last executing test programs: 818.4304ms ago: executing program 2 (id=3): r0 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x6) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68180, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x1, @perf_bp={0x0, 0x1}, 0x10c0e8, 0x0, 0x0, 0x3, 0x6, 0x8001, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1020000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) r2 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) accept(r2, 0x0, 0x0) io_uring_setup(0x1b7b, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x80) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x5, 0x8, &(0x7f00000006c0)='\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x60ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x200, 0x1002, 0x20da, 0x0, 0xa, 0x20005, 0x8a6, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) 527.297814ms ago: executing program 2 (id=6): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/route\x00') lseek(r0, 0x2000, 0xfff5) 426.554435ms ago: executing program 2 (id=7): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) (async, rerun: 64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14, 0x39, 0x9, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) (async) setrlimit(0x7, &(0x7f0000000000)={0x4, 0x6}) 426.016535ms ago: executing program 0 (id=1): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200080, &(0x7f00000000c0), 0x3, 0x56d, &(0x7f0000000c00)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_MCE_KILL(0x4e, 0x1, 0x1000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f00000000c0)='./file0\x00', 0x8010, &(0x7f0000000000)=ANY=[@ANYBLOB="f3686f776173736f632c6e866a6f6c6965742c6d61703d61636f726e2c00"], 0x1, 0x566, &(0x7f0000000540)="$eJzs3M9uG8cZAPBZmbJVFXUDBI0dxYeN04MLNAxJ1zKEAAHY1VLahOISu6vAPhVBLQVCpbRIUqDxzRe3BfoSaW99gp76RkGPPaZYLuk4tkjLfxIaze8HSDPkfjvzzYrYD6QwDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAiJLtTqcbhWE22r8Vz5dsF/neguOz8f71rWbBvCFE9U9YWwuXm6cuv/rN4Z/Vv66GS82jS2GtbtbC3R+/9sq7r7ZWZucvSOh7sDpN9vjg08WBUfg6+r6S+m7snnapW/FOOsrKPNvr76RxVubx1uZm553dQRkPsmFa3i6rdC9OWqFf5UV8LflF3N3auh6n7dv5/mhnuz9MZ0/efLvX6WzG77fHab8o89E777fLZDcbDrPRziSmPlzH3KxfiB9kVXzhwbW//qTcD4+OD7pnCeo9KajX6fW63V6vu3lj68bNTqf12BOdR4THIpb9omXZXtCdG57frP4DAAAA/7+iyWfs9fv/1cnn8FEYRF83lp0aAAAA8IJM/vN/6R9R/f4/hHA5RINsmHaWnRYAAADwAv3liXvsyvGF6N//CUWxGt0b3/p5dNKv4/on55rzzj06YjVoRReng0yazdb0UZJeiV5vgl6fRX81bQ6flEf0FAlszEkg/C1sNDEbd5r2zuxIM8v6IBum7SQfvtsN/f7FlSq9Vf3xk6M/hcny/zrauxiFw6Pjg/Zvf398Z5LLvXqUeyfTDRSP7aNYkMvnD/Y9PrLiL5uhVutcoum86828nYfXv9KcvvIUc94PbzQxb6w37fq3179Wz9ltz1v9evSTyWa651z5/XClibly7a26eevaKVn0Tsvi/HTwyW69h7N4pmtxhiyuL7gW4fDoQgjhTFn8aF4WAMtyOK8KPaj/j9bd1jPca7+p7u99h9X9fniziXlzY3JjbW2cckfvtKOw4I4+q7H3zj9rdftnuNrEXJ0Fn1pj3/vpZN7wymzepqpOiv+Xc+cth72o/kOd+/zkD+G1z764+/bRyUcfH3x88Emvd32z86tO50YvrE6WMW0WZArAD1dafBWtV3+OiiIb/6a7tdXtV7tpXOTJB3GRbe+kcTaq0iLZ7Y920nhc5FWe5MO682G2nZZxuT8e50UVD/IiHudldmvyzS/x9KtfyjT8clRlSTkepv0yjZN8VPWTKt7OyiQe7/96mJW7aTE5uRynSTbIkn6V5aO4le//PUnbcVym6UOB2XY6qrJBVndH8bjI9vrF7fjDfLi/l8bbaZkU2bjKmwFnc2WjQV7s9avsXGgv+2IDwEvisy/u/u6j4+ODT8/Y+e90c+DTnPX4rOeXsVQAYGpRlQYAAAAAAAAAAAAAAF4OT7v/7wV2VqcpLGd2nbN1wtpLkcZyOivPPU7rJVjF3M7sJnBqzPLuSQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwz/8CAAD//3bhnLY=") r3 = getpid() gettid() socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x10, 0x80002, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0xf8e77000) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[], 0x70}, 0x1, 0x7}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) prctl$PR_MCE_KILL(0x4e, 0x1, 0x1000000) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xf0, 0x5f, 0x9f, 0x4, 0x0, 0x6, 0x30531, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800009, 0x2, @perf_config_ext={0x1, 0x8}, 0x18002, 0x8dd, 0x80000020, 0x6, 0x400, 0x200, 0x8, 0x0, 0x100, 0x0, 0x201}, r3, 0x8, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89b0, &(0x7f0000000040)={'team_slave_1\x00', @random='\x00\x00\x00\x00\x00 '}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x13732000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x12, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x7, 0xc, &(0x7f0000001180)=ANY=[@ANYRES8, @ANYRES64, @ANYRES32=r1, @ANYRESOCT=0x0, @ANYBLOB, @ANYRES8=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 0s ago: executing program 3 (id=4): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)=0xffffffff) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x41) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000050000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000085000000d000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000480)={r3}, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='v'], 0x1c}}, 0x48850) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="9f0000000000000000000000006ffc00000030f5ffffff005f2e00"], 0x0, 0x22, 0x0, 0x0, 0x7fff, 0x10000}, 0x28) r4 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r4, &(0x7f0000000200)=[{{&(0x7f0000000100)={0xa, 0x4e21, 0xdc, @local, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x002'], 0x28, 0x7ffffff7}}], 0x1, 0x4040) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000008000000000018000380140003801000018004000300080001"], 0x44}}, 0x20008000) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="07000000000000000000050000f66cc7550effee193600180003800800040000000000080002000900003d040001001800018014ec4d6cbd1178a706756e00"/78], 