last executing test programs: 340.560745ms ago: executing program 3 (id=4): r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000280)='./bus\x00', 0x4000, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000", @ANYRES64, @ANYRES32, @ANYRESHEX, @ANYRESDEC], 0x1, 0x2cb, &(0x7f0000000ac0)="$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") r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_gettime(r2, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000003c0)='kmem_cache_free\x00', r3}, 0x18) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000ec0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = syz_open_procfs(r1, &(0x7f00000042c0)='net\x00') r7 = syz_open_dev$sg(0x0, 0x0, 0x18b203) ioctl$SG_GET_ACCESS_COUNT(r7, 0x2289, 0x0) io_setup(0x16f, &(0x7f0000000080)=0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r6, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000940), 0x101080, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r6, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r4, {0x7}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) io_submit(r8, 0x4, &(0x7f0000000e00)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x5, 0x1000, r9, &(0x7f0000000300)="b85e2a563d940818bef0a25f0067baa3013dd8b45cfadb7d45fe805ff189e5b4ebc44e845e79c31a17865c46f39b2a3e6e384975e98b9066b8a2f21a9dad61b33d92ace5f54935caad4bd85f4d07beac8e6407a294faf8d967c159c827560d6228ff64bb7c8e415078eddc75abbb3dcb24c9888414fac9c504ab1a2f112d5e2d60d706d06dbac85e79ecc34ad6c960dfba79e13fe214450bff31a43f2e16caaa0521213ee8f5177ef086ad5c9369b4c651e32032c53be9ef1c1a84b3476cfe", 0xbf, 0x3c, 0x0, 0x1, r6}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f00000008c0)="e7f569c72410b790e0d81272d5bbe42e2d5f9928d8fe3b8917e7c8386de47eaf3c725616cf30eaf98633cf167c7bc1ca05e0f250d626e10662b10241c0af4498557cf759e2780c2000cdc0e4f77529cee29ebe9cb6b7f2fd6442ab22d7127c1bb3f6b7f5715528edc9f2c72705c5b88c78", 0x71, 0x0, 0x0, 0x3, r10}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x98ca3d74c67b612c, 0x5, 0xffffffffffffffff, &(0x7f00000009c0)="8b874c25b6319bf039e37e5f305a4b5a4927149a23239bde47dfc5334845d8567f", 0x21, 0x0, 0x0, 0x1, r6}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x6, 0x3, r11, &(0x7f0000000a80)="130454fc150d20a0de099ad10e5ff21af648b6286818a73209bcea7b", 0x1c, 0x3, 0x0, 0x2, r6}]) bpf$MAP_CREATE(0x0, 0x0, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x404, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6e}}, {@user_xattr}, {@lazytime}, {@quota}]}, 0x3, 0x441, &(0x7f0000000440)="$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") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000000000020"], 0x24, 0x0) pread64(r6, &(0x7f0000002240)=""/237, 0xed, 0x4eb) 164.548893ms ago: executing program 0 (id=1): ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x20081e, &(0x7f0000000240)={[{@sb={'sb', 0x3d, 0x401}}, {@nodioread_nolock}, {@grpquota}], [{@hash}, {@euid_eq={'euid', 0x3d, r0}}, {@audit}]}, 0x1, 0x52b, &(0x7f00000002c0)="$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") mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) socket(0x10, 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x3b, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000400000", @ANYRESHEX=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) io_uring_setup(0x68a7, &(0x7f00000003c0)={0x0, 0x0, 0x200, 0x1}) socket$kcm(0x21, 0x2, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000300)={[{@journal_async_commit}]}, 0xea, 0x474, &(0x7f0000000980)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_io_uring_setup(0x113, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4}, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x40, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) shmget$private(0x0, 0x4000, 0x78000000, &(0x7f0000ffc000/0x4000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 117.811105ms ago: executing program 3 (id=6): r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x3, &(0x7f0000000980)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r1, 0x0, 0x401}, 0x11) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) openat$ptp0(0xffffffffffffff9c, 0x0, 0x40001, 0x0) r4 = dup(r3) ioctl$PTP_EXTTS_REQUEST2(r4, 0x40603d10, &(0x7f00000002c0)={0x9, 0x1}) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r4, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, &(0x7f0000000540)=[{}, {}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe0, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) write(r7, &(0x7f0000000000)="fa", 0xfffffdef) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x548, 0x0, 0xffffffff, 0xffffffff, 0x1c0, 0xffffffff, 0x478, 0xffffffff, 0xffffffff, 0x478, 0xffffffff, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x9, 0x0, 0x24, 0x1, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ipv6={@private1={0xfc, 0x1, '\x00', 0x1}, @private2, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff000000], 'netpci0\x00', 'ipvlan0\x00', {}, {0xff}, 0x2b, 0x2, 0x5, 0x5}, 0x0, 0x298, 0x2b8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x1f, 