last executing test programs: 715.822035ms ago: executing program 3 (id=4): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0xb, &(0x7f0000000000)=[@ioring_restriction_register_op], 0x1) io_uring_setup(0x7539, &(0x7f0000000840)={0x0, 0xfb44, 0x1000, 0x2, 0x1d8}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x80, 0x0) io_uring_setup(0x2c95, &(0x7f0000000100)={0x0, 0x997c, 0x10008, 0x2, 0x3e5, 0x0, r1}) syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) r3 = syz_io_uring_setup(0x1e1d, &(0x7f0000000200)={0x0, 0x400086fc, 0x1000, 0x1, 0x0, 0x0, r1}, &(0x7f0000000280)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r4, r5, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x4, 0x0, 0x0, 0x22}) io_uring_enter(r3, 0x48ed, 0x0, 0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r6 = socket(0x3b, 0x3, 0x3a) r7 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r7, &(0x7f0000e15000)={0x2, 0x4e20, @multicast1}, 0x2e) listen(r7, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000000)='batadv_slave_1\x00', 0x10) r8 = socket$inet(0x2, 0x1, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000180)='system_u:object_r:root_t:s0\x00', 0x1c) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0500000005000000fd09000084"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000000c0)={0x0, &(0x7f00000012c0)=""/54, 0x0, 0x0, 0x3, r9}, 0x38) bind$inet(r8, &(0x7f0000e15000)={0x2, 0x4e20, @multicast1}, 0x10) listen(r8, 0x0) r10 = socket(0x10, 0x3, 0x0) recvfrom$inet_nvme(r10, 0x0, 0x0, 0x20, 0x0, 0x0) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001e008d2a00"], 0x1c}}, 0x4008800) ioctl$SIOCGIFMTU(r6, 0x8921, &(0x7f0000000080)={'pimreg\x00'}) 634.681129ms ago: executing program 1 (id=2): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@errors_remount}, {@min_batch_time={'min_batch_time', 0x3d, 0xd}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@data_err_ignore}, {@dioread_lock}]}, 0x3, 0x44d, &(0x7f0000001080)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2141, 0x59) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x401, 0x20000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8003}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0000e3}, 0x4054) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@private2}}, &(0x7f0000000000)=0xe8) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0xb, &(0x7f00000000c0)=0xfffffffc, 0x4) sendmmsg$inet(r3, &(0x7f0000000800)=[{{&(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x2400c0a2) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) read$usbmon(r0, &(0x7f00000003c0), 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000280)={0x17, 0x9, 0x6, 0x13, 0xa, 0x100, 0x4, 0x131, 0xffffffffffffffff}) writev(r3, &(0x7f0000000380)=[{&(0x7f00000005c0)="b018", 0x2}], 0x1) quotactl_fd$Q_GETNEXTQUOTA(r0, 0xffffffff80000900, r2, &(0x7f00000000c0)) pwrite64(r0, &(0x7f0000000140)="f6", 0xffffff07, 0x8000c61) 327.778144ms ago: executing program 1 (id=6): r0 = syz_mount_image$ext4(&(0x7f00000007c0)='ext4\x00', &(0x7f0000000800)='./file0\x00', 0x0, &(0x7f0000000840), 0x1, 0x79e, &(0x7f0000000880)="$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") seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = open(&(0x7f0000000080)='./file1\x00', 0x64842, 0x86) fchmod(r1, 0xcc) ioctl$XFS_IOC_INUMBERS(r0, 0x80405880, &(0x7f0000000000)={{0x7f, 0x2, 0x1cc, 0xe66, 0x919c}, [{0x1, 0x7fffffff, 0x0, 0xe}, {0x2, 0x1, 0x9, 0xd}]}) 323.989024ms ago: executing program 2 (id=3): r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'syzkaller0\x00', {0x2, 0x4e22, @private=0xa010102}}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @private, @empty}, &(0x7f0000000140)=0xc) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, r2, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) bind$xdp(r1, &(0x7f0000000280)={0x2c, 0x0, r3, 0x27, r1}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f00000002c0)={0x0, "576479ce00c63e677f613b9d5662b4b1"}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000012c0)={r4, 0x5, 0x0, [0x251, 0x2, 0x7, 0x9, 0x6], [0x977e, 0xa, 0xe2e3, 0x9, 0x73b4, 0xf5d, 0x8, 0x80000001, 0x7d8, 0x9, 0xdba6, 0x8001, 0x2, 0x7, 0xfffffffffffffff9, 0x7, 0x2, 0x5091, 0x7, 0x5, 0xfffffffffffffcfb, 0x1, 0xff, 0x2, 0x80000001, 0x5, 0x1, 0x9, 0x8, 0x3, 0x662, 0xffffffffffffffff, 0x8, 0x2, 0x6995, 0x0, 0x0, 0x48, 0x2, 0x2, 0x1000, 0x2, 0x1, 0xfffffffffffffffd, 0x2, 0x4, 0x2, 0xffe0000000000000, 0x9, 0x34f18749, 0x5, 0x7, 0x50eca0f8, 0x8000, 0x0, 0xe828000000000000, 0x80000001, 0xfff, 0x4, 0x3b, 0x5, 0x1, 0xffff, 0x56b3, 0x9, 0xfffffffffffff801, 0x9, 0x2, 0x1, 0xffff, 0x6, 0x7ff, 0x9, 0x10, 0x6, 0xfffffffffffffff8, 0x4, 0x4e95, 0x4, 0xfffffffffffffffd, 0x2367, 0x1, 0x5, 0x80000001, 0x5, 0x2, 0x80000000, 0x200, 0x1000, 0x9c4e, 0x1, 0x5, 0x100, 0xb10, 0x8, 0x7fffffffffffffff, 0x6, 0x6, 0xffffffffffffff2f, 0x6, 0x7, 0xffff, 0xab76, 0xff, 0x9f5, 0x0, 0xe, 0x9, 0xffffffffffffffff, 0x1, 0x7f, 0xffffffffffffff01, 0xf, 0x8, 0x1, 0x7, 0x100, 0x7, 0x44d, 0x71c5, 0x8]}) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000001700)={0x0, 0x6}, 0x8) syz_emit_ethernet(0x71, &(0x7f0000001740)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @remote, @val={@val={0x88a8, 0x4, 0x0, 0x3}, {0x8100, 0x0, 0x1}}, {@generic={0x8100, "0a609b6dc5d685266998fec93d718b21f6242e9e7e8a3a0d9dabe21ca2bef7a3161d40c6ba79c7e003e0f2da3e57853e134446f34dfa61e9ea5bf82b8fb1fafcce8658b08296dc777d7e50e159433dbaf9a629d7f8b7217b884d35"}}}, &(0x7f00000017c0)={0x0, 