last executing test programs: 820.837887ms ago: executing program 0 (id=1): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r0, 0x0, 0x8000000000004}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}}, 0x20048005) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 794.735677ms ago: executing program 0 (id=6): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xc, 0xc, &(0x7f0000000300)=ANY=[@ANYRES16=r1, @ANYRES16=r4, @ANYRES64=r1, @ANYRESHEX=r3], &(0x7f0000000240)='GPL\x00', 0xb50, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffec8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0xc2d41, 0x0) ioctl$SNAPSHOT_FREE(r6, 0x3305) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00'}, 0x18) r7 = fsopen(&(0x7f0000000100)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r7, 0x0, 0x1) fchdir(r8) r9 = inotify_init1(0x0) inotify_add_watch(r9, &(0x7f0000000200)='.\x00', 0x10000a0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/184, 0xb8) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003540)=[{{&(0x7f0000000040)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f0000000880)=[{&(0x7f0000002400)="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", 0x262}], 0x1}}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000780)="e4", 0x1}], 0x1}}], 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) 794.386507ms ago: executing program 3 (id=4): r0 = syz_io_uring_setup(0x6152, &(0x7f0000000440)={0x0, 0xfc83, 0x40, 0x4, 0xa}, &(0x7f0000000200), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f0000000340)=[@ioring_restriction_sqe_flags_allowed={0x2, 0x12}, @ioring_restriction_sqe_op={0x1, 0x11}, @ioring_restriction_sqe_flags_required={0x3, 0x15}, @ioring_restriction_sqe_flags_required={0x3, 0x8}, @ioring_restriction_sqe_flags_required={0x3, 0x12}, @ioring_restriction_register_op={0x0, 0x15}, @ioring_restriction_register_op={0x0, 0x1c}, @ioring_restriction_sqe_flags_required], 0x8) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x8000, 0x0) r2 = syz_pidfd_open(r1, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0xff01, &(0x7f0000000180)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xc8241, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'geneve0\x00', 0x8000}) socket$kcm(0x2, 0x3, 0x2) r5 = socket$kcm(0x10, 0x2, 0x4) close(r5) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x3, &(0x7f00000011c0)=[{&(0x7f0000000140)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514001ac00800020007000c00040005c00364bc24eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d0001000000e4509c5bbcd72c6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x20, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e22, @loopback}]}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000003c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0006}]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r6}, &(0x7f0000000580), &(0x7f00000001c0)=r7}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) setreuid(0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b040000050000000100010009000000010000007592e389fa6f92b6e8bf5d28daeaea8a989bcd635de5e1ad0ce9bcffa5cacca9dc96a6a622fb9bc86b3dee34dcaaa501455c46c30257049444ababfd4523289b05adc3fc5a85bc04b203fbd21fb79cf62aaed682f2898639c023de4ac7ff37e962cc74aa145b4bb5ea0f994b8546cc35df23586f3e97ab4dd922b40bd4068c483a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ppoll(&(0x7f0000000240)=[{r3, 0x100}, {r11, 0x400}], 0x2, &(0x7f00000002c0)={0x0, 0x989680}, &(0x7f00000004c0), 0x8) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000500)={r8, 0x8}, &(0x7f0000000540)=0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r12}, 0x18) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000280)='./file1\x00', 0x808010, &(0x7f0000000640)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000", @ANYRES32], 0x0, 0x2b2, &(0x7f0000001380)="$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") r13 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) getdents64(r13, &(0x7f0000000000)=""/48, 0x30) 632.75756ms ago: executing program 1 (id=2): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r0}, &(0x7f0000004000), &(0x7f0000004040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r1, 0x0, 0x8000000000004}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}}, 0x20048005) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 566.523271ms ago: executing program 1 (id=7): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b\x00\x00\x00\b\x00\x00\x00'], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r2, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x80065c9}, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) 558.218331ms ago: executing program 3 (id=8): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 434.085973ms ago: executing program 1 (id=9): syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x200000, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@rand_addr, @remote}, &(0x7f0000000080)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth1_vlan\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) 405.721253ms ago: executing program 2 (id=3): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x80065c9}, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) 345.801624ms ago: executing program 2 (id=10): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x0, 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32=0x0, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x8}, 0x18) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000000)={0x18, 0x0, {0x2, @multicast, 'ip_vti0\x00'}}, 0x1e) connect$pppoe(r4, &(0x7f0000000340)={0x18, 0x0, {0x0, @multicast, 'macvlan0\x00'}}, 0x1e) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000240), &(0x7f0000000280)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x400) r5 = getpid() tkill(r5, 0x3a) perf_event_open(0x0, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r6, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0x2}, {&(0x7f00000000c0)=""/160, 0xa0}, &(0x7f0000000340)=[{&(0x7f0000001140)=""/102, 0x66}], 0x1, 0x60, 0xfffffffefffffffe}}], 0x48, 0x8004}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x4}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRESOCT, @ANYRES64, @ANYRES16], 0x1, 0x36e, &(0x7f0000000c00)="$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") socket(0x8000000010, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)=@o_path={&(0x7f00000003c0)='./bus\x00', 0x0, 0x18, r6}, 0x18) r9 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r8, 0x0, 0x0, 0x1000f4) io_setup(0x7d, &(0x7f0000000600)=0x0) io_submit(r10, 0x2, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r9, &(0x7f0000000000)="96", 0xfffffe10, 0x0, 0x0, 0x0, r9}, &(0x7f0000000740)={0x0, 0x0, 0x41, 0x3, 0x0, r8, 0x0, 0x0, 0xffffffffffffffff}]) 94.446349ms ago: executing program 3 (id=11): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) 70.781919ms ago: executing program 3 (id=12): mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x0, 0xffb, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)) 0s ago: executing program 3 (id=13): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x2008042, &(0x7f00000000c0), 0x2, 0x571, &(0x7f0000000780)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x4, [@float={0x1, 0x0, 0x0, 0x10, 0x8}, @decl_tag={0xa, 0x0, 0x0, 0x11, 0x2, 0x1}, @enum64={0xb, 0x5, 0x0, 0x13, 0x0, 0x1, [{0xa, 0x9, 0x7}, {0x5, 0x3, 0x462}, {0x10, 0x401, 0x4}, {0x7, 0x80000001, 0x6}, {0x5, 0x8, 0x7}]}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x18, 0x0, 0x30, 0x2}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000000)=""/54, 0x90, 0x36, 0x0, 0x401}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x20, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="02000000010004000000000004000500a9930000100000000000000020"], 0x24, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.0' (ED25519) to the list of known hosts. [ 24.502344][ T29] audit: type=1400 audit(1751038395.462:62): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.503200][ T3295] cgroup: Unknown subsys name 'net' [ 24.525077][ T29] audit: type=1400 audit(1751038395.462:63): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.552481][ T29] audit: type=1400 audit(1751038395.492:64): avc: denied { unmount } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.708846][ T3295] cgroup: Unknown subsys name 'cpuset' [ 24.714966][ T3295] cgroup: Unknown subsys name 'rlimit' [ 24.903989][ T29] audit: type=1400 audit(1751038395.862:65): avc: denied { setattr } for pid=3295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.928404][ T29] audit: type=1400 audit(1751038395.862:66): avc: denied { create } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.948865][ T29] audit: type=1400 audit(1751038395.862:67): avc: denied { write } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.969299][ T29] audit: type=1400 audit(1751038395.862:68): avc: denied { read } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.976194][ T3298] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.989555][ T29] audit: type=1400 audit(1751038395.872:69): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.023494][ T29] audit: type=1400 audit(1751038395.872:70): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.046723][ T29] audit: type=1400 audit(1751038395.962:71): avc: denied { relabelto } for pid=3298 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.064896][ T3295] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.200872][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 26.273325][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 26.281674][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 26.294117][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 26.320070][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.327117][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.334461][ T3306] bridge_slave_0: entered allmulticast mode [ 26.340969][ T3306] bridge_slave_0: entered promiscuous mode [ 26.347369][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 26.366575][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.373704][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.380982][ T3306] bridge_slave_1: entered allmulticast mode [ 26.387458][ T3306] bridge_slave_1: entered promiscuous mode [ 26.430781][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.453129][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.464128][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.471226][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.478420][ T3305] bridge_slave_0: entered allmulticast mode [ 26.484844][ T3305] bridge_slave_0: entered promiscuous mode [ 26.506611][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.513772][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.520885][ T3305] bridge_slave_1: entered allmulticast mode [ 26.527426][ T3305] bridge_slave_1: entered promiscuous mode [ 26.559501][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.566604][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.573787][ T3312] bridge_slave_0: entered allmulticast mode [ 26.580366][ T3312] bridge_slave_0: entered promiscuous mode [ 26.586650][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.593822][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.601052][ T3314] bridge_slave_0: entered allmulticast mode [ 26.607338][ T3314] bridge_slave_0: entered promiscuous mode [ 26.614326][ T3306] team0: Port device team_slave_0 added [ 26.620942][ T3306] team0: Port device team_slave_1 added [ 