last executing test programs: 211.113757ms ago: executing program 3 (id=4): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$setregs(0xf, r0, 0x2, &(0x7f0000000400)="e41c57734a47c354a0ed6e053650af30b080e602cb43158ca616bb1c1df8c60f44fdcafbe383cab15c8ceecb3c44a31a5b4ed623ec7a0b15d16faf77ec7b0b9903db3ba12e3f42d9b40962011052efb053402906dfd04d154d93f6794e44009c9396220329dfdb873ad8e23576ba8a23c2426a3d22b9164cacb2812a150e88f0a7d0b990362c1e61297e75361138fc8b5488a74bdeeaf78516722213a398b50f260a1aa2d8e5780e52784d32ef10128d8be8b8affe8c520ebcd744feea8cfa2123cf62d62ca635bcdb15bb3953e17d1a3395e0c4f05e1983b2b8949c58f718ff3db25068804223dd6567356a56a4e2883136") connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) preadv2(r2, &(0x7f0000000000)=[{&(0x7f0000000300)=""/225, 0xe1}, {&(0x7f0000000080)=""/114, 0x72}, {&(0x7f0000000ec0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/76, 0x4c}], 0x4, 0x7, 0x2, 0x6) r3 = socket(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000a00)=@raw={'raw\x00', 0xc08, 0x3, 0x440, 0x0, 0x5002004a, 0xb, 0x310, 0xea13, 0x3a8, 0x3c8, 0x3c8, 0x3a8, 0x3c8, 0x3, 0x0, {[{{@ip={@multicast2, @private=0xa010101, 0xff, 0xffffffff, 'bridge0\x00', 'veth0_macvtap\x00', {}, {0xff}, 0x5c, 0x3, 0x2}, 0x0, 0x2c8, 0x310, 0x0, {}, [@common=@unspec=@bpf1={{0x230}, @bytecode={0x0, 0x2, 0x0, [{}, {0x16}, {0x4}, {}, {}, {0x0, 0x0, 0x5e}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x6}, {0x0, 0x0, 0x4}, {}, {0x4, 0x8}, {}, {}, {0x1}, {0x0, 0x0, 0x0, 0x7f}, {0x0, 0x4}, {0xfffd}, {}, {}, {0xfffc}, {}, {}, {}, {0x0, 0x0, 0xa}, {0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {0x0, 0x0, 0x40}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x80}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xfd}, {}, {0x0, 0x0, 0x4d}]}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', {0xfffffffffffffffe}}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x4a0) 131.303512ms ago: executing program 1 (id=2): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'team_slave_0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r1 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x1) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000000c0)=0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000300)={'ip_vti0\x00', 0x0, 0x40, 0x7, 0x3c, 0x3, {{0x26, 0x4, 0x0, 0x3c, 0x98, 0x68, 0x0, 0xff, 0x29, 0x0, @rand_addr=0x64010102, @empty, {[@cipso={0x86, 0x28, 0xfffffffffffffffc, [{0x6, 0xa, "b5cbfe235a6dad9e"}, {0x2, 0xa, "538cb367bd03aceb"}, {0x1, 0xa, "cb0baaead80408b3"}, {0x7, 0x4, "091f"}]}, @cipso={0x86, 0x40, 0x1, [{0x6, 0x10, "5823d923df337f7e59d322e38229"}, {0x7, 0x12, "bac01ecb1fb71c4e7f379261afba4850"}, {0x6, 0xe, "b072a37e29f40558321fee71"}, {0x0, 0xa, "14d0734aff35f95a"}]}, @ssrr={0x89, 0x1b, 0x35, [@multicast2, @remote, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, @local, @loopback]}]}}}}}) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x3, 0x0}, 0x8) ioctl$XFS_IOC_PATH_TO_FSHANDLE(r1, 0xc0385868, &(0x7f00000005c0)={r1, &(0x7f00000004c0)='+)\x00', 0x8000, &(0x7f0000000500)={@align, {0x3, 0xf001, 0x4, 0x5}}, 0x4, &(0x7f0000000540), &(0x7f0000000580)=0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x17, 0x12, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5e11}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffff}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0xc5, &(0x7f0000000200)=""/197, 0x41000, 0x1, '\x00', r2, @cgroup_sysctl=0x12, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x3, 0x4, 0x9, 0xec}, 0x10, r4, r5, 0x2, &(0x7f0000000600)=[r1, r1, r1, r1, r1], &(0x7f0000000640)=[{0x0, 0x4, 0xc}, {0x2, 0x5, 0xc, 0x1}]}, 0x94) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_ACCEPT(r6, &(0x7f0000000900)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000008c0)={&(0x7f00000007c0)={0x100, r7, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:dhcpd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'syz_tun\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:fonts_cache_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_SECCTX={0x2f, 0x7, 'system_u:object_r:xserver_misc_device_t:s0\x00'}]}, 0x100}, 0x1, 0x0, 0x0, 0x40020}, 0x4000800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x72, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xd6, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000c40)=r5) pread64(r1, &(0x7f0000000c80)=""/81, 0x51, 0x7) connect$vsock_stream(r5, &(0x7f0000000d00)={0x28, 0x0, 0x0, @local}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000d40)={'team0\x00', 0x0}) r10 = request_key(&(0x7f0000000d80)='logon\x00', &(0x7f0000000dc0)={'syz', 0x2}, &(0x7f0000000e00)='#{)@\xd1\x00', 0xfffffffffffffff9) keyctl$instantiate(0xc, r10, 0x0, 0x0, 0x0) r11 = accept4$tipc(r1, &(0x7f0000000e40)=@id, &(0x7f0000000e80)=0x10, 0x80000) getsockopt$bt_hci(r11, 0x0, 