0x2, [0x7a2, 0xee4, 0xda7, 0x6c9]}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001800)={0x0, 0x2, 0xffffffffffffee1e, 0x6}) sendmsg$NFT_MSG_GETGEN(r1, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x7}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40448c8}, 0x20000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001940)={'vcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000001a00)={'ip6tnl0\x00', &(0x7f0000001980)={'syztnl1\x00', r5, 0x0, 0x6, 0xa, 0x80000001, 0x40, @loopback, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1, 0x7800, 0x8, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000001a80)={'sit0\x00', &(0x7f0000001a40)={@loopback, @broadcast, 0x8, 0xe}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001ac0)={0x0}, &(0x7f0000001b00)=0xc) timer_create(0x2, &(0x7f0000001b40)={0x0, 0x3a, 0x4, @tid=r7}, &(0x7f0000001b80)) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$cgroup_devices(r1, &(0x7f0000001bc0)='devices.allow\x00', 0x2, 0x0) poll(&(0x7f0000001c00)=[{r0, 0x2200}, {r8, 0x8084}, {r1, 0x128}, {r0, 0x824}, {r1, 0x4100}, {r9, 0x4020}, {r0, 0x8008}, {r0, 0x10}, {r1, 0xa280}], 0x9, 0x5) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000001cc0)={'vcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f0000001f00)={&(0x7f0000001c80)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001d00)={0x1a0, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4840) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) setxattr$trusted_overlay_upper(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80), &(0x7f0000001fc0)={0x0, 0xfb, 0x25, 0x1, 0x1, "09fd5cf1989530af2f787a0593b53286", "f0e89697b9cf164da789f76346759f55"}, 0x25, 0x2) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000002000)=0x130, 0x4) r11 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCALLUSERDATA(r11, 0x89e5, &(0x7f0000002040)={0x80, "b8758ca21ca020b019dbba932d6cb52eaebb881ae109857893a9ab963935ed91081c7814006031a252f3b285119f702fc06fedca43adc72584c4a34a70b224ccfea5cfa41541894092a0eb5c3740c4daef3366cdaecbff3d050e85a75b3af897454ed6301c2ad88067b2b035dbdbed5b54a2293415419e686fc56e58108aad06"}) socket(0xe, 0x80000, 0x0) 310.787615ms ago: executing program 0 (id=1): openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x8, 0x7}, 0x0, 0x0, 0x0, 0x7, 0x5, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400000010000104000000000000000000000006", @ANYRES32=0x0, @ANYBLOB="0028f00008bc872f00000000180012ffc05b47091651fad28178f87b00"/52], 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_ethernet(0x6e, &(0x7f00000007c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="c437b78cb64c", @void, {@ipv6={0x86dd, @icmpv6={0x9, 0x6, '@\x00', 0x38, 0x3a, 0xff, @ipv4={'\x00', '\xff\xff', @multicast2}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x8, {0x2, 0x6, "1611be", 0x81, 0x3a, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x2b}, [@srh={0x5c, 0x0, 0x4, 0x0, 0xfd, 0x78}]}}}}}}}, 0x0) 128.836394ms ago: executing program 2 (id=7): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e5000000000000000018010000202070250000000067a500007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e334185850000007300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 60.010147ms ago: executing program 2 (id=8): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@usrjquota}, {@auto_da_alloc}, {@init_itable}, {@nodioread_nolock}, {@journal_checksum}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}]}, 0x1, 0x587, &(0x7f0000000940)="$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") socket$netlink(0x10, 0x3, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x4000, &(0x7f0000000240)={[{@noinit_itable}]}, 0x1, 0x512, &(0x7f0000000c40)="$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") syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000100)={0xffffffffffffffff, r6}, 0xffffff1a) r7 = add_key(&(0x7f00000028c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) request_key(&(0x7f0000002800)='dns_resolver\x00', &(0x7f0000002840)={'syz', 0x1}, &(0x7f0000000000)='\x00', r7) r8 = socket(0x2, 0x80805, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000240)={0x84, @rand_addr=0x64010102, 0x4e20, 0x3, 'wlc\x00', 0x0, 0xa7e, 0x70}, 0x2c) setsockopt$IP_VS_SO_SET_ADDDEST(r8, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010101, 0x4f29, 0x3, 'nq\x00', 0x5, 0x4, 0x6c}, {@loopback, 0x4e23, 0x4, 0xcd, 0x1}}, 0x44) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0xfd}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18, 0x2000000}, 0x0) 11.03735ms ago: executing program 1 (id=9): socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x652c0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0xec, 0x7, 0x40, 0x8, 0x0, 0x0, 0xd000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x2, @perf_bp={0x0, 0x2}, 0x986, 0x7, 0x4, 0x0, 0x81, 0x9, 0x81, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)="4c0000001200ff09ff3a150099a283ff04b8008000f0ffff0000000600401500240036001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab14e39ba9bf6c4387ea1b", 0x4c}], 0x1}, 0x0) socket$packet(0x11, 0x3, 0x300) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(0xffffffffffffffff) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x652c0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0xec, 0x7, 0x40, 0x8, 0x0, 0x0, 