last executing test programs: 1.452920595s ago: executing program 2 (id=59): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000052, &(0x7f0000000140)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@debug}, {@discard}, {@data_err_ignore}, {@grpquota}, {@noblock_validity}, {@lazytime}, {@bh}, {@bh}]}, 0x1, 0x553, &(0x7f0000001080)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) 1.403165978s ago: executing program 4 (id=60): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, 0x0) 1.264398196s ago: executing program 4 (id=65): setreuid(0xffffffffffffffff, 0xee01) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000340)) 1.1945577s ago: executing program 2 (id=69): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x6, 0x8604, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fef, 0x1, @perf_bp={0x0, 0x3}, 0x8000, 0x10000, 0x0, 0x4, 0x6916, 0x20005, 0x2, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x6, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x27, &(0x7f0000000000)=""/114}, 0xa8) 1.164853962s ago: executing program 4 (id=70): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000300)=0x1, 0x4) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f0000000900)) 1.093618936s ago: executing program 4 (id=74): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0xfe, 0x2b7, &(0x7f0000001340)="$eJzs3T9vW1UUAPDzHPvFJUMyMCEk3tCBhajpyoArFCREJpAH/khQ0VaqYqtSLFkqIKxOfAIGBr4HGzsSC98AiQ/ARoUqXfT8Xmxju3ad4hSlv9+Sq3PP8T3X7yUerHfzxev90zsPBvceffN7tNtZNDrRicdZHEQjzqVaAABXwuOU4s8Lfb43G9vqCQDYrpnP/9ZTUnYXQ+9suy0AYIs++viTD26dnBx/WBTtiP53w24W1c9q/ta9uB+9uBs3Yj+eTL8LSKkav/f+yXE0i9JBXO+Pht2ysv/5r5PUPMb1R7EfB8vrj4rKTP1o2G3FK7uRZRH3O2UjN2M/Xl2oL+ePby6pj24eb7brTZbrH8Z+/PZlPIhe3Bl/pzFd/9s8infT9399/WmZXNZno2F3d5w3lXYu+9oAAAAAAAAAAAAAAAAAAAAAAHB1HRYTB3G9X4bq83d2noznD/81Pz5fpzGer+qziHw8mDsfaJTix/PzdW4URZGyKn9yvs+1ZrzWjOYL2zgAAAAAAAAAAAAAAAAAAAD8jwwefnV6u9e7e/afDOqH/CeP9V/0dTozkTdidfLuRmvFTp1e9jqfc/TLZ/1JpNzERZoftoqIVT23FiLXyn7Wv/LfKaWUZRHPd5laz7LWmsHe6pzyDf75h723Tm9n697D9vmF+2l2Ko+zwcO5axrZJh2mjW6/fEVOXt8xz/Q6e8/5S/T2H9VidSRbs4vWTKRVD+Jpt197o/v58v4GAQAAAAAAAAAAAAAAAAAAlelDv0smH60sbWytKQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC4ZNP//z8dxEJkbjCqi5fnpJRGk0geZ4MXvEUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABeAv8EAAD//yiCbKI=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x20042, 0x0) pwrite64(r0, &(0x7f0000000140)="f6", 0xffffff07, 0x8000c61) 998.165022ms ago: executing program 2 (id=78): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000000500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[@ANYBLOB="1c0000000203010200000000000000000a00000108"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x43044) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x28, 0x0, &(0x7f0000000b40)="c1188619b95d02ff4284860188a84b2b88a8", 0x0, 0x8001ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 899.987897ms ago: executing program 0 (id=83): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x182, 0xfffc, 0x8, 0x2, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000200)={'fscrypt:', @desc2}, &(0x7f0000000300)={0x0, "1e4e1557a609bff6a596dea0fb0503f22231b15d27fce60137b6c6cbf512f89b435f5dd9b4ae337bbf37b108c1ec26276567359e079abe967f5d8aad34301a48", 0x13}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x1) 807.884352ms ago: executing program 0 (id=85): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000060a0b040000000000000000020000002c0004802800018007000100637400001c0002800800014000000002080002400000000905000300000000000900010073797a30000000000900020073797a320000000014000000110001"], 0x80}, 0x1, 0x0, 0x0, 0x44800}, 0x0) 783.561834ms ago: executing program 1 (id=87): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) unshare(0x28000600) io_uring_setup(0x76ad, &(0x7f0000000100)={0x0, 0xca0b, 0x2, 0x2, 0x3dd}) 753.188276ms ago: executing program 0 (id=88): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0xa}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=@gettaction={0x20, 0x5a, 0x1, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}]}, 0x20}}, 0x0) 720.747368ms ago: executing program 4 (id=90): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="d8000000180081054e81f783db4cb9040a1d080006007c09e8fc55a10a0015000600142603600e1208000f00fff00401a80008000800104004080000055c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe144ecc447c65e206d25b4084121d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300fc0d15", 0xd8}], 0x1}, 0x4000000) 713.682648ms ago: executing program 1 (id=91): r0 = socket(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="400000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r1, @ANYBLOB='\b\x00', @ANYRES64=r0], 0x40}}, 0x0) 647.731922ms ago: executing program 0 (id=93): syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x22000406, &(0x7f0000001d40)={[{@dioread_lock}, {@noblock_validity}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@jqfmt_vfsold}, {@nolazytime}, {@grpjquota, 0x2e}, {@journal_async_commit}, {@grpjquota}, {@barrier_val}, {@grpid}], [], 0x2c}, 0x84, 0x4ed, &(0x7f0000001e00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020660b, &(0x7f0000000480)={0x47, 0xffbf, 0x4, 0x9}) 628.889713ms ago: executing program 1 (id=94): r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) connect$vsock_stream(r0, &(0x7f0000001080)={0x28, 0x0, 0x2711, @hyper}, 0x10) 619.768814ms ago: executing program 4 (id=95): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000b80)={[{@errors_remount}, {@nobh}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@dioread_lock}]}, 0x3, 0x439, &(0x7f0000002380)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0xffffffffffffff23, 0x17, 0x2, {0x7, './file0'}}, 