last executing test programs: 713.776647ms ago: executing program 2 (id=3): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc08, 0x3, 0x468, 0x0, 0x5002004a, 0xb, 0x310, 0xea02, 0x3d0, 0x3c8, 0x3c8, 0x3d0, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'erspan0\x00', 'ip6tnl0\x00'}, 0x0, 0x2c8, 0x310, 0x0, {}, [@common=@unspec=@bpf1={{0x230}, @bytecode={0x0, 0x2, 0x0, [{0x61}, {0x16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xfd}, {}, {}, {}, {}, {}, {}, {0x0, 0x80}]}}, @common=@ttl={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@NFQUEUE2={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x4c8) 634.456618ms ago: executing program 2 (id=6): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0xfff2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtfilter={0x50, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r2, {0xfff2, 0x1}, {}, {0x5}}, [@filter_kind_options=@f_flower={{0xb}, {0x20, 0x2, [@TCA_FLOWER_KEY_ENC_IPV4_DST={0x8, 0x1d, @local}, @TCA_FLOWER_KEY_ENC_IPV6_SRC={0x14, 0x1f, @empty}]}}]}, 0x50}}, 0x0) 475.611488ms ago: executing program 4 (id=5): perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x10, 0x100040, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0}, 0x0, 0x1, 0x1, 0x4, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="5c01000010000100feffffff00010000fe880000000000000000000000000001fc010000000000000000000000000001000107144e230005000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x15c}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000740)=@newsa={0x138, 0x1a, 0x1, 0xfffffffe, 0x100, {{@in=@multicast2, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0xfffe, 0x70c, 0x4e23, 0x5, 0xa, 0x0, 0x20, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, {0xfe, 0x1000000000000192, 0x0, 0xffff, 0x8251c, 0x5, 0xfffffffffffffffc}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0xfffffffe, 0x3fc, 0x9}, 0x83, 0x3505, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x844) 385.63217ms ago: executing program 2 (id=7): mkdir(&(0x7f0000000140)='./control\x00', 0x0) mkdir(&(0x7f0000002880)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./control\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1adc51, 0x0) chroot(&(0x7f00000001c0)='./file0/../file0/../file0\x00') pivot_root(&(0x7f0000000000)='./control\x00', &(0x7f0000000040)='./control\x00') 321.130398ms ago: executing program 2 (id=8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000240)=0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x10001) write(r0, 0x0, 0x0) 321.034768ms ago: executing program 3 (id=4): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x167) r0 = inotify_init1(0x80800) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x610003d5) r1 = inotify_init1(0x800) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x40000000) inotify_add_watch(r1, &(0x7f0000001080)='./file0\x00', 0xc30002c5) 248.616567ms ago: executing program 4 (id=9): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010026bd70003c0200000200000008000100", @ANYRES32=r3], 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x0) write$nci(r0, &(0x7f0000000200)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x1, 0x2, 0x4, 0x3, {0x1, 0x9, 0x81, 0x3}}, 0x7) 240.171548ms ago: executing program 0 (id=1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"/2574], &(0x7f0000000140)='GPL\x00'}, 0x48) r1 = socket$kcm(0x2, 0x1, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r1, r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000340)={r1}) 219.126801ms ago: executing program 1 (id=2): r0 = socket$nl_route(0x10, 0x3, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) sendmsg$nl_route(r0, 0x0, 0x20008000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x80, 0x0, 0x7ffc1ffb}]}) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_submit(0x0, 0x0, 0x0) 159.172349ms ago: executing program 3 (id=10): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ec}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r0, 0x0, 0x2d, 0x0, @val=@netfilter={0xa, 0x1, 0x353a, 0x1}}, 0x20) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x280, 0x200, 0x5c, 0x160, 0x138, 0x3e0, 0x200, 0x228, 0x25a, 0x200, 0x228, 0x4, 0x0, {[{{@ipv6={@remote, @dev, [0x0, 0xffffffff], [0xffffffff, 0xff], 'veth0_to_batadv\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x3a}, 0x5002, 0xa8, 0xe8, 0x52020000, {0x0, 0x6802000000000000}}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x8, 0x7f, 0x7, 0x3, 0x2, 0xfffffff7, 0x4, 0x1]}}}, {{@ipv6={@local, @empty, [0xffffffff], [], 'nr0\x00', 'dummy0\x00', {}, {}, 0x2f, 0x0, 0x0, 0x74}, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e0) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa1780c206050086dd6018232500102c"], 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0xffffffffffffff62, &(0x7f0000000000)="ff", 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x48) 133.519832ms ago: executing program 0 (id=11): socket$inet(0x2, 0x3, 0x7f) r0 = syz_io_uring_setup(0xc2, &(0x7f0000000140)={0x0, 0x1001, 0x0, 