0xd000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x2, @perf_bp={0x0, 0x2}, 0x986, 0x7, 0x4, 0x0, 0x81, 0x9, 0x81, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) socket$inet(0x10, 0x3, 0x0) (async) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)="4c0000001200ff09ff3a150099a283ff04b8008000f0ffff0000000600401500240036001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab14e39ba9bf6c4387ea1b", 0x4c}], 0x1}, 0x0) (async) 0s ago: executing program 4 (id=5): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x5}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0xffffffff, {0x4}}}, 0x48}}, 0x4040) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.189' (ED25519) to the list of known hosts. [ 26.724959][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 26.724976][ T28] audit: type=1400 audit(1774183760.209:70): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.753978][ T28] audit: type=1400 audit(1774183760.239:71): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.754671][ T3299] cgroup: Unknown subsys name 'net' [ 26.781688][ T28] audit: type=1400 audit(1774183760.269:72): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.939686][ T3299] cgroup: Unknown subsys name 'cpuset' [ 26.945863][ T3299] cgroup: Unknown subsys name 'rlimit' [ 27.065587][ T28] audit: type=1400 audit(1774183760.549:73): avc: denied { setattr } for pid=3299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.089975][ T3301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 27.107079][ T28] audit: type=1400 audit(1774183760.549:74): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.128193][ T28] audit: type=1400 audit(1774183760.549:75): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.141652][ T3299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.148896][ T28] audit: type=1400 audit(1774183760.549:76): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.178139][ T28] audit: type=1400 audit(1774183760.549:77): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.203223][ T28] audit: type=1400 audit(1774183760.549:78): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 27.226928][ T28] audit: type=1400 audit(1774183760.579:79): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 28.919727][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 29.024348][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.031539][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.038622][ T3310] bridge_slave_0: entered allmulticast mode [ 29.044956][ T3310] bridge_slave_0: entered promiscuous mode [ 29.051573][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.058701][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.065999][ T3310] bridge_slave_1: entered allmulticast mode [ 29.072321][ T3310] bridge_slave_1: entered promiscuous mode [ 29.084566][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 29.101377][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 29.133877][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.147669][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.197426][ T3310] team0: Port device team_slave_0 added [ 29.205846][ T3310] team0: Port device team_slave_1 added [ 29.213881][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 29.224876][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 29.267153][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.274468][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.281796][ T3315] bridge_slave_0: entered allmulticast mode [ 29.288182][ T3315] bridge_slave_0: entered promiscuous mode [ 29.298939][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.306079][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.313201][ T3315] bridge_slave_1: entered allmulticast mode [ 29.319694][ T3315] bridge_slave_1: entered promiscuous mode [ 29.326520][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.333604][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.359566][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.375162][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.382261][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.408369][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.425301][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.432392][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.439603][ T3314] bridge_slave_0: entered allmulticast mode [ 29.446194][ T3314] bridge_slave_0: entered promiscuous mode [ 29.456942][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.464164][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.471412][ T3314] bridge_slave_1: entered allmulticast mode [ 29.478086][ T3314] bridge_slave_1: entered promiscuous mode [ 29.505969][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.527184][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.537283][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.568335][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.575600][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.583078][ T3321] bridge_slave_0: entered allmulticast mode [ 29.591734][ T3321] bridge_slave_0: entered promiscuous mode [ 29.599042][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.608253][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.615488][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.622805][ T3321] bridge_slave_1: entered allmulticast mode [ 29.629471][ T3321] bridge_slave_1: entered promiscuous mode [ 