0xfffffdab) 582.766076ms ago: executing program 3 (id=96): capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x81, 0xfffffffb}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_SETMODE(r0, 0x80085610, &(0x7f0000001180)={0x1, 0x5, 0x9, 0x4bb, 0x3}) 482.024882ms ago: executing program 1 (id=97): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000500), r0) sendmsg$NFC_CMD_DEV_DOWN(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="210026bd7000fddbdf2503000000080001"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x40) 397.464887ms ago: executing program 3 (id=98): r0 = open(&(0x7f0000000000)='./file0\x00', 0x80140, 0x38) fcntl$setlease(r0, 0x400, 0x1) close_range(r0, 0xffffffffffffffff, 0x0) 381.835228ms ago: executing program 0 (id=99): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000006c0)={[{@orlov}, {@noauto_da_alloc}, {@inlinecrypt}, {@dioread_lock}, {@data_err_ignore}, {@barrier_val={'barrier', 0x3d, 0x7}}, {@data_err_ignore}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@resuid}, {@errors_remount}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r0 = open(&(0x7f0000000140)='./file1\x00', 0x141042, 0x0) fallocate(r0, 0x8, 0xf5, 0x10000) 344.51937ms ago: executing program 1 (id=100): sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="500000000001010400000000141a000002000010240001801400018008000100e000000108000200e00000010c0002800500010000000000180002801400018008"], 0x50}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a1b000000000000000000050000000900010073797a30000000000900030073797a300000000008000a400000000328000480080002400000001208"], 0xa4}}, 0x0) 327.99875ms ago: executing program 3 (id=101): rename(0x0, &(0x7f0000000080)='./bus\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)='2', 0x1}, {&(0x7f0000000080)='-6', 0x3f}], 0x2) 201.837188ms ago: executing program 3 (id=102): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4401e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0x4}, 0x4140, 0x4, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4e0, 0x0, 0x18c, 0x203, 0x320, 0x19030000, 0x410, 0x2e0, 0x2e0, 0x410, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x320, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xe}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x3}, {0x2, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x8}, {}, {0x16}, {0x0, 0xff}, {}, {0x7}, {0x0, 0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0x101}, {}, {0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x9}, {0xfffc, 0x0, 0x0, 0x6}, {}, {0xfffe}, {}, {}, {}, {0xfffe, 0xfb}, {}, {0x7a04}, {}, {}, {0x20, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x800}, {}, {0xb8c, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {0x3}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0xfd}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0xb}, {0x4, 0x2}]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x2, 'syz0\x00', {0x8001}}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz0\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 159.595601ms ago: executing program 1 (id=103): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x20000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8003}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x240008c4}, 0x4054) 73.814496ms ago: executing program 3 (id=104): sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x4, 0x8001, 0x0, 0xb49, 0x200000000002, 0x5, 0x8, 0x3}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) 70.097776ms ago: executing program 2 (id=105): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x48, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @socket={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0xb}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SOCKET_LEVEL={0x8, 0x3, 0x89}]}}}, {0x18, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xc}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x9c}}, 0x0) 44.004368ms ago: executing program 0 (id=106): setresgid(0xee01, 0xffffffffffffffff, 0xffffffffffffffff) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) setgid(0x0) 36.640628ms ago: executing program 2 (id=107): r0 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000180)={r1, r0, 0x9, 0x0, 0x0, 0x9, 0x8b, 0x6, 0x5508, 0xa35, 0x3, 0x5, 'syz0\x00'}) 10.134239ms ago: executing program 2 (id=108): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 0s ago: executing program 3 (id=109): futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0x400000) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000)=0x1, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.140' (ED25519) to the list of known hosts. [ 34.360174][ T29] audit: type=1400 audit(1770623007.938:62): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 34.383431][ T29] audit: type=1400 audit(1770623007.958:63): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.385887][ T3301] cgroup: Unknown subsys name 'net' [ 34.411436][ T29] audit: type=1400 audit(1770623007.988:64): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.529242][ T3301] cgroup: Unknown subsys name 'cpuset' [ 34.535567][ T3301] cgroup: Unknown subsys name 'rlimit' [ 34.687520][ T29] audit: type=1400 audit(1770623008.258:65): avc: denied { setattr } for pid=3301 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.710911][ T29] audit: type=1400 audit(1770623008.268:66): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.731462][ T29] audit: type=1400 audit(1770623008.268:67): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.751868][ T29] audit: type=1400 audit(1770623008.268:68): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.773686][ T29] audit: type=1400 