0x44}}, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) readv(r5, &(0x7f0000002a40)=[{&(0x7f0000002800)=""/103, 0x67}, {0x0}], 0x2) pwritev(r5, &(0x7f0000000040), 0x0, 0x7f, 0x20004) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="611576000000000061138c0000000000bfa00000000000001503000008004e002d3501000000000095004100000000006916000000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffbd4301"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) close(0x3) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x3, 0x40, 0x40, 0x41}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f00000008c0), 0x1003, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000000c0)=r11, 0x4) sendmsg$unix(r10, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0xc, 0xc, 0x0, [@union]}}, &(0x7f0000000300)=""/246, 0x26, 0xf6, 0x1}, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.6' (ED25519) to the list of known hosts. [ 31.182292][ T28] audit: type=1400 audit(1778093846.766:117): avc: denied { mounton } for pid=3285 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 31.205333][ T28] audit: type=1400 audit(1778093846.786:118): avc: denied { mount } for pid=3285 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.206049][ T3285] cgroup: Unknown subsys name 'net' [ 31.233061][ T28] audit: type=1400 audit(1778093846.816:119): avc: denied { unmount } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.330648][ T3285] cgroup: Unknown subsys name 'cpuset' [ 31.336682][ T3285] cgroup: Unknown subsys name 'rlimit' [ 31.456029][ T28] audit: type=1400 audit(1778093847.036:120): avc: denied { setattr } for pid=3285 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.484782][ T28] audit: type=1400 audit(1778093847.036:121): avc: denied { create } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.505454][ T28] audit: type=1400 audit(1778093847.036:122): avc: denied { write } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.525929][ T28] audit: type=1400 audit(1778093847.036:123): avc: denied { read } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 31.546398][ T28] audit: type=1400 audit(1778093847.036:124): avc: denied { read } for pid=3018 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 31.553028][ T3289] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 31.567511][ T28] audit: type=1400 audit(1778093847.036:125): avc: denied { mounton } for pid=3285 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 31.600001][ T3285] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.600784][ T28] audit: type=1400 audit(1778093847.036:126): avc: denied { mount } for pid=3285 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 33.603919][ T3295] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.611178][ T3295] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.618284][ T3295] bridge_slave_0: entered allmulticast mode [ 33.624742][ T3295] bridge_slave_0: entered promiscuous mode [ 33.644902][ T3295] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.651975][ T3295] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.659043][ T3295] bridge_slave_1: entered allmulticast mode [ 33.665328][ T3295] bridge_slave_1: entered promiscuous mode [ 33.726439][ T3295] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.737760][ T3296] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.744852][ T3296] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.752125][ T3296] bridge_slave_0: entered allmulticast mode [ 33.758569][ T3296] bridge_slave_0: entered promiscuous mode [ 33.767258][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.774329][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.781585][ T3302] bridge_slave_0: entered allmulticast mode [ 33.787824][ T3302] bridge_slave_0: entered promiscuous mode [ 33.794927][ T3295] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.810927][ T3296] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.818094][ T3296] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.825248][ T3296] bridge_slave_1: entered allmulticast mode [ 33.831516][ T3296] bridge_slave_1: entered promiscuous mode [ 33.840306][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.847464][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.854561][ T3302] bridge_slave_1: entered allmulticast mode [ 33.860972][ T3302] bridge_slave_1: entered promiscuous mode [ 33.891858][ T3295] team0: Port device team_slave_0 added [ 33.897489][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.904641][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.911760][ T3303] bridge_slave_0: entered allmulticast mode [ 33.918029][ T3303] bridge_slave_0: entered promiscuous mode [ 33.937782][ T3295] team0: Port device team_slave_1 added [ 33.943658][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.950835][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.958035][ T3303] bridge_slave_1: entered allmulticast mode [ 33.964547][ T3303] bridge_slave_1: entered promiscuous mode [ 33.971970][ T3296] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.981114][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.988146][ T3299] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.995407][ T3299] bridge_slave_0: entered allmulticast mode [ 34.001690][ T3299] bridge_slave_0: entered promiscuous mode [ 34.009131][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.030698][ T3296] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.044093][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.051219][ T3299] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.058334][ T3299] bridge_slave_1: entered allmulticast mode [ 34.064591][ T3299] bridge_slave_1: entered promiscuous mode [ 34.071570][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.084798][ T3295] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.091846][ T3295] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.117816][ T3295] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.144373][ T3295] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.151340][ T3295] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.177281][ T3295] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.188738][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.198512][ T3296] team0: Port device team_slave_0 added [ 34.208254][ T3302] team0: Port device team_slave_0 added [ 34.214793][ T3302] team0: Port device team_slave_1 added [ 34.223828][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.237981][ T3296] team0: Port device team_slave_1 added [ 34.248287][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.266538][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.273641][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.299590][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.319293][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.333261][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.340241][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.366206][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.377610][ T3303] team0: Port device team_slave_0 added [ 34.383594][ T3296] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.390681][ T3296] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.416566][ T3296] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.438205][ T3303] team0: Port device team_slave_1 added [ 34.444079][ T3296] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.451055][ T3296] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.476938][ T3296] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.488201][ T3299] team0: Port device team_slave_0 added [ 34.494970][ T3299] team0: Port device team_slave_1 added [ 34.506214][ T3295] hsr_slave_0: entered promiscuous mode [ 34.512222][ T3295] hsr_slave_1: entered promiscuous mode [ 34.553617][ T3302] hsr_slave_0: entered promiscuous mode [ 34.559461][ T3302] hsr_slave_1: entered promiscuous mode [ 34.565256][ T3302] debugfs: 'hsr0' already exists in 'hsr' [ 34.570979][ T3302] Cannot create hsr debugfs directory [ 34.581330][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.588261][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.616492][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.639400][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.646387][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.672468][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.685961][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.692904][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.718882][ T3299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.738247][ T3296] hsr_slave_0: entered promiscuous mode [ 34.744245][ T3296] hsr_slave_1: entered promiscuous mode [ 34.750058][ T3296] debugfs: 'hsr0' already exists in 'hsr' [ 34.755775][ T3296] Cannot create hsr debugfs directory [ 34.766761][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.773753][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.799767][ T3299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.865757][ T3303] hsr_slave_0: entered promiscuous mode [ 34.871929][ T3303] hsr_slave_1: entered promiscuous mode [ 34.877648][ T3303] debugfs: 'hsr0' already exists in 'hsr' [ 34.883373][ T3303] Cannot create hsr debugfs directory [ 34.893413][ T3299] hsr_slave_0: entered promiscuous mode [ 34.899216][ T3299] hsr_slave_1: entered promiscuous mode [ 34.905103][ T3299] debugfs: 'hsr0' already exists in 'hsr' [ 34.910835][ T3299] Cannot create hsr debugfs directory [ 35.050901][ T3302] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 35.059416][ T3302] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.066928][ T3302] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 35.075507][ T3302] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.082936][ T3302] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 35.091075][ T3302] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.100730][ T3302] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 35.108941][ T3302] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.134365][ T3295] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 35.142907][ T3295] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.154849][ T3295] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 35.163312][ T3295] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.171121][ T3295] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 35.179228][ T3295] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.191188][ T3295] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 35.199623][ T3295] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.227056][ T3296] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 35.235378][ T3296] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.243294][ T3296] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 35.251699][ T3296] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.259223][ T3296] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 