29.640469][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.647623][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.655055][ T3311] bridge_slave_0: entered allmulticast mode [ 29.661889][ T3311] bridge_slave_0: entered promiscuous mode [ 29.677143][ T3315] team0: Port device team_slave_0 added [ 29.687804][ T3315] team0: Port device team_slave_1 added [ 29.695494][ T3310] hsr_slave_0: entered promiscuous mode [ 29.701719][ T3310] hsr_slave_1: entered promiscuous mode [ 29.707739][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.714994][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.722214][ T3311] bridge_slave_1: entered allmulticast mode [ 29.728428][ T3311] bridge_slave_1: entered promiscuous mode [ 29.749114][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.763434][ T3314] team0: Port device team_slave_0 added [ 29.774952][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.793211][ T3321] team0: Port device team_slave_0 added [ 29.807533][ T3314] team0: Port device team_slave_1 added [ 29.823831][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.830917][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.857604][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.869077][ T3321] team0: Port device team_slave_1 added [ 29.876080][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.889873][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.896834][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.923027][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.934324][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.941576][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.967663][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.986855][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.999593][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.006715][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.033187][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.060140][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.067115][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.093322][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.106975][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.114050][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.140609][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.175939][ T3311] team0: Port device team_slave_0 added [ 30.182589][ T3311] team0: Port device team_slave_1 added [ 30.194201][ T3315] hsr_slave_0: entered promiscuous mode [ 30.200325][ T3315] hsr_slave_1: entered promiscuous mode [ 30.206311][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 30.212131][ T3315] Cannot create hsr debugfs directory [ 30.250131][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.257241][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.283455][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.300974][ T3321] hsr_slave_0: entered promiscuous mode [ 30.307113][ T3321] hsr_slave_1: entered promiscuous mode [ 30.313014][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 30.319065][ T3321] Cannot create hsr debugfs directory [ 30.332073][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.339178][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.365626][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.391487][ T3314] hsr_slave_0: entered promiscuous mode [ 30.397892][ T3314] hsr_slave_1: entered promiscuous mode [ 30.403967][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 30.409745][ T3314] Cannot create hsr debugfs directory [ 30.497405][ T3311] hsr_slave_0: entered promiscuous mode [ 30.503698][ T3311] hsr_slave_1: entered promiscuous mode [ 30.509803][ T3311] debugfs: 'hsr0' already exists in 'hsr' [ 30.515559][ T3311] Cannot create hsr debugfs directory [ 30.521245][ T3310] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.541812][ T3310] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.556840][ T3310] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.579424][ T3310] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.645278][ T3315] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.654125][ T3315] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.676981][ T3315] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.690606][ T3315] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.706649][ T3321] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.716427][ T3321] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.726079][ T3321] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.734969][ T3321] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.781660][ T3314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.799433][ T3314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.808112][ T3314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.817228][ T3314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.835623][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.873443][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.882382][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.896557][ T3311] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.905355][ T3311] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.914482][ T3311] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.927367][ T3311] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 