audit(1770623008.288:69): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.798864][ T29] audit: type=1400 audit(1770623008.288:70): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 34.822480][ T29] audit: type=1400 audit(1770623008.298:71): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 34.845000][ T3304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.900708][ T3301] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 36.729971][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 36.784002][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 36.815255][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.822429][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.829982][ T3314] bridge_slave_0: entered allmulticast mode [ 36.836570][ T3314] bridge_slave_0: entered promiscuous mode [ 36.854640][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 36.864048][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.871223][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.878386][ T3314] bridge_slave_1: entered allmulticast mode [ 36.884973][ T3314] bridge_slave_1: entered promiscuous mode [ 36.929864][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.940271][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.984670][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 37.005157][ T3314] team0: Port device team_slave_0 added [ 37.025237][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.032445][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.039720][ T3317] bridge_slave_0: entered allmulticast mode [ 37.046138][ T3317] bridge_slave_0: entered promiscuous mode [ 37.053695][ T3314] team0: Port device team_slave_1 added [ 37.059391][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.066501][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.073796][ T3317] bridge_slave_1: entered allmulticast mode [ 37.080329][ T3317] bridge_slave_1: entered promiscuous mode [ 37.096719][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.103828][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.111084][ T3321] bridge_slave_0: entered allmulticast mode [ 37.117578][ T3321] bridge_slave_0: entered promiscuous mode [ 37.126491][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.134090][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.141402][ T3321] bridge_slave_1: entered allmulticast mode [ 37.147914][ T3321] bridge_slave_1: entered promiscuous mode [ 37.185679][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.192703][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.218766][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.232421][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.239457][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.265679][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.286843][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.300668][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 37.315016][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.325191][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.332379][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.340086][ T3313] bridge_slave_0: entered allmulticast mode [ 37.346831][ T3313] bridge_slave_0: entered promiscuous mode [ 37.354495][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.376480][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.390709][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.397859][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.405155][ T3313] bridge_slave_1: entered allmulticast mode [ 37.411895][ T3313] bridge_slave_1: entered promiscuous mode [ 37.429288][ T3314] hsr_slave_0: entered promiscuous mode [ 37.435441][ T3314] hsr_slave_1: entered promiscuous mode [ 37.459094][ T3317] team0: Port device team_slave_0 added [ 37.480706][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.496004][ T3317] team0: Port device team_slave_1 added [ 37.507103][ T3321] team0: Port device team_slave_0 added [ 37.513839][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.538798][ T3321] team0: Port device team_slave_1 added [ 37.553745][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.560791][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.586807][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.600558][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.607541][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.633620][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.665466][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.672678][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.680097][ T3316] bridge_slave_0: entered allmulticast mode [ 37.686499][ T3316] bridge_slave_0: entered promiscuous mode [ 37.697173][ T3313] team0: Port device team_slave_0 added [ 37.703316][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.710394][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.736392][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.750554][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.757532][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.783523][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.794359][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.801563][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.808998][ T3316] bridge_slave_1: entered allmulticast mode [ 37.815301][ T3316] bridge_slave_1: entered promiscuous mode [ 37.831954][ T3313] team0: Port device team_slave_1 added [ 37.852238][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.873500][ T3317] hsr_slave_0: entered promiscuous mode [ 37.882388][ T3317] hsr_slave_1: entered promiscuous mode [ 37.888252][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 37.894070][ T3317] Cannot