0x4}, &(0x7f00000001c0)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r0, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) pause() 117.710924ms ago: executing program 4 (id=12): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000000)="b9ff03076003008cb89e08f086ddcef11086808ba3a1cc136e6931fe9ccb", 0x0, 0xfe5, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x14, 0x2, 0x6, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x80000002, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @tracing=0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4000004}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r0, 0x0) getsockopt$inet6_mptcp_buf(r0, 0x11c, 0x4, &(0x7f0000000000)=""/152, &(0x7f00000000c0)=0x98) 117.313224ms ago: executing program 1 (id=13): syz_read_part_table(0x63a, &(0x7f0000000640)="$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") quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x13, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x17) 67.643391ms ago: executing program 4 (id=14): r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000001c0)={0x3, {{0xa, 0x4e24, 0x2, @mcast1, 0xff7ffffd}}, {{0xa, 0x4e08, 0x4a3, @local, 0x4f1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="03000000000000000a004e2300000010ff010000000000000000000000000001f8ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b0000000a004e2000000008fe8000000000000000000000000000aa05000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000010000000c0000000000000000000000000000000104000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ad94e2100000073fe8000000000000000000000000000aa09000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e210000000800000000000000000000000000000001"], 0x610) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000001c0)={0x3, {{0xa, 0x4e24, 0x2, @mcast1, 0x88f}}, {{0xa, 0x4e08, 0x4a3, @private2, 0x4f0}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000010c0)={0x3, {{0xa, 0x4e23, 0xa, @mcast1, 0x8}}, 0x1, 0x2, [{{0xa, 0x4e21, 0x7f, @loopback, 0x7}}, {{0xa, 0x4e23, 0x9d50f64, @local, 0x7}}]}, 0x190) 22.806916ms ago: executing program 2 (id=15): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x2) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)="90", 0x1}], 0x1, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18, 0x8801}}], 0x1, 0x20004031) 22.448126ms ago: executing program 2 (id=16): syz_mount_image$vfat(&(0x7f0000000980), &(0x7f0000000a00)='./file0\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB="79057a2c1e9ae72898229ce6287c"], 0x1, 0x2cb, &(0x7f0000000a40)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000001c0)=0x0) ftruncate(r0, 0x81fe) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000, 0xa00}]) 0s ago: executing program 4 (id=17): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x300) recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) kernel console output (not intermixed with test programs): [ 22.158701][ T29] audit: type=1400 audit(1768705123.705:62): avc: denied { search } for pid=3200 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.180792][ T29] audit: type=1400 audit(1768705123.705:63): avc: denied { search } for pid=3200 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=477 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.203593][ T29] audit: type=1400 audit(1768705123.705:64): avc: denied { search } for pid=3200 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.226517][ T29] audit: type=1400 audit(1768705123.705:65): avc: denied { search } for pid=3200 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.249695][ T29] audit: type=1400 audit(1768705123.705:66): avc: denied { read open } for pid=3201 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.109' (ED25519) to the list of known hosts. [ 27.943721][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 27.943738][ T29] audit: type=1400 audit(1768705129.485:70): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.972891][ T29] audit: type=1400 audit(1768705129.515:71): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.975230][ T3302] cgroup: Unknown subsys name 'net' [ 28.003203][ T29] audit: type=1400 audit(1768705129.545:72): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.114745][ T3302] cgroup: Unknown subsys name 'cpuset' [ 28.121043][ T3302] cgroup: Unknown subsys name 'rlimit' [ 28.252569][ T29] audit: type=1400 audit(1768705129.795:73): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.277387][ T29] audit: type=1400 audit(1768705129.805:74): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.297942][ T29] audit: type=1400 audit(1768705129.805:75): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.318366][ T29] audit: type=1400 audit(1768705129.805:76): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.338662][ T29] audit: type=1400 audit(1768705129.815:77): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.359382][ T3309] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.363551][ T29] audit: type=1400 audit(1768705129.815:78): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.397562][ T29] audit: type=1400 