26.626655][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.633754][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.640956][ T3310] bridge_slave_0: entered allmulticast mode [ 26.647234][ T3310] bridge_slave_0: entered promiscuous mode [ 26.657871][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.664979][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.672218][ T3312] bridge_slave_1: entered allmulticast mode [ 26.678559][ T3312] bridge_slave_1: entered promiscuous mode [ 26.684634][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.691841][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.699046][ T3314] bridge_slave_1: entered allmulticast mode [ 26.705516][ T3314] bridge_slave_1: entered promiscuous mode [ 26.720812][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.727946][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.735086][ T3310] bridge_slave_1: entered allmulticast mode [ 26.741631][ T3310] bridge_slave_1: entered promiscuous mode [ 26.748765][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.771872][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.778848][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 26.804949][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.820873][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.839797][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.849167][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.856248][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 26.882184][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.899010][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.909182][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.919397][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.941294][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.951126][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.971031][ T3305] team0: Port device team_slave_0 added [ 26.977376][ T3314] team0: Port device team_slave_0 added [ 26.993045][ T3305] team0: Port device team_slave_1 added [ 26.999388][ T3314] team0: Port device team_slave_1 added [ 27.010244][ T3312] team0: Port device team_slave_0 added [ 27.030349][ T3310] team0: Port device team_slave_0 added [ 27.041313][ T3312] team0: Port device team_slave_1 added [ 27.047403][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.054362][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.080273][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.099997][ T3310] team0: Port device team_slave_1 added [ 27.105921][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.112917][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.138828][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.153842][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.160795][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.186803][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.199279][ T3306] hsr_slave_0: entered promiscuous mode [ 27.205375][ T3306] hsr_slave_1: entered promiscuous mode [ 27.216321][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.223286][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.249238][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.279339][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.286333][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.312309][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.323959][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.330987][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.356987][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.368655][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.375603][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.401705][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.418935][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.425937][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.451977][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.483215][ T3314] hsr_slave_0: entered promiscuous mode [ 27.489166][ T3314] hsr_slave_1: entered promiscuous mode [ 27.494937][ T3314] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 27.502666][ T3314] Cannot create hsr debugfs directory [ 27.530782][ T3312] hsr_slave_0: entered promiscuous mode [ 27.536770][ T3312] hsr_slave_1: entered promiscuous mode [ 27.542626][ T3312] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 27.550202][ T3312] Cannot create hsr debugfs directory [ 27.557633][ T3305] hsr_slave_0: entered promiscuous mode [ 27.563635][ T3305] hsr_slave_1: entered promiscuous mode [ 27.569641][ T3305] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 27.577245][ T3305] Cannot create hsr debugfs directory [ 27.641568][ T3310] hsr_slave_0: entered promiscuous mode [ 27.647608][ T3310] hsr_slave_1: entered promiscuous mode [ 27.653552][ T3310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 27.661192][ T3310] Cannot create hsr debugfs directory [ 27.794888][ T3306] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 27.811716][ T3306] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 27.822915][ T3306] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 27.831162][ T3306] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 27.847372][ T3305] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 27.857525][ T3305] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 27.874775][ T3305] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 27.883534][ T3305] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 27.902741][ T3314] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 27.911968][ T3314] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 27.921493][ T3314] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 27.932385][ T3314] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 