35.267740][ T3296] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.275281][ T3296] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 35.283518][ T3296] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.292388][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.322367][ T3302] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.332529][ T3303] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 35.341158][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.348693][ T3303] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 35.356812][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.365197][ T3303] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 35.373725][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.381269][ T3303] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 35.389529][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.401975][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.409018][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.426511][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.433580][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.457019][ T3299] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 35.465498][ T3299] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.473012][ T3299] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 35.482264][ T3299] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.496625][ T3299] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 35.504802][ T3299] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.512307][ T3299] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 35.521076][ T3299] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.551333][ T3302] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.578518][ T3295] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.609615][ T3296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.620331][ T3295] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.642087][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.649167][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.661992][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.669048][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.680467][ T3296] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.690826][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.713222][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.720299][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.732771][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.739822][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.752779][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.763850][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.779239][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.786356][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.801817][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.808865][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.822644][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.855458][ T3299] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.877158][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.884235][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.903398][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.910494][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.954736][ T3299] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 36.014343][ T3302] veth0_vlan: entered promiscuous mode [ 36.029330][ T3295] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.044411][ T3302] veth1_vlan: entered promiscuous mode [ 36.089266][ T3302] veth0_macvtap: entered promiscuous mode [ 36.104797][ T3302] veth1_macvtap: entered promiscuous mode [ 36.119630][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.134548][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.144898][ T3296] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.164540][ T49] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.184502][ T49] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.200148][ T49] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.219413][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 36.219426][ T28] audit: type=1400 audit(1778093851.796:140): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/root/syzkaller.d9lzF6/syz-tmp" dev="sda1" ino=2042 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 36.225679][ T49] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.265876][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.281260][ T3299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.293414][ T3302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 36.294169][ T28] audit: type=1400 audit(1778093851.816:141): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 36.312743][ T3295] veth0_vlan: entered promiscuous mode [ 36.335457][ T28] audit: type=1400 audit(1778093851.816:142): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/root/syzkaller.d9lzF6/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 36.351811][ T3295] veth1_vlan: entered promiscuous mode [ 36.375376][ T28] audit: type=1400 audit(1778093851.816:143): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 36.425861][ T28] audit: type=1400 audit(1778093851.816:144): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/root/syzkaller.d9lzF6/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 36.432768][ T3295] veth0_macvtap: entered promiscuous mode [ 36.459543][ T3489] Zero length message leads to an empty skb [ 36.496305][ T3295] veth1_macvtap: entered promiscuous mode [ 36.499844][ T28] audit: type=1400 audit(1778093851.816:145): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/root/syzkaller.d9lzF6/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 36.515335][ T3295] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.537229][ T28] audit: type=1400 audit(1778093851.816:146): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 36.571481][ T28] audit: type=1400 audit(1778093851.846:147): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 36.575332][ T3295] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.598273][ T28] audit: type=1400 audit(1778093851.846:148): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="gadgetfs" ino=3724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 36.634272][ T49] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.636304][ T28] audit: type=1400 audit(1778093851.986:149): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.667546][ T49] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.682222][ T49] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.703424][ T3299] veth0_vlan: entered promiscuous mode [ 36.721301][ T49] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.739795][ T3296] veth0_vlan: entered promiscuous mode [ 36.754314][ T3299] veth1_vlan: entered promiscuous mode [ 36.775284][ T3303] veth0_vlan: entered promiscuous mode [ 36.799759][ T3296] veth1_vlan: entered promiscuous mode [ 36.806190][ T3511] loop0: detected capacity change from 0 to 512 [ 36.833376][ T3299] veth0_macvtap: entered promiscuous mode [ 36.841217][ T3303] veth1_vlan: entered promiscuous mode [ 36.848868][ T3299] veth1_macvtap: entered promiscuous mode [ 36.856086][ T3296] veth0_macvtap: entered promiscuous mode [ 36.862619][ T3511] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.878830][ T3296] veth1_macvtap: entered promiscuous mode [ 36.888532][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.899981][ T3511] ext4 filesystem being mounted at /0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 36.935253][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.970831][ T49] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.980457][ T49] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.004990][ T49] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.023244][ T3296] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.040577][ T3303] veth0_macvtap: entered promiscuous mode [ 37.052281][ T49] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.082754][ T3303] veth1_macvtap: entered promiscuous mode [ 37.097974][ T3296] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.112928][ T30] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.125104][ T30] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.148707][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.173076][ T30] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.195250][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.210862][ T30] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.230026][ T3376] ================================================================== [ 37.238133][ T3376] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 37.245147][ T3376] [ 37.247446][ T3376] read-write to 0xffff888237d2a8e4 of 4 bytes by task 1038 on cpu 1: [ 37.255481][ T3376] wq_worker_running+0x9b/0x120 [ 37.260318][ T3376] schedule_timeout+0xca/0x180 [ 37.265081][ T3376] msleep+0x4f/0x90 [ 37.268876][ T3376] nsim_fib_event+0x48e7/0x4d40 [ 37.273703][ T3376] nsim_fib_event_work+0x13d/0x210 [ 37.278807][ T3376] process_scheduled_works+0x4f0/0x9c0 [ 37.284247][ T3376] worker_thread+0x58a/0x780 [ 37.288824][ T3376] kthread+0x22a/0x280 [ 37.292869][ T3376] ret_from_fork+0x146/0x330 [ 37.297440][ T3376] ret_from_fork_asm+0x1a/0x30 [ 37.302183][ T3376] [ 37.304486][ T3376] read to 0xffff888237d2a8e4 of 4 bytes by task 3376 on cpu 0: [ 37.312000][ T3376] kick_pool+0x49/0x2d0 [ 37.316135][ T3376] __queue_work+0x899/0xaa0 [ 37.320634][ T3376] queue_work_on+0xa9/0x140 [ 37.325117][ T3376] wg_packet_encrypt_worker+0xbf3/0xd70 [ 37.330638][ T3376] process_scheduled_works+0x4f0/0x9c0 [ 37.336075][ T3376] worker_thread+0x58a/0x780 [ 37.340645][ T3376] kthread+0x22a/0x280 [ 37.344693][ T3376] ret_from_fork+0x146/0x330 [ 37.349268][ T3376] ret_from_fork_asm+0x1a/0x30 [ 37.354019][ T3376] [ 37.356318][ T3376] value changed: 0x00000000 -> 0x00000001 [ 37.362008][ T3376] [ 37.364317][ T3376] Reported by Kernel Concurrency Sanitizer on: [ 37.370456][ T3376] CPU: 0 UID: 0 PID: 3376 Comm: kworker/0:4 Not tainted syzkaller #0 PREEMPT(full) [ 37.379829][ T3376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 37.389873][ T3376] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 37.396370][ T3376] ================================================================== [ 37.503298][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.515765][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.546316][ T3520] netlink: 48 bytes leftover after parsing attributes in process `syz.3.4'. [ 37.546514][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.601514][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.731703][ T3511] syz.0.1 (3511) used greatest stack depth: 9608 bytes left [ 37.870632][ T3515] syz.0.1 (3515) used greatest stack depth: 9504 bytes left [ 37.879030][ T3295] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000.