audit(1768705129.825:79): avc: denied { read } for pid=3046 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 28.429632][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.539154][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 29.565333][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 29.649166][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 29.658090][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.665487][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.672621][ T3323] bridge_slave_0: entered allmulticast mode [ 29.679247][ T3323] bridge_slave_0: entered promiscuous mode [ 29.688359][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.695503][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.702629][ T3323] bridge_slave_1: entered allmulticast mode [ 29.709099][ T3323] bridge_slave_1: entered promiscuous mode [ 29.721261][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 29.776469][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.785615][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.792721][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.800085][ T3320] bridge_slave_0: entered allmulticast mode [ 29.806586][ T3320] bridge_slave_0: entered promiscuous mode [ 29.824826][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.834198][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.841259][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.848508][ T3320] bridge_slave_1: entered allmulticast mode [ 29.854948][ T3320] bridge_slave_1: entered promiscuous mode [ 29.907309][ T3323] team0: Port device team_slave_0 added [ 29.914399][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.928753][ T3323] team0: Port device team_slave_1 added [ 29.934503][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.941582][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.948790][ T3322] bridge_slave_0: entered allmulticast mode [ 29.955274][ T3322] bridge_slave_0: entered promiscuous mode [ 29.962861][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.972131][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.979234][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.986554][ T3318] bridge_slave_0: entered allmulticast mode [ 29.992882][ T3318] bridge_slave_0: entered promiscuous mode [ 30.011068][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.018183][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.025396][ T3322] bridge_slave_1: entered allmulticast mode [ 30.031911][ T3322] bridge_slave_1: entered promiscuous mode [ 30.043290][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.050438][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.057784][ T3318] bridge_slave_1: entered allmulticast mode [ 30.064308][ T3318] bridge_slave_1: entered promiscuous mode [ 30.070731][ T3326] chnl_net:caif_netlink_parms(): no params data found [ 30.079939][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.086940][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.112882][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.140953][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.147924][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.173859][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.189443][ T3320] team0: Port device team_slave_0 added [ 30.205201][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.218003][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.227870][ T3320] team0: Port device team_slave_1 added [ 30.240106][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.250472][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.282196][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.289186][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.315149][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.342930][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.350122][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.376140][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.395085][ T3318] team0: Port device team_slave_0 added [ 30.401466][ T3322] team0: Port device team_slave_0 added [ 30.416889][ T3323] hsr_slave_0: entered promiscuous mode [ 30.423008][ T3323] hsr_slave_1: entered promiscuous mode [ 30.429878][ T3318] team0: Port device team_slave_1 added [ 30.436471][ T3322] team0: Port device team_slave_1 added [ 30.452812][ T3326] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.460023][ T3326] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.467349][ T3326] bridge_slave_0: entered allmulticast mode [ 30.473854][ T3326] bridge_slave_0: entered promiscuous mode [ 30.495571][ T3326] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.502707][ T3326] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.509990][ T3326] bridge_slave_1: entered allmulticast mode [ 30.516705][ T3326] bridge_slave_1: entered promiscuous mode [ 