create hsr debugfs directory [ 37.913875][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.934234][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.941236][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.967225][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.992668][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.999698][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.025683][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.044669][ T3316] team0: Port device team_slave_0 added [ 38.070796][ T3316] team0: Port device team_slave_1 added [ 38.090930][ T3321] hsr_slave_0: entered promiscuous mode [ 38.096852][ T3321] hsr_slave_1: entered promiscuous mode [ 38.102804][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 38.108644][ T3321] Cannot create hsr debugfs directory [ 38.133927][ T3313] hsr_slave_0: entered promiscuous mode [ 38.139981][ T3313] hsr_slave_1: entered promiscuous mode [ 38.145814][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 38.151585][ T3313] Cannot create hsr debugfs directory [ 38.180649][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.187684][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.213806][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.240527][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.247508][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.273490][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.316395][ T3314] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 38.328598][ T3314] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 38.340034][ T3314] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 38.361769][ T3314] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 38.386874][ T3316] hsr_slave_0: entered promiscuous mode [ 38.393233][ T3316] hsr_slave_1: entered promiscuous mode [ 38.399372][ T3316] debugfs: 'hsr0' already exists in 'hsr' [ 38.405106][ T3316] Cannot create hsr debugfs directory [ 38.486405][ T3317] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 38.495027][ T3317] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 38.513812][ T3317] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 38.522733][ T3317] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 38.564710][ T3321] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 38.579212][ T3321] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 38.601633][ T3321] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 38.611210][ T3321] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 38.620438][ T3313] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 38.630420][ T3313] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 38.639951][ T3313] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 38.649827][ T3313] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 38.691309][ T3316] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 38.708486][ T3316] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 38.717467][ T3316] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 38.726849][ T3316] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 38.740026][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.776732][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.804172][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.811272][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.826162][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.837124][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.844422][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.863919][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.887605][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.894726][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.908085][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.920617][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.927882][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.951877][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.978333][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.993442][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.003968][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.011109][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.025251][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.032418][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.046595][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.058017][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.088570][ T1676] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.095830][ T1676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.107806][ T1676] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.114892][ T1676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.141212][ T3321] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 39.151762][ T3321] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.165382][ T1676] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.172590][ T1676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.182515][ T1676] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.189690][ T1676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.226641][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.256639][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.344649][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.378515][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.412972][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.478672][ T3317] veth0_vlan: entered promiscuous mode [ 39.499523][ T3317] veth1_vlan: entered promiscuous mode [ 39.543384][ T3313] veth0_vlan: entered promiscuous mode [ 39.563258][ T3317] veth0_macvtap: entered promiscuous