27.965414][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 27.973927][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 27.984281][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 27.992804][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.027873][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.052976][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.061193][ T3310] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.069659][ T3310] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.082802][ T3310] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.091935][ T3310] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.104961][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.112015][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.124453][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.133779][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.140836][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.164596][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.186575][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.193655][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.211717][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.220607][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.227777][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.251939][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.272463][ T1453] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.279644][ T1453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.293238][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.300374][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.311963][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.332370][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.351816][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.361531][ T3305] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.382427][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.389672][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.404404][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.420944][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.428035][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.437618][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.444705][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.458304][ T1453] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.465350][ T1453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.475679][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.495192][ T3312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 28.505629][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.541809][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.554792][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.574865][ T3310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.636225][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.683876][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.713151][ T3306] veth0_vlan: entered promiscuous mode [ 28.749325][ T3306] veth1_vlan: entered promiscuous mode [ 28.765721][ T3314] veth0_vlan: entered promiscuous mode [ 28.779682][ T3314] veth1_vlan: entered promiscuous mode [ 28.787650][ T3306] veth0_macvtap: entered promiscuous mode [ 28.811034][ T3312] veth0_vlan: entered promiscuous mode [ 28.823611][ T3314] veth0_macvtap: entered promiscuous mode [ 28.832021][ T3314] veth1_macvtap: entered promiscuous mode [ 28.846100][ T3306] veth1_macvtap: entered promiscuous mode [ 28.853201][ T3312] veth1_vlan: entered promiscuous mode [ 28.868914][ T3310] veth0_vlan: entered promiscuous mode [ 28.880022][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.892281][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.904017][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.914584][ T3310] veth1_vlan: entered promiscuous mode [ 28.924359][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.932912][ T3314] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.941759][ T3314] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.950478][ T3314] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.959228][ T3314] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.972647][ T3312] veth0_macvtap: entered promiscuous mode [ 28.980786][ T3305] veth0_vlan: entered promiscuous mode [ 28.987611][ T3312] veth1_macvtap: entered promiscuous mode [ 28.999715][ T3306] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.008519][ T3306] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.017193][ T3306] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.025981][ T3306] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.036890][ T3305] veth1_vlan: entered promiscuous mode [ 29.058688][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.072132][ T3310] veth0_macvtap: entered promiscuous mode [ 29.079581][ T3310] veth1_macvtap: entered promiscuous mode [ 29.087426][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.096142][ T3306] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.106959][ T3312] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.119511][ T3312] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.128305][ T3312] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.137001][ T3312] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.156084][ T3305] veth0_macvtap: entered promiscuous mode [ 29.167507][ T3305] veth1_macvtap: entered promiscuous mode [ 29.187345][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.212021][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.229610][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.239147][ T3310] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.248112][ T3310] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.256883][ T3310] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.265702][ T3310] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.335777][ T3480] loop3: detected capacity change from 0 to 128 [ 29.345862][ T3480] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 29.370620][ T3480] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 29.379244][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.445213][ T3490] random: crng reseeded on system resumption [ 29.457947][ T3490] Restarting kernel threads ... [ 29.463047][ T3490] Done restarting kernel threads. [ 29.513091][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 29.513104][ T29] audit: type=1400 audit(1751038400.472:155): avc: denied { bind } for pid=3491 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 29.607860][ T3494] loop1: detected capacity change from 0 to 1024 [ 29.665506][ T3494] EXT4-fs: Ignoring removed orlov option [ 29.682244][ T3498] rdma_op ffff888118f4b180 conn xmit_rdma 0000000000000000 [ 29.689739][ T29] audit: type=1400 audit(1751038400.632:156): avc: denied { create } for pid=3497 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 29.709068][ T29] audit: type=1400 audit(1751038400.642:157): avc: denied { connect } for pid=3497 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 29.728471][ T29] audit: type=1400 audit(1751038400.642:158): avc: denied { create } for pid=3497 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.745638][ T3305] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.747647][ T29] audit: type=1400 audit(1751038400.642:159): avc: denied { bind } for pid=3497 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.756263][ T3305] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.775172][ T29] audit: type=1400 audit(1751038400.642:160): avc: denied { write } for pid=3497 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.783791][ T3305] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.811642][ T3305] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.862375][ T29] audit: type=1400 audit(1751038400.812:161): avc: denied { open } for pid=3497 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.881634][ T29] audit: type=1400 audit(1751038400.812:162): avc: denied { kernel } for pid=3497 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.905268][ T3498] loop2: detected capacity change from 0 to 128 [ 29.925205][ T3494] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 29.943691][ T29] audit: type=1400 audit(1751038400.902:163): avc: denied { mount } for pid=3493 comm="syz.1.9" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 29.947190][ T3498] syz.2.10: attempt to access beyond end of device [ 29.947190][ T3498] loop2: rw=0, sector=121, nr_sectors = 920 limit=128 [ 29.966879][ T29] audit: type=1400 audit(1751038400.902:164): avc: denied { create } for pid=3506 comm="syz.3.12" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 30.023904][ T23] ================================================================== [ 30.031989][ T23] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 30.038989][ T23] [ 30.041287][ T23] read-write to 0xffff888237c29d24 of 4 bytes by task 10 on cpu 0: [ 30.049148][ T23] wq_worker_running+0x95/0x120 [ 30.053975][ T23] schedule_timeout+0xb7/0x170 [ 30.058717][ T23] msleep+0x50/0x90 [ 30.062508][ T23] nsim_fib_event_work+0x14a2/0x21a0 [ 30.067772][ T23] process_scheduled_works+0x4ce/0x9d0 [ 30.073212][ T23] worker_thread+0x582/0x770 [ 30.077782][ T23] kthread+0x486/0x510 [ 30.081828][ T23] ret_from_fork+0xda/0x150 [ 30.086308][ T23] ret_from_fork_asm+0x1a/0x30 [ 30.091050][ T23] [ 30.093351][ T23] read to 0xffff888237c29d24 of 4 bytes by task 23 on cpu 1: [ 30.100694][ T23] kick_pool+0x49/0x2d0 [ 30.104825][ T23] __queue_work+0x8d6/0xb60 [ 30.109302][ T23] queue_work_on+0xd1/0x160 [ 30.113781][ T23] wg_queue_enqueue_per_peer_tx+0x119/0x270 [ 30.119655][ T23] wg_packet_encrypt_worker+0x9e1/0xb80 [ 30.125181][ T23] process_scheduled_works+0x4ce/0x9d0 [ 30.130622][ T23] worker_thread+0x582/0x770 [ 30.135194][ T23] kthread+0x486/0x510 [ 30.139237][ T23] ret_from_fork+0xda/0x150 [ 30.143714][ T23] ret_from_fork_asm+0x1a/0x30 [ 30.148451][ T23] [ 30.150750][ T23] value changed: 0x00000000 -> 0x00000001 [ 30.156439][ T23] [ 30.158740][ T23] Reported by Kernel Concurrency Sanitizer on: [ 30.164878][ T23] CPU: 1 UID: 0 PID: 23 Comm: kworker/1:0 Not tainted 6.16.0-rc3-syzkaller-00121-gf02769e7f272 #0 PREEMPT(voluntary) [ 30.177175][ T23] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 30.187209][ T23] Workqueue: wg-crypt-wg1 wg_packet_encrypt_worker [ 30.193702][ T23] ================================================================== [ 30.238142][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 30.321581][ T3510] loop3: detected capacity change from 0 to 512 [ 30.328498][ T3510] ======================================================= [ 30.328498][ T3510] WARNING: The mand mount option has been deprecated and [ 30.328498][ T3510] and is ignored by this kernel. Remove the mand [ 30.328498][ T3510] option from the mount to silence this warning. [ 30.328498][ T3510] ======================================================= [ 30.370179][ T3510] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 30.383011][ T3510] ext4 filesystem being mounted at /4/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 30.396016][ T3510] EXT4-fs error (device loop3): ext4_do_update_inode:5568: inode #2: comm syz.3.13: corrupted inode contents [ 30.408282][ T3510] EXT4-fs error (device loop3): ext4_dirty_inode:6459: inode #2: comm syz.3.13: mark_inode_dirty error [ 30.420437][ T3510] EXT4-fs error (device loop3): ext4_do_update_inode:5568: inode #2: comm syz.3.13: corrupted inode contents [ 30.440675][ T3314] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.