0x1, 0x1, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x8, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a8) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9fff010018000000000000000c0000000c000000020000050000009441ca945e23979d1074eb020000000d000002000000"], 0x0, 0x26, 0x0, 0x1}, 0x68) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x220803, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000900)=""/61) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYRES32=r5, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa203000000aad264cc0000f8fffffdb703000008000000b704000000020000870000000100c5c695"], &(0x7f0000000240)='GPL\x00', 0x8000000, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, &(0x7f00000001c0)=0x8000000, &(0x7f0000000200)=r10}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 15.82846ms ago: executing program 1 (id=2): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/notes', 0x0, 0x10) finit_module(r0, 0x0, 0x7) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES8=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x31, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000340)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[], 0x50) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e21, @empty}, 0x10) pipe2(&(0x7f0000000080), 0x0) sendto$inet(r0, &(0x7f0000000b00)="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", 0x24f, 0x0, 0x0, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x8, 0x94, 0x7fff0000}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6, 0x0, 0xae8}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYRES64], &(0x7f0000000340)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='kfree\x00', r0}, 0x18) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a31000000002c0003800800014000000000180003801400010076657468315f746f5f626f6e6400000008000240000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e657665300000000000000000001400010076657468315f746f5f626f6e64000000080002"], 0x10c}, 0x1, 0x0, 0x0, 0x4000810}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a3200000000050001000700000014000780080013400000000008001240"], 0x64}}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r8}, 0x10) clock_settime(0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="000200000a0500010007000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) close_range(r4, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000580)={r1, 0x0, 0x33, 0x0, &(0x7f0000000340)="eb7ac722699228e449e4d03871ca2ea6005caac924d0b400dcc3bc7bb37f0cb0d38d1c7a3cc2c1aeb66bfc574d5130594ad7ecda79f9e9ecf1dccb44a47124ae23a677cb081b30e1ab35a6baafd4b58081a889cc907a4dcb8403944e869daf165d6bc000"/110, 0x0, 0xd1d, 0x0, 0xa4, 0x0, &(0x7f0000000d80)="59ef261487997bc805b759dc6a245bbf105d41597fba3b2522eea3f54aca3c1123480ecef98e1489af2979abe2e313b10f74eb2b9fa93cb2145df804749c2e58f0b277deb5e2408b16268fa5d86a49f45a8c1de5e7a02b4c772c4dd0a7558d4fb332a13564c3aae51fee1616eac07788f9cb536bea2681b7eb642741e91cc5bd4bce27c91221f80a5641f9a9df29193e7736cd5f44c933330e5032d5ffe452668f77d32cc9f1fc1e24e43fd98cbdd0fab8f3f01862267e77d1a6c938ff7da837dfef8bfac8da118c8138899d84b98ceccbdba639e4f477a9503b4f03c8c44ec1ab100b962bae803319d4595bea20f22486f7237adf1b1d13ec8995b1f2e1c5de9c7d96639b79f8aa41c7be238e313c9468ddf630cc41ea775ecc7a2af4904ca7e19c66a16bc24b40cb6f72773a8651af93743522a02690e9993a41c83b5bd63512164598898d5d4ce92d495df2b3628841cb8d2e71611ac0615b32cad52c79c445f0c43d408ae23a987c6be4702915da5bd694b47b24ad9d2f42b1c4855438245872b79f4f273db63084cdf9dbf49207d2714ae90b5a9d495a863ca53b80954c2add9105212390b9ae05822d16a70adcaeb0ad50e591f69a2cffd46afd1f47fdb5f5c76c54b3ee43e56900"/477, 0x0, 0x2, 0x0, 0x58d7}, 0x50) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 2 (id=3): r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000d40), 0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x68, "979924a62ac049d651808bceba38d8a82c0b96e309b6c325ac005edad51beac44c6e66617ee7f7f64942e342de5f3be8551f54aa83fae797e5935dacb959141092fc569faeea370d9d4eecbeaf0a2727fbb20c7c29928e968d8c9238db875b4e6f75ea2b8e7e75be"}, &(0x7f00000000c0)=0x70) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x74a}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f00000003c0)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x30, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000100)={r2, @in={{0x2, 0x4e20, @remote}}}, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES64=r0], 0xa) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 16.621962][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 16.621979][ T29] audit: type=1400 audit(1764716389.307:57): avc: denied { transition } for pid=3194 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.626662][ T29] audit: type=1400 audit(1764716389.307:58): avc: denied { noatsecure } for pid=3194 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.629529][ T29] audit: type=1400 audit(1764716389.307:59): avc: denied { write } for pid=3194 comm="sh" path="pipe:[2422]" dev="pipefs" ino=2422 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 