 36.512420][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.519667][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.526879][ T3318] bridge_slave_0: entered allmulticast mode [ 36.533591][ T3318] bridge_slave_0: entered promiscuous mode [ 36.556539][ T3323] team0: Port device team_slave_1 added [ 36.562313][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.569494][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.576794][ T3318] bridge_slave_1: entered allmulticast mode [ 36.583419][ T3318] bridge_slave_1: entered promiscuous mode [ 36.592936][ T3319] team0: Port device team_slave_0 added [ 36.598776][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.605914][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.613140][ T3322] bridge_slave_0: entered allmulticast mode [ 36.619625][ T3322] bridge_slave_0: entered promiscuous mode [ 36.644335][ T3319] team0: Port device team_slave_1 added [ 36.650121][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.657250][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.664498][ T3322] bridge_slave_1: entered allmulticast mode [ 36.671057][ T3322] bridge_slave_1: entered promiscuous mode [ 36.677990][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.685023][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.710941][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.741302][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.748303][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.774314][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.789286][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.817459][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.827713][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.842285][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.849310][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.875354][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.888556][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.902536][ T3325] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.909751][ T3325] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.917153][ T3325] bridge_slave_0: entered allmulticast mode [ 36.923725][ T3325] bridge_slave_0: entered promiscuous mode [ 36.930586][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.937559][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.963669][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.989888][ T3325] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.997382][ T3325] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.004611][ T3325] bridge_slave_1: entered allmulticast mode [ 37.011161][ T3325] bridge_slave_1: entered promiscuous mode [ 37.030242][ T3318] team0: Port device team_slave_0 added [ 37.047203][ T3323] hsr_slave_0: entered promiscuous mode [ 37.053259][ T3323] hsr_slave_1: entered promiscuous mode [ 37.060632][ T3322] team0: Port device team_slave_0 added [ 37.067243][ T3318] team0: Port device team_slave_1 added [ 37.080432][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.097338][ T3322] team0: Port device team_slave_1 added [ 37.114340][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.160964][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.168027][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.194242][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.207337][ T3319] hsr_slave_0: entered promiscuous mode [ 37.213717][ T3319] hsr_slave_1: entered promiscuous mode [ 37.222815][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 37.228630][ T3319] Cannot create hsr debugfs directory [ 37.235061][ T3325] team0: Port device team_slave_0 added [ 37.241186][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.248175][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.274653][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.285701][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.292853][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.318777][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.330481][ T3325] team0: Port device team_slave_1 added [ 37.341786][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.348786][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.374866][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.418011][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.424995][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.453565][ T3325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.473281][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.480367][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.506412][ T3325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.544650][ T3318] hsr_slave_0: entered promiscuous mode [ 37.550962][ T3318] hsr_slave_1: entered promiscuous mode [ 37.556786][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 37.562589][ T3318] Cannot create hsr debugfs directory [ 37.586226][ T3322] hsr_slave_0: entered promiscuous mode [ 37.592533][ T3322] hsr_slave_1: entered promiscuous mode [ 37.598435][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 37.604256][ T3322] Cannot create hsr debugfs directory [ 37.636769][ T3325] hsr_slave_0: entered promiscuous mode [ 37.643298][ T3325] hsr_slave_1: entered promiscuous mode [ 37.649452][ T3325] debugfs: 'hsr0' already exists in 'hsr' [ 37.655280][ T3325] Cannot create hsr debugfs directory [ 37.787768][ T3323] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.815116][ T3323] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.837260][ T3323] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.849045][ T3323] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.870556][ T3319] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.887782][ T3319] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.900753][ T3319] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.910002][ T3319] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.937604][ T3318] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.948271][ T3318] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.960998][ T3318] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.975162][ T3318] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.996333][ T3325] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 38.006394][ T3325] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 38.016058][ T3325] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 38.029503][ T3325] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 