30.940374][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.947522][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.958132][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.970545][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.977584][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.996436][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.003590][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.014015][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.021087][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.035962][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.066438][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.077013][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.093562][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.116937][ T399] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.124030][ T399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.147294][ T399] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.154463][ T399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.172576][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.183532][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.190674][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.199564][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.206629][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.226510][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.236866][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.244000][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.265851][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.272984][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.292189][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.308880][ T3314] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.320224][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.357933][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.368130][ T3311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.480785][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.505781][ T3315] veth0_vlan: entered promiscuous mode [ 31.522200][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.538748][ T3310] veth0_vlan: entered promiscuous mode [ 31.552679][ T3310] veth1_vlan: entered promiscuous mode [ 31.564489][ T3315] veth1_vlan: entered promiscuous mode [ 31.573600][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.604250][ T3315] veth0_macvtap: entered promiscuous mode [ 31.622491][ T3310] veth0_macvtap: entered promiscuous mode [ 31.632912][ T3315] veth1_macvtap: entered promiscuous mode [ 31.644833][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.655477][ T3310] veth1_macvtap: entered promiscuous mode [ 31.672278][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.690640][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.709834][ T399] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.727826][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.740656][ T399] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.751293][ T399] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.772506][ T399] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.781426][ T399] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.799833][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 31.799849][ T28] audit: type=1400 audit(1774183765.289:90): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.i7u0QY/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 31.836331][ T28] audit: type=1400 audit(1774183765.319:91): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 31.860585][ T28] audit: type=1400 audit(1774183765.319:92): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.i7u0QY/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 31.861155][ T3311] veth0_vlan: entered promiscuous mode [ 31.891953][ T28] audit: type=1400 audit(1774183765.319:93): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 31.916461][ T3315] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.920942][ T3314] veth0_vlan: entered promiscuous mode [ 31.937161][ T28] audit: type=1400 audit(1774183765.319:94): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.i7u0QY/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 31.939043][ T399] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.964545][ T28] audit: type=1400 audit(1774183765.319:95): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.i7u0QY/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4513 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 31.974604][ T399] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.009242][ T28] audit: type=1400 audit(1774183765.319:96): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 32.048221][ T3311] veth1_vlan: entered promiscuous mode [ 32.056106][ T28] audit: type=1400 audit(1774183765.319:97): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 32.060975][ T3314] veth1_vlan: entered promiscuous mode [ 32.102118][ T28] audit: type=1400 audit(1774183765.319:98): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="gadgetfs" ino=4518 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 32.108911][ T399] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.128274][ T28] audit: type=1400 audit(1774183765.579:99): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.175438][ T3314] veth0_macvtap: entered promiscuous mode [ 32.190846][ T3480] loop1: detected capacity change from 0 to 512 [ 32.194327][ T3314] veth1_macvtap: entered