30.532644][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.539652][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.565667][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.593307][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.600423][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.626334][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.637499][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.644506][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.670497][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.692743][ T3326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.702068][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.709158][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.735137][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.750980][ T3320] hsr_slave_0: entered promiscuous mode [ 30.757186][ T3320] hsr_slave_1: entered promiscuous mode [ 30.763101][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 30.768874][ T3320] Cannot create hsr debugfs directory [ 30.778240][ T3326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.805982][ T3326] team0: Port device team_slave_0 added [ 30.833814][ T3326] team0: Port device team_slave_1 added [ 30.845553][ T3322] hsr_slave_0: entered promiscuous mode [ 30.851651][ T3322] hsr_slave_1: entered promiscuous mode [ 30.857585][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 30.863322][ T3322] Cannot create hsr debugfs directory [ 30.884136][ T3318] hsr_slave_0: entered promiscuous mode [ 30.890214][ T3318] hsr_slave_1: entered promiscuous mode [ 30.896251][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 30.901983][ T3318] Cannot create hsr debugfs directory [ 30.924555][ T3326] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.931639][ T3326] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.957565][ T3326] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.980874][ T3326] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.987914][ T3326] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.013896][ T3326] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.105045][ T3326] hsr_slave_0: entered promiscuous mode [ 31.111212][ T3326] hsr_slave_1: entered promiscuous mode [ 31.117190][ T3326] debugfs: 'hsr0' already exists in 'hsr' [ 31.122918][ T3326] Cannot create hsr debugfs directory [ 31.202703][ T3323] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 31.219358][ T3323] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 31.236218][ T3323] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 31.253050][ T3323] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 31.286843][ T3320] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 31.295954][ T3320] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 31.305422][ T3320] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 31.314795][ T3320] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.351387][ T3322] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 31.360428][ T3322] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 31.369566][ T3322] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 31.378621][ T3322] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 31.429145][ T3318] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 31.440229][ T3318] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 31.452417][ T3318] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 31.463596][ T3318] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 31.483721][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.491931][ T3326] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 31.506002][ T3326] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 31.515396][ T3326] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 31.525109][ T3326] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 31.561662][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.570025][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.597093][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.604242][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.613382][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.620464][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.630513][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.654930][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.662092][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.675382][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.682480][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.703317][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.740587][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.749879][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.769219][ T861] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.776348][ T861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.787015][ T3326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.798683][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.805820][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.822761][ T3326] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.836630][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.849449][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.856582][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.881461][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.888693][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.898999][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.906138][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.930526][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.937746][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.951470][ T3322] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.985728][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.018639][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.085465][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.155657][ T3326] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.196588][ T3320] veth0_vlan: entered promiscuous mode [ 32.224220][ T3320] veth1_vlan: entered promiscuous mode [ 32.242163][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.276534][ T3320] veth0_macvtap: entered promiscuous mode [ 32.302855][ T3320] veth1_macvtap: entered promiscuous mode [ 32.347322][ T3323] veth0_vlan: entered promiscuous mode [ 32.354032][ T3326] veth0_vlan: entered promiscuous mode [ 32.360666][ T3322] veth0_vlan: entered promiscuous mode [ 32.368336][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.391943][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.400057][ T3322] veth1_vlan: entered promiscuous mode [ 32.408322][ T3323] veth1_vlan: entered promiscuous mode [ 32.416421][ T3326] veth1_vlan: entered promiscuous mode [ 32.427143][ T1598] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.439972][ T911] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.451960][ T911] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.460773][ T911] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.473010][ T3318] veth0_vlan: entered promiscuous mode [ 32.495348][ T3318] veth1_vlan: entered promiscuous mode [ 32.505899][ T3326] veth0_macvtap: entered promiscuous mode [ 32.523015][ T3323] veth0_macvtap: entered promiscuous mode [ 32.532848][ T3326] veth1_macvtap: entered promiscuous mode [ 32.540867][ T3323] veth1_macvtap: entered promiscuous mode [ 32.554338][ T3322] veth0_macvtap: entered promiscuous mode [ 32.571292][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.586991][ T3322] veth1_macvtap: entered promiscuous mode [ 32.594915][ T3326] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.604776][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.620231][ T3326] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.645739][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.656286][ T3488] xt_bpf: check failed: parse error [ 32.661066][ T861] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.671067][ T3318] veth0_macvtap: entered promiscuous mode [ 32.686766][ T3318] veth1_macvtap: entered promiscuous mode [ 32.700017][ T861] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.713538][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.726291][ T861] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.737134][ T861] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.751184][ T861] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.763838][ T861] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.773126][ T861] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.785984][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.795753][ T861] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.815860][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.832668][ T861] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.844523][ T861] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.859340][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.875544][ T861] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.909556][ T861] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.927367][ T3499] ======================================================= [ 32.927367][ T3499] WARNING: The mand mount option has been deprecated and [ 32.927367][ T3499] and is ignored by this kernel. Remove the mand [ 32.927367][ T3499] option from the mount to silence this warning. [ 32.927367][ T3499] ======================================================= [ 32.968761][ T861] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.978840][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 32.978852][ T29] audit: type=1400 audit(1768705134.525:114): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 33.025052][ T861] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.045176][ T29] audit: type=1400 audit(1768705134.595:115): avc: denied { watch watch_reads } for pid=3501 comm="syz.3.4" path="/0/file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 33.069594][ T861] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.097267][ T861] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.120732][ T29] audit: type=1400 audit(1768705134.645:116): avc: denied { read write } for pid=3506 comm="syz.4.9" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.144110][ T29] audit: type=1400 audit(1768705134.645:117): avc: denied { open } for pid=3506 