mode [ 39.572321][ T3313] veth1_vlan: entered promiscuous mode [ 39.585436][ T3317] veth1_macvtap: entered promiscuous mode [ 39.607607][ T3313] veth0_macvtap: entered promiscuous mode [ 39.625731][ T3313] veth1_macvtap: entered promiscuous mode [ 39.634708][ T3314] veth0_vlan: entered promiscuous mode [ 39.646449][ T3321] veth0_vlan: entered promiscuous mode [ 39.657137][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.671260][ T3321] veth1_vlan: entered promiscuous mode [ 39.681772][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.693152][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.708231][ T3314] veth1_vlan: entered promiscuous mode [ 39.716843][ T3316] veth0_vlan: entered promiscuous mode [ 39.723117][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.737994][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.747492][ T3316] veth1_vlan: entered promiscuous mode [ 39.753863][ T31] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.779885][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 39.779902][ T29] audit: type=1400 audit(1770623013.358:85): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.fUIGdz/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.811439][ T29] audit: type=1400 audit(1770623013.358:86): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 39.833622][ T29] audit: type=1400 audit(1770623013.358:87): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.fUIGdz/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 39.859061][ T29] audit: type=1400 audit(1770623013.358:88): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 39.881264][ T29] audit: type=1400 audit(1770623013.358:89): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.fUIGdz/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 39.907949][ T29] audit: type=1400 audit(1770623013.358:90): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.fUIGdz/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.935370][ T29] audit: type=1400 audit(1770623013.358:91): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.956000][ T52] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.965187][ T52] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.969250][ T29] audit: type=1400 audit(1770623013.388:92): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.974312][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.996719][ T29] audit: type=1400 audit(1770623013.388:93): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="gadgetfs" ino=4827 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 40.015385][ T3321] veth0_macvtap: entered promiscuous mode [ 40.036871][ T3317] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 40.052371][ T3321] veth1_macvtap: entered promiscuous mode [ 40.060031][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.073569][ T3314] veth0_macvtap: entered promiscuous mode [ 40.087222][ T29] audit: type=1400 audit(1770623013.658:94): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 40.120296][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.135647][ T3314] veth1_macvtap: entered promiscuous mode [ 40.152208][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.163645][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.177733][ T3316] veth0_macvtap: entered promiscuous mode [ 40.192313][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.212310][ T3316] veth1_macvtap: entered promiscuous mode [ 40.222717][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.252528][ T3445] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.263024][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.283748][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.292891][ T3445] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.303240][ T3445] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.344914][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.366291][ T3445] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.424296][ T3445] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.455771][ T3445] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.492858][ T3445] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.532260][ T3445] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.561174][ T871] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.570988][ T3511] process 'syz.2.14' launched '/dev/fd/3' with NULL argv: empty string added [ 40.604947][ T871] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.635677][ T871] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.649211][ T871] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.715832][ T3527] netlink: 4 bytes leftover after parsing attributes in process `syz.4.21'. [ 40.900575][ T3552] netlink: 24 bytes leftover after parsing attributes in process `syz.3.33'. [ 40.998957][ T3565] capability: warning: `syz.0.41' uses deprecated v2 capabilities in a way that may be insecure [ 41.137009][ T3583] loop4: detected capacity change from 0 to 512 [ 41.158587][ T3583] ======================================================= [ 41.158587][ T3583] WARNING: The mand mount option has been deprecated and [ 41.158587][ T3583] and is ignored by this kernel. Remove the mand [ 41.158587][ T3583] option from the mount to silence this warning. [ 41.158587][ T3583] ======================================================= [ 41.196284][ T3587] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 41.215473][ T3583] EXT4-fs: Ignoring removed nobh option [ 41.222058][ T3583] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 41.258341][ T3583] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=8842e02c, mo2=0002] [ 41.288630][ T3583] EXT4-fs (loop4): orphan cleanup on readonly fs [ 41.299799][ T3583] EXT4-fs error (device loop4): ext4_clear_blocks:876: inode #11: comm syz.4.48: attempt to clear invalid blocks 1024 len 1 [ 41.320392][ T3590] xt_CT: No such helper "pptp" [ 41.320416][ T3583] EXT4-fs (loop4): Remounting filesystem read-only [ 41.332781][ T3583] EXT4-fs (loop4): 1 truncate cleaned up [ 41.339519][ T3583] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000007 ro without journal. Quota mode: none. [ 41.450562][ T3607] loop2: detected capacity change from 0 to 1024 [ 41.455672][ T3606] loop1: detected capacity change from 0 to 164 [ 41.466221][ T3607] EXT4-fs: inline encryption not supported [ 41.473695][ T3607] EXT4-fs: Ignoring removed bh option [ 41.479176][ T3607] EXT4-fs: Ignoring removed bh option [ 41.487808][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000007. [ 41.510066][ T3606] Unable to read rock-ridge attributes [ 41.532275][ T3612] loop3: detected capacity change from 0 to 128 [ 41.539312][ T3612] EXT4-fs warning (device loop3): ext4_init_metadata_csum:4637: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 41.552811][ T3612] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (fffc1829) [ 41.574191][ T3606] Unable to read rock-ridge attributes [ 41.593211][ T3607] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=c857c018, mo2=0002] [ 41.600657][ T3606] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 41.629445][ T3607] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.695339][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.821199][ T3640] loop4: detected capacity change from 0 to 256 [ 41.856260][ T3640] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 41.923752][ T3654] loop3: detected capacity change from 0 to 128 [ 41.930150][ T3640] FAT-fs (loop4): error, fat_bmap_cluster: request beyond EOF (i_pos 196) [ 41.938783][ T3640] FAT-fs (loop4): Filesystem has been set read-only [ 41.989097][ T3654] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 42.022690][ T3654] ext4 filesystem being mounted at /17/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 42.079395][ T3321] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 42.183478][ T3674] netlink: 'syz.4.90': attribute type 21 has an invalid length. [ 42.202086][ T3669] netlink: 'syz.0.88': attribute type 2 has an invalid length. [ 42.268464][ T3680] loop0: detected capacity change from 0 to 512 [ 42.306729][ T3680] EXT4-fs error (device loop0): ext4_iget_extra_inode:5073: inode #15: comm syz.0.93: corrupted in-inode xattr: e_name out of bounds [ 42.320813][ T3685] loop4: detected capacity change from 0 to 512 [ 42.333736][ T3680] EXT4-fs error (device loop0): ext4_orphan_get:1396: comm syz.0.93: couldn't read orphan inode 15 (err -117) [ 42.349126][ T3680] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.353267][ T3685] EXT4-fs: Ignoring removed nobh option [ 42.446261][ T3685] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 42.459556][ T3685] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 42.481829][ T3689] netlink: 24 bytes leftover after parsing attributes in process `syz.1.97'. [ 42.508326][ T3316] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.587910][ T3685] EXT4-fs warning (device loop4): ext4_expand_extra_isize_ea:2858: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 42.605864][ T3694] loop0: detected capacity change from 0 to 1024 [ 42.615172][ T3698] netlink: 'syz.1.100': attribute type 1 has an invalid length. [ 42.657846][ T3694] EXT4-fs: Ignoring removed orlov option [ 42.663789][ T3694] EXT4-fs: inline encryption not supported [ 42.688762][ T3685] EXT4-fs (loop4): 1 truncate cleaned up [ 42.711803][ T3685] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.742859][ T3694] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.762228][ T3705] 8021q: adding VLAN 0 to HW filter on device ipvlan2 [ 42.789957][ T3705] bond0: (slave ipvlan2): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 42.861816][ T3316] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.919142][ T3001] ================================================================== [ 42.927291][ T3001] BUG: KCSAN: data-race in d_make_discardable / lookup_fast [ 42.934664][ T3001] [ 42.937025][ T3001] write to 0xffff88811ac05180 of 4 bytes by task 3306 on cpu 0: [ 42.944691][ T3001] d_make_discardable+0x4f/0xa0 [ 42.949605][ T3001] simple_unlink+0x68/0x80 [ 42.954074][ T3001] shmem_unlink+0x12d/0x140 [ 42.958613][ T3001] vfs_unlink+0x28b/0x440 [ 42.962974][ T3001] do_unlinkat+0x1e2/0x4b0 [ 42.967421][ T3001] __x64_sys_unlink+0x2e/0x40 [ 42.972130][ T3001] x64_sys_call+0x2f48/0x3000 [ 42.976842][ T3001] do_syscall_64+0xc0/0x2a0 [ 42.981376][ T3001] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.987295][ T3001] [ 42.989631][ T3001] read to 0xffff88811ac05180 of 4 bytes by task 3001 on cpu 1: [ 42.997192][ T3001] lookup_fast+0xf0/0x320 [ 43.001553][ T3001] path_lookupat+0x15c/0x500 [ 43.006171][ T3001] filename_lookup+0x190/0x390 [ 43.010958][ T3001] do_readlinkat+0x7d/0x340 [ 43.015491][ T3001] __x64_sys_readlink+0x47/0x60 [ 43.020543][ T3001] x64_sys_call+0x2af1/0x3000 [ 43.025342][ T3001] do_syscall_64+0xc0/0x2a0 [ 43.029877][ T3001] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.035816][ T3001] [ 43.038158][ T3001] value changed: 0x08300080 -> 0x00004080 [ 43.043885][ T3001] [ 43.046228][ T3001] Reported by Kernel Concurrency Sanitizer on: [ 43.052408][ T3001] CPU: 1 UID: 0 PID: 3001 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 43.061718][ T3001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 43.071805][ T3001] ================================================================== [ 43.130414][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000.