promiscuous mode [ 32.207442][ T3480] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 32.223431][ T3311] veth0_macvtap: entered promiscuous mode [ 32.232082][ T3311] veth1_macvtap: entered promiscuous mode [ 32.238155][ T3480] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 32.242405][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.260011][ T3480] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2858: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 32.272738][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.281296][ T3480] EXT4-fs (loop1): 1 truncate cleaned up [ 32.287430][ T3480] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 32.304347][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.330724][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.346447][ T399] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.355773][ T399] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.368893][ T3321] veth0_vlan: entered promiscuous mode [ 32.375473][ T399] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.394153][ T399] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.405219][ T3321] veth1_vlan: entered promiscuous mode [ 32.412196][ T399] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.451783][ T399] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.460921][ T399] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.476221][ T399] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.511092][ T3310] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.528523][ T3321] veth0_macvtap: entered promiscuous mode [ 32.562286][ T3321] veth1_macvtap: entered promiscuous mode [ 32.582084][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.592239][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.623876][ T55] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.636031][ T55] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.662932][ T3495] loop1: detected capacity change from 0 to 2048 [ 32.663284][ T3493] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1'. [ 32.682925][ T3497] Illegal XDP return value 8 on prog (id 1) dev N/A, expect packet loss! [ 32.691874][ T55] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.703592][ T3495] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 32.723333][ T3495] EXT4-fs (loop1): group descriptors corrupted! [ 32.731478][ T40] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.787461][ T3501] loop2: detected capacity change from 0 to 1024 [ 32.809635][ T3405] ================================================================== [ 32.817763][ T3405] BUG: KCSAN: data-race in __mod_timer / __mod_timer [ 32.824488][ T3405] [ 32.826823][ T3405] write to 0xffff88811b82f7f0 of 8 bytes by task 10 on cpu 0: [ 32.834471][ T3405] __mod_timer+0x86a/0x9d0 [ 32.838920][ T3405] mod_timer+0x1f/0x30 [ 32.843016][ T3405] wg_timers_any_authenticated_packet_traversal+0xd0/0x100 [ 32.843465][ T3501] ======================================================= [ 32.843465][ T3501] WARNING: The mand mount option has been deprecated and [ 32.843465][ T3501] and is ignored by this kernel. Remove the mand [ 32.843465][ T3501] option from the mount to silence this warning. [ 32.843465][ T3501] ======================================================= [ 32.850237][ T3405] wg_packet_tx_worker+0xeb/0x330 [ 32.850266][ T3405] process_scheduled_works+0x513/0xa10 [ 32.850292][ T3405] worker_thread+0x58a/0x780 [ 32.850320][ T3405] kthread+0x22a/0x280 [ 32.896663][ T3501] EXT4-fs: test_dummy_encryption option not supported [ 32.900446][ T3405] ret_from_fork+0x150/0x360 [ 32.900484][ T3405] ret_from_fork_asm+0x1a/0x30 [ 32.900512][ T3405] [ 32.900520][ T3405] read to 0xffff88811b82f7f0 of 8 bytes by task 3405 on cpu 1: [ 32.931094][ T3405] __mod_timer+0x69/0x9d0 [ 32.935465][ T3405] mod_timer+0x1f/0x30 [ 32.939721][ T3405] wg_timers_any_authenticated_packet_traversal+0xd0/0x100 [ 32.947022][ T3405] wg_packet_rx_poll+0x7f5/0x10f0 [ 32.952064][ T3405] __napi_poll+0x61/0x330 [ 32.956497][ T3405] napi_threaded_poll_loop+0x1db/0x660 [ 32.961968][ T3405] napi_threaded_poll+0x193/0x240 [ 32.967085][ T3405] kthread+0x22a/0x280 [ 32.971170][ T3405] ret_from_fork+0x150/0x360 [ 32.975776][ T3405] ret_from_fork_asm+0x1a/0x30 [ 32.980550][ T3405] [ 32.983020][ T3405] value changed: 0x00000000ffff9ed3 -> 0x00000000ffff9eda [ 32.990124][ T3405] [ 32.992446][ T3405] Reported by Kernel Concurrency Sanitizer on: [ 32.998595][ T3405] CPU: 1 UID: 0 PID: 3405 Comm: napi/wg2-0 Not tainted syzkaller #0 PREEMPT(full) [ 33.008004][ T3405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 33.018067][ T3405] ================================================================== [ 33.248649][ C0] hrtimer: interrupt took 42161 ns [ 33.352430][ T3510] loop2: detected capacity change from 0 to 512 [ 33.419934][ T3510] EXT4-fs (loop2): 1 orphan inode deleted [ 33.438095][ T3510] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 33.454403][ T3510] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 33.522573][ T1670] EXT4-fs error (device loop2): ext4_release_dquot:7037: comm kworker/u8:7: Failed to release dquot type 1 [ 33.577207][ T10] IPVS: starting estimator thread 0... [ 33.691324][ T3510] syz.2.8 (3510) used greatest stack depth: 9800 bytes left [ 33.698789][ T3514] IPVS: using max 2688 ests per chain, 134400 per kthread [ 34.489838][ T3311] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.