16.632855][ T29] audit: type=1400 audit(1764716389.307:60): avc: denied { rlimitinh } for pid=3194 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.635506][ T29] audit: type=1400 audit(1764716389.307:61): avc: denied { siginh } for pid=3194 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.11' (ED25519) to the list of known hosts. [ 24.303167][ T29] audit: type=1400 audit(1764716396.987:62): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.326110][ T29] audit: type=1400 audit(1764716397.017:63): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.326708][ T3305] cgroup: Unknown subsys name 'net' [ 24.353901][ T29] audit: type=1400 audit(1764716397.047:64): avc: denied { unmount } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.474564][ T3305] cgroup: Unknown subsys name 'cpuset' [ 24.480622][ T3305] cgroup: Unknown subsys name 'rlimit' [ 24.599534][ T29] audit: type=1400 audit(1764716397.287:65): avc: denied { setattr } for pid=3305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.623887][ T29] audit: type=1400 audit(1764716397.287:66): avc: denied { create } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.644335][ T29] audit: type=1400 audit(1764716397.287:67): avc: denied { write } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.664698][ T29] audit: type=1400 audit(1764716397.287:68): avc: denied { read } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.671943][ T3309] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 24.685109][ T29] audit: type=1400 audit(1764716397.287:69): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.718437][ T29] audit: type=1400 audit(1764716397.287:70): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 24.741732][ T29] audit: type=1400 audit(1764716397.387:71): avc: denied { relabelto } for pid=3309 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.767371][ T3305] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.984768][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 26.066979][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 26.089104][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.096274][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.103393][ T3320] bridge_slave_0: entered allmulticast mode [ 26.109833][ T3320] bridge_slave_0: entered promiscuous mode [ 26.132680][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.139781][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.146881][ T3320] bridge_slave_1: entered allmulticast mode [ 26.153286][ T3320] bridge_slave_1: entered promiscuous mode [ 26.178041][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 26.192328][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.202418][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.240515][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 26.253290][ T3320] team0: Port device team_slave_0 added [ 26.275285][ T3320] team0: Port device team_slave_1 added [ 26.297303][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.304433][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.311587][ T3316] bridge_slave_0: entered allmulticast mode [ 26.317885][ T3316] bridge_slave_0: entered promiscuous mode [ 26.337715][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.344808][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.351971][ T3316] bridge_slave_1: entered allmulticast mode [ 26.358375][ T3316] bridge_slave_1: entered promiscuous mode [ 26.372391][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.379498][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.386616][ T3317] bridge_slave_0: entered allmulticast mode [ 26.393048][ T3317] bridge_slave_0: entered promiscuous mode [ 26.399662][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.406629][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.432523][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.456300][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.463352][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.470448][ T3317] bridge_slave_1: entered allmulticast mode [ 26.476828][ T3317] bridge_slave_1: entered promiscuous mode [ 26.483244][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.490217][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.516244][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.546625][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.555794][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.562878][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.570345][ T3322] bridge_slave_0: entered allmulticast mode [ 26.576672][ T3322] bridge_slave_0: entered promiscuous mode [ 26.589271][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.599293][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.610145][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.617252][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.624543][ T3322] bridge_slave_1: entered allmulticast mode [ 26.630901][ T3322] bridge_slave_1: entered promiscuous mode [ 26.638483][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.647643][ T3328] chnl_net:caif_netlink_parms(): no params data found [ 26.697541][ T3316] team0: Port device team_slave_0 added [ 26.704599][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.715802][ T3320] hsr_slave_0: entered promiscuous mode [ 26.721634][ T3320] hsr_slave_1: entered promiscuous mode [ 26.732105][ T3316] team0: Port device team_slave_1 added [ 26.738341][ T3317] team0: Port device team_slave_0 added [ 26.744973][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.760968][ T3317] team0: Port device team_slave_1 added [ 26.792792][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.799793][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.825736][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.841255][ T3322] team0: Port device team_slave_0 added [ 26.851893][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.858865][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.884858][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.895958][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.902889][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.928814][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.940119][ T3322] team0: Port device team_slave_1 added [ 26.956796][ T3328] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.963935][ T3328] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.971017][ T3328] bridge_slave_0: entered allmulticast mode [ 26.977416][ T3328] bridge_slave_0: entered promiscuous mode [ 26.984257][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.991262][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.017200][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.035922][ T3328] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.043037][ T3328] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.050235][ T3328] bridge_slave_1: entered allmulticast mode [ 27.056642][ T3328] bridge_slave_1: entered promiscuous mode [ 27.088115][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.095097][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.121104][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.144057][ T3328] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.153383][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.160370][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.186297][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.201225][ T3316] hsr_slave_0: entered promiscuous mode [ 27.207176][ T3316] hsr_slave_1: entered promiscuous mode [ 27.213031][ T3316] debugfs: 'hsr0' already exists in 'hsr' [ 27.218810][ T3316] Cannot create hsr debugfs directory [ 27.229783][ T3328] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.262218][ T3317] hsr_slave_0: entered promiscuous mode [ 27.268259][ T3317] hsr_slave_1: entered promiscuous mode [ 27.274078][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 27.279795][ T3317] Cannot create hsr debugfs directory [ 27.286886][ T3328] team0: Port device team_slave_0 added [ 27.311774][ T3328] team0: Port device team_slave_1 added [ 27.337156][ T3322] hsr_slave_0: entered promiscuous mode [ 27.342968][ T3322] hsr_slave_1: entered promiscuous mode [ 27.348907][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 27.354659][ T3322] Cannot create hsr debugfs directory [ 27.370922][ T3328] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.377932][ T3328] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.403841][ T3328] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.426394][ T3328] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.433353][ T3328] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.459353][ T3328] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.539593][ T3328] hsr_slave_0: entered promiscuous mode [ 27.545582][ T3328] hsr_slave_1: entered promiscuous mode [ 27.551523][ T3328] debugfs: 'hsr0' already exists in 'hsr' [ 27.557278][ T3328] Cannot create hsr debugfs directory [ 27.573391][ T3320] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 27.592933][ T3320] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 27.611700][ T3320] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 27.622444][ T3320] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 27.672042][ T3317] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 27.684318][ T3317] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 27.692874][ T3317] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 27.706355][ T3317] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 27.740821][ T3316] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 27.757881][ T3316] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 27.770101][ T3316] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 27.780334][ T3316] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 27.797664][ T3322] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 27.807082][ T3322] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 27.822707][ T3322] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 27.831676][ T3322] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 27.852085][ T3328] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 27.861382][ T3328] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 27.870173][ T3328] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 27.879272][ T3328] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 27.900901][ T3328] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.908008][ T3328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.915288][ T3328] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.922370][ T3328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.944799][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.965690][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.972726][ T1618] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.980767][ T1618] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.994572][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.010538][ T144] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.017611][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.037626][ T144] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.044791][ T144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.060921][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.075124][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.082153][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.098981][ T1618] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.106039][ T1618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.132681][ T3328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.145508][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.158584][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.168608][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.189093][ T2614] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.196185][ T2614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.208836][ T3328] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.216666][ T2614] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.223798][ T2614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.241652][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.248754][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.260823][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.271534][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.278663][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.288924][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.296000][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.314955][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.325192][ T2614] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.332314][ T2614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.360138][ T3316] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 28.370532][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.418002][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.485193][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.533551][ T3328] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.569088][ T3317] veth0_vlan: entered promiscuous mode [ 28.588718][ T3317] veth1_vlan: entered promiscuous mode [ 28.616075][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.623449][ T3320] veth0_vlan: entered promiscuous mode [ 28.646768][ T3317] veth0_macvtap: entered promiscuous mode [ 28.657070][ T3316] veth0_vlan: entered promiscuous mode [ 28.673164][ T3320] veth1_vlan: entered promiscuous mode [ 28.681413][ T3317] veth1_macvtap: entered promiscuous mode [ 28.688544][ T3316] veth1_vlan: entered promiscuous mode [ 28.720854][ T3320] veth0_macvtap: entered promiscuous mode [ 28.728196][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.743120][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.751149][ T3320] veth1_macvtap: entered promiscuous mode [ 28.765920][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.785172][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.794383][ T3316] veth0_macvtap: entered promiscuous mode [ 28.807065][ T3328] veth0_vlan: entered promiscuous mode [ 28.814624][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.829409][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.841043][ T3316] veth1_macvtap: entered promiscuous mode [ 28.855029][ T3328] veth1_vlan: entered promiscuous mode [ 28.861980][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.872904][ T3322] veth0_vlan: entered promiscuous mode [ 28.885183][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.895880][ T3322] veth1_vlan: entered promiscuous mode [ 28.910011][ T2614] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.921249][ T3317] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 28.925648][ T3328] veth0_macvtap: entered promiscuous mode [ 28.943851][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.954914][ T2614] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.963752][ T2614] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.973698][ T3328] veth1_macvtap: entered promiscuous mode [ 28.981907][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.994777][ T2614] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.007480][ T3487] loop3: detected capacity change from 0 to 128 [ 29.016760][ T3487] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 29.022334][ T3328] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.039602][ T3487] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 29.053689][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.064095][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.073687][ T3328] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.086037][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.100890][ T3322] veth0_macvtap: entered promiscuous mode [ 29.113225][ T167] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.125699][ T167] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.142651][ T167] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.152729][ T3322] veth1_macvtap: entered promiscuous mode [ 29.162426][ T167] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.176568][ T3491] loop0: detected capacity change from 0 to 512 [ 29.184671][ T167] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.195461][ T3491] ext4: Unknown parameter 'hash' [ 29.217858][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.247863][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.266640][ T167] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.284783][ T42] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.304127][ T3491] loop0: detected capacity change from 0 to 512 [ 29.315489][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 29.315503][ T29] audit: type=1400 audit(1764716402.007:105): avc: denied { map_read map_write } for pid=3493 comm="syz.3.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 29.328940][ T42] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.351582][ T3503] ================================================================== [ 29.359684][ T3503] BUG: KCSAN: data-race in wg_socket_send_skb_to_peer / wg_socket_send_skb_to_peer [ 29.369006][ T3503] [ 29.371347][ T3503] read-write to 0xffff88811af56a58 of 8 bytes by task 167 on cpu 1: [ 29.373296][ T29] audit: type=1400 audit(1764716402.057:106): avc: denied { create } for pid=3504 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.379343][ T3503] wg_socket_send_skb_to_peer+0xe8/0x130 [ 29.379376][ T3503] wg_socket_send_buffer_to_peer+0xf1/0x120 [ 29.410929][ T3503] wg_packet_handshake_send_worker+0x10d/0x160 [ 29.417095][ T3503] process_scheduled_works+0x4ce/0x9d0 [ 29.422559][ T3503] worker_thread+0x582/0x770 [ 29.427155][ T3503] kthread+0x489/0x510 [ 29.431235][ T3503] ret_from_fork+0x13f/0x270 [ 29.435834][ T3503] ret_from_fork_asm+0x1a/0x30 [ 29.440601][ T3503] [ 29.442926][ T3503] read-write to 0xffff88811af56a58 of 8 bytes by task 3503 on cpu 0: [ 29.450989][ T3503] wg_socket_send_skb_to_peer+0xe8/0x130 [ 29.456632][ T3503] wg_packet_tx_worker+0x12d/0x330 [ 29.461746][ T3503] process_scheduled_works+0x4ce/0x9d0 [ 29.467204][ T3503] worker_thread+0x582/0x770 [ 29.471800][ T3503] kthread+0x489/0x510 [ 29.475873][ T3503] ret_from_fork+0x13f/0x270 [ 29.480467][ T3503] ret_from_fork_asm+0x1a/0x30 [ 29.485232][ T3503] [ 29.487557][ T3503] value changed: 0x000000000000005c -> 0x00000000000000f0 [ 29.494657][ T3503] [ 29.496978][ T3503] Reported by Kernel Concurrency Sanitizer on: [ 29.503130][ T3503] CPU: 0 UID: 0 PID: 3503 Comm: kworker/0:9 Not tainted syzkaller #0 PREEMPT(voluntary) [ 29.512936][ T3503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 29.522999][ T3503] Workqueue: wg-crypt-wg2 wg_packet_tx_worker [ 29.529076][ T3503] ================================================================== [ 29.540761][ T2553] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.561190][ T3491] EXT4-fs: Mount option(s) incompatible with ext3 [ 29.566511][ T29] audit: type=1400 audit(1764716402.097:107): avc: denied { write } for pid=3504 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.587707][ T29] audit: type=1400 audit(1764716402.097:108): avc: denied { read } for pid=3504 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.607876][ T29] audit: type=1400 audit(1764716402.097:109): avc: denied { getopt } for pid=3504 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 29.627310][ T29] audit: type=1400 audit(1764716402.237:110): avc: denied { module_load } for pid=3505 comm="syz.1.2" path="/sys/kernel/notes" dev="sysfs" ino=213 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 29.650763][ T29] audit: type=1400 audit(1764716402.237:111): avc: denied { name_bind } for pid=3505 comm="syz.1.2" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 29.672164][ T29] audit: type=1400 audit(1764716402.237:112): avc: denied { node_bind } for pid=3505 comm="syz.1.2" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 29.692814][ T29] audit: type=1400 audit(1764716402.247:113): avc: denied { create } for pid=3505 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 29.713111][ T29] audit: type=1400 audit(1764716402.247:114): avc: denied { write } for pid=3505 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1