38.071065][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.080140][ T3322] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 38.089505][ T3322] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 38.098961][ T3322] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 38.113266][ T3322] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 38.131581][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.154303][ T910] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.161409][ T910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.179074][ T910] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.186149][ T910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.205601][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.221820][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.250418][ T910] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.257529][ T910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.275043][ T910] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.282144][ T910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.295160][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.327628][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.338554][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.348093][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.363812][ T910] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.371023][ T910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.385696][ T910] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.392840][ T910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.418078][ T3325] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.431261][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.445130][ T910] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.452256][ T910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.466788][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.476016][ T910] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.483165][ T910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.498662][ T910] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.505787][ T910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.520083][ T910] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.527371][ T910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.678031][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.700556][ T3323] veth0_vlan: entered promiscuous mode [ 38.717834][ T3323] veth1_vlan: entered promiscuous mode [ 38.726343][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.757852][ T3325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.769318][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.789680][ T3323] veth0_macvtap: entered promiscuous mode [ 38.810579][ T3323] veth1_macvtap: entered promiscuous mode [ 38.837960][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.858525][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.887844][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.915989][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.938192][ T3319] veth0_vlan: entered promiscuous mode [ 38.947335][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 38.947351][ T29] audit: type=1400 audit(1768523703.242:90): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/root/syzkaller.GIw8Eb/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.956784][ T3319] veth1_vlan: entered promiscuous mode [ 38.995138][ T37] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.008764][ T29] audit: type=1400 audit(1768523703.242:91): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 39.030828][ T29] audit: type=1400 audit(1768523703.242:92): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/root/syzkaller.GIw8Eb/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 39.047034][ T3325] veth0_vlan: entered promiscuous mode [ 39.056376][ T29] audit: type=1400 audit(1768523703.242:93): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 39.067947][ T3325] veth1_vlan: entered promiscuous mode [ 39.083436][ T29] audit: type=1400 audit(1768523703.242:94): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/root/syzkaller.GIw8Eb/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 39.107302][ T37] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.115648][ T29] audit: type=1400 audit(1768523703.242:95): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/root/syzkaller.GIw8Eb/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.151685][ T29] audit: type=1400 audit(1768523703.242:96): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.167699][ T3318] veth0_vlan: entered promiscuous mode [ 39.171364][ T29] audit: type=1400 audit(1768523703.282:97): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.199717][ T29] audit: type=1400 audit(1768523703.282:98): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="gadgetfs" ino=4712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.219826][ T3325] veth0_macvtap: entered promiscuous mode [ 39.231266][ T3323] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.257755][ T3319] veth0_macvtap: entered promiscuous mode [ 39.264974][ T3318] veth1_vlan: entered promiscuous mode [ 39.276687][ T3319] veth1_macvtap: entered promiscuous mode [ 39.288100][ T29] audit: type=1400 audit(1768523703.572:99): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.320386][ T3325] veth1_macvtap: entered promiscuous mode [ 39.349301][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.363577][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.379774][ T2861] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.390144][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.405182][ T837] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.416600][ T837] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.428825][ T837] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.441440][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.454168][ T3318] veth0_macvtap: entered promiscuous mode [ 39.467574][ T3318] veth1_macvtap: entered promiscuous mode [ 39.478579][ T837] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.498469][ T837] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.507396][ T837] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.521524][ T3322] veth0_vlan: entered promiscuous mode [ 39.538199][ T837] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.548210][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.559456][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.574838][ T3322] veth1_vlan: entered promiscuous mode [ 39.606330][ T37] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.635394][ T37] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.654240][ T37] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.663710][ T3322] veth0_macvtap: entered promiscuous mode [ 39.675917][ T3322] veth1_macvtap: entered promiscuous mode [ 39.691670][ T3499] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7'. [ 39.701952][ T2861] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.718612][ T3499] Zero length message leads to an empty skb [ 39.738471][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.769453][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.795774][ T923] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.805316][ T3506] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 39.821179][ T923] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.844665][ T923] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.886738][ T923] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.902126][ T3517] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12'. [ 39.911001][ T3517] netlink: 20 bytes leftover after parsing attributes in process `syz.0.12'. [ 39.959894][ T3519] loop4: detected capacity change from 0 to 2048 [ 40.019501][ T3519] Alternate GPT is invalid, using primary GPT. [ 40.026023][ T3519] loop4: p2 p3 p7 [ 40.113628][ T3535] netlink: 268 bytes leftover after parsing attributes in process `syz.2.18'. [ 40.122872][ T3535] unsupported nla_type 65024 [ 40.293568][ T3554] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 40.377815][ T3551] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.425046][ T3551] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.483197][ T3573] openvswitch: netlink: Missing key (keys=40, expected=80) [ 40.835810][ T3591] loop4: detected capacity change from 0 to 512 [ 40.862266][ T3591] EXT4-fs (loop4): 1 truncate cleaned up [ 40.870851][ T3591] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.883147][ T3595] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 40.970091][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.057998][ T3606] netlink: 76 bytes leftover after parsing attributes in process `syz.2.49'. [ 41.260299][ T3628] syz.1.59 uses obsolete (PF_INET,SOCK_PACKET) [ 41.277393][ T3628] syzkaller1: entered promiscuous mode [ 41.282956][ T3628] syzkaller1: entered allmulticast mode [ 41.366929][ C0] hrtimer: interrupt took 38296 ns [ 41.416576][ T3643] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 41.540775][ T3660] loop2: detected capacity change from 0 to 128 [ 41.575477][ T3660] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 41.625683][ T3660] ext4 filesystem being mounted at /21/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.642058][ T3667] loop3: detected capacity change from 0 to 1024 [ 41.653406][ T3667] ======================================================= [ 41.653406][ T3667] WARNING: The mand mount option has been deprecated and [ 41.653406][ T3667] and is ignored by this kernel. Remove the mand [ 41.653406][ T3667] option from the mount to silence this warning. [ 41.653406][ T3667] ======================================================= [ 41.653641][ T3660] netlink: 83992 bytes leftover after parsing attributes in process `syz.2.72'. [ 41.690047][ T3667] EXT4-fs: inline encryption not supported [ 41.727698][ T3660] netlink: zone id is out of range [ 41.732989][ T3660] netlink: zone id is out of range [ 41.745232][ T3660] netlink: zone id is out of range [ 41.750619][ T3660] netlink: zone id is out of range [ 41.765120][ T3667] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.834153][ T3660] netlink: zone id is out of range [ 41.839591][ T3660] netlink: zone id is out of range [ 41.844797][ T3660] netlink: zone id is out of range [ 41.850012][ T3660] netlink: zone id is out of range [ 41.855151][ T3660] netlink: zone id is out of range [ 41.885681][ T3667] EXT4-fs warning (device loop3): ext4_rename_delete:3729: inode #12: comm syz.3.73: Deleting old file: nlink 2, error=-2 [ 41.933455][ T3323] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.982295][ T3696] loop3: detected capacity change from 0 to 512 [ 41.992300][ T3318] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 42.001889][ T3696] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 42.047653][ T3696] EXT4-fs (loop3): invalid journal inode [ 42.075370][ T3696] EXT4-fs (loop3): can't get journal size [ 42.111725][ T3696] EXT4-fs (loop3): 1 truncate cleaned up [ 42.118532][ T3696] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.132206][ T3696] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.161155][ T3714] netlink: 'syz.2.84': attribute type 1 has an invalid length. [ 42.388788][ T3009] ================================================================== [ 42.397096][ T3009] BUG: KCSAN: data-race in d_make_discardable / path_lookupat [ 42.404715][ T3009] [ 42.407079][ T3009] write to 0xffff88811a835cc0 of 4 bytes by task 3532 on cpu 1: [ 42.414821][ T3009] d_make_discardable+0x4f/0xa0 [ 42.419726][ T3009] simple_unlink+0x68/0x80 [ 42.424200][ T3009] shmem_unlink+0x12d/0x140 [ 42.428853][ T3009] vfs_unlink+0x28b/0x440 [ 42.433207][ T3009] do_unlinkat+0x1cd/0x4b0 [ 42.437645][ T3009] __x64_sys_unlink+0x2e/0x40 [ 42.442352][ T3009] x64_sys_call+0x2f48/0x3000 [ 42.447068][ T3009] do_syscall_64+0xca/0x2b0 [ 42.451627][ T3009] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.457601][ T3009] [ 42.459971][ T3009] read to 0xffff88811a835cc0 of 4 bytes by task 3009 on cpu 0: [ 42.467534][ T3009] path_lookupat+0x1d8/0x500 [ 42.472159][ T3009] filename_lookup+0x147/0x340 [ 42.476966][ T3009] do_readlinkat+0x7d/0x320 [ 42.481500][ T3009] __x64_sys_readlink+0x47/0x60 [ 42.486384][ T3009] x64_sys_call+0x2af1/0x3000 [ 42.491093][ T3009] do_syscall_64+0xca/0x2b0 [ 42.495618][ T3009] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.501626][ T3009] [ 42.503972][ T3009] value changed: 0x08300080 -> 0x00004080 [ 42.509711][ T3009] [ 42.512073][ T3009] Reported by Kernel Concurrency Sanitizer on: [ 42.518254][ T3009] CPU: 0 UID: 0 PID: 3009 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 42.527562][ T3009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 42.537644][ T3009] ==================================================================