comm="syz.4.9" path="/dev/virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.250561][ T3525] loop1: detected capacity change from 0 to 2048 [ 33.318283][ T3525] loop1: p2 < > p3 < p5 > p4 [ 33.323062][ T3525] loop1: partition table partially beyond EOD, truncated [ 33.332269][ T3533] loop2: detected capacity change from 0 to 256 [ 33.333003][ T29] audit: type=1400 audit(1768705134.725:118): avc: denied { create } for pid=3511 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 33.339295][ T3525] loop1: p2 start 4278190080 is beyond EOD, [ 33.357649][ T29] audit: type=1400 audit(1768705134.725:119): avc: denied { ioctl } for pid=3511 comm="syz.0.1" path="socket:[4573]" dev="sockfs" ino=4573 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 33.357682][ T29] audit: type=1326 audit(1768705134.745:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3510 comm="syz.1.2" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e948bacb9 code=0x7ffc0000 [ 33.357711][ T29] audit: type=1326 audit(1768705134.745:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3510 comm="syz.1.2" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e948bacb9 code=0x7ffc0000 [ 33.363682][ T3525] truncated [ 33.392862][ T3525] loop1: p4 size 8192 extends beyond EOD, [ 33.410895][ T29] audit: type=1326 audit(1768705134.745:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3510 comm="syz.1.2" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f6e948bacb9 code=0x7ffc0000 [ 33.410933][ T29] audit: type=1326 audit(1768705134.745:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3510 comm="syz.1.2" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e948bacb9 code=0x7ffc0000 [ 33.489177][ T3525] truncated [ 33.556000][ T3525] loop1: p5 size 8192 extends beyond EOD, truncated [ 33.647637][ T3007] ================================================================== [ 33.655763][ T3007] BUG: KCSAN: data-race in xas_clear_mark / xas_find_marked [ 33.663085][ T3007] [ 33.665446][ T3007] read-write to 0xffff88811a4d5478 of 8 bytes by task 3521 on cpu 0: [ 33.673534][ T3007] xas_clear_mark+0x91/0x180 [ 33.678164][ T3007] __folio_start_writeback+0x270/0x370 [ 33.683663][ T3007] __block_write_full_folio+0x53a/0x8f0 [ 33.689311][ T3007] block_write_full_folio+0x2c1/0x2e0 [ 33.694717][ T3007] blkdev_writepages+0x88/0x100 [ 33.699686][ T3007] do_writepages+0x1c6/0x310 [ 33.704310][ T3007] filemap_write_and_wait_range+0x166/0x370 [ 33.710229][ T3007] bdev_release+0xeb/0x3d0 [ 33.714711][ T3007] blkdev_release+0x15/0x20 [ 33.719375][ T3007] __fput+0x29b/0x650 [ 33.723394][ T3007] ____fput+0x1c/0x30 [ 33.727488][ T3007] task_work_run+0x130/0x1a0 [ 33.732204][ T3007] do_exit+0x466/0x1590 [ 33.736392][ T3007] do_group_exit+0x138/0x140 [ 33.741012][ T3007] __x64_sys_exit_group+0x1f/0x20 [ 33.746103][ T3007] x64_sys_call+0x2fff/0x3000 [ 33.750827][ T3007] do_syscall_64+0xc0/0x2a0 [ 33.755346][ T3007] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.761257][ T3007] [ 33.763592][ T3007] read to 0xffff88811a4d5478 of 8 bytes by task 3007 on cpu 1: [ 33.771144][ T3007] xas_find_marked+0x213/0x620 [ 33.775925][ T3007] find_get_entry+0x5d/0x380 [ 33.780529][ T3007] filemap_get_folios_tag+0x15f/0x230 [ 33.785937][ T3007] writeback_iter+0x4bb/0x810 [ 33.790638][ T3007] blkdev_writepages+0xa7/0x100 [ 33.795858][ T3007] do_writepages+0x1c6/0x310 [ 33.800469][ T3007] filemap_write_and_wait_range+0x166/0x370 [ 33.806379][ T3007] sync_blockdev+0x35/0x50 [ 33.810821][ T3007] bdev_disk_changed+0xdb/0xcb0 [ 33.815703][ T3007] blkdev_get_whole+0x1f5/0x2d0 [ 33.820576][ T3007] bdev_open+0x280/0x7e0 [ 33.824830][ T3007] bdev_file_open_by_dev+0x1e6/0x250 [ 33.830132][ T3007] disk_scan_partitions+0x148/0x1b0 [ 33.835346][ T3007] blkdev_common_ioctl+0x1236/0x20b0 [ 33.840647][ T3007] blkdev_ioctl+0x31f/0x460 [ 33.845174][ T3007] __se_sys_ioctl+0xce/0x140 [ 33.849781][ T3007] __x64_sys_ioctl+0x43/0x50 [ 33.854396][ T3007] x64_sys_call+0x14b0/0x3000 [ 33.859100][ T3007] do_syscall_64+0xc0/0x2a0 [ 33.863616][ T3007] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.869577][ T3007] [ 33.871908][ T3007] value changed: 0xfffff80000000000 -> 0xffff000000000000 [ 33.879025][ T3007] [ 33.881351][ T3007] Reported by Kernel Concurrency Sanitizer on: [ 33.887525][ T3007] CPU: 1 UID: 0 PID: 3007 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 33.896821][ T3007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 33.906882][ T3007] ================================================================== [ 33.961850][ T3007] loop1: p2 < > p3 < p5 > p4 [ 33.966652][ T3007] loop1: partition table partially beyond EOD, truncated [ 33.973785][ T3007] loop1: p2 start 4278190080 is beyond EOD, truncated [ 33.981935][ T3007] loop1: p4 size 8192 extends beyond EOD, truncated [ 33.989820][ T3007] loop1: p5 size 8192 extends beyond EOD, truncated [ 34.029199][ T3308] udevd[3308]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 34.029387][ T3312] udevd[3312]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 34.052261][ T3310] udevd[3310]: inotify_add_watch(7, /dev/loop1p5, 10) failed: No such file or directory