0x3, &(0x7f0000000ec0)=""/75, &(0x7f0000000f40)=0x4b) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000f80)="7259eb6def771db2f2327b1cc09a594af0d9ae9c36419e94f41c2c398f927d68b29d32337e2034e45da559ab1b63dfa969d732d3c10328ba73550c0671efe24357b7fbb89867952f619cdccbc3a14934bfcbb537f1ce2ac17fae311bc9a0b3c6e53837b36db10975f8568f9af89db51a1c991b7c3d4fbd577cc1167781c71de96c95e9763aa1546f3721fe9c69cc0e8804") r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000001040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@const={0xd, 0x0, 0x0, 0xa, 0x2}, @var={0xb, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x30, 0x0, 0x5f, 0x0]}}, &(0x7f0000001080)=""/232, 0x3b, 0xe8, 0x1, 0xfffffffb, 0x10000, @value=r5}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=@base={0xc, 0x9, 0x7, 0x3, 0x100, r5, 0x10, '\x00', 0x0, r12, 0x4, 0x5, 0x3}, 0x50) r13 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001280), r1) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000012c0)={@loopback, @multicast1, 0x0}, &(0x7f0000001300)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f0000001500)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000014c0)={&(0x7f0000001340)={0x164, r13, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x4}]}, 0x164}, 0x1, 0x0, 0x0, 0x40000}, 0x0) mount$9p_fd(0x0, &(0x7f0000001540)='./file0\x00', &(0x7f0000001580), 0x230000, &(0x7f0000001780)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltgid}, {@cache_fscache}, {@aname={'aname', 0x3d, '\x00'}}, {@version_9p2000}, {@access_uid}, {@uname={'uname', 0x3d, 'system_u:object_r:dhcpd_exec_t:s0\x00'}}, {@aname}], [{@dont_measure}]}}) 130.932762ms ago: executing program 2 (id=3): socket$inet(0x2, 0x1, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file1\x00', 0x1008490, &(0x7f0000000a40)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000a80)="$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") r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = epoll_create1(0x80000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x38, r3, 0xc4fc9e906872338b, 0x0, 0x0, {{0x5}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x6, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x4}]}]}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r3, 0x8, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x40004) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x40000004}) socket$inet(0x2, 0x1, 0x0) (async) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file1\x00', 0x1008490, &(0x7f0000000a40)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000a80)="$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") (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async) epoll_create1(0x80000) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x38, r3, 0xc4fc9e906872338b, 0x0, 0x0, {{0x5}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x6, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x4}]}]}]}, 0x38}}, 0x0) (async) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r3, 0x8, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x40004) (async) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x40000004}) (async) 60.868776ms ago: executing program 0 (id=1): r0 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r0, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4083, 0xffffffdf}], 0x1, 0x15, 0x0, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x4, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020200008500000072000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0xe, 0x0, &(0x7f00000007c0)="9b352e98d1dc0621a18bc4c5a6c1", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="05"], 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000880), 0x0, 0x2, 0x0, 0x7ffc}, 0x50) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000c6, &(0x7f00000008c0), 0x1, 0x569, &(0x7f00000002c0)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file1\x00', &(0x7f0000000840), &(0x7f0000000940)=ANY=[], 0x361, 0x1) setxattr$security_ima(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140), &(0x7f00000013c0)=ANY=[], 0x700, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file1\x00', &(0x7f00000000c0), &(0x7f00000001c0)=ANY=[], 0xfe37, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x800040, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@bsdgroups}, {@nouid32}, {@i_version}, {@jqfmt_vfsv1}, {@oldalloc}, {@stripe={'stripe', 0x3d, 0x5}}]}, 0x2, 0x471, &(0x7f0000000a00)="$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") renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000001240)='./file0/file0\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x0) fallocate(r2, 0x20, 0x4000, 0x5) 0s ago: executing program 1 (id=6): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="1400000002060103000000"], 0xfeaa}}, 0x40800) socket$nl_generic(0x10, 0x3, 0x10) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) r2 = socket$packet(0x11, 0x2, 0x300) sync() sync() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141b42, 0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x47f2, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r8, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) splice(r6, 0x0, r5, 0x0, 0x1000, 0x0) splice(r3, 0x0, r7, 0x0, 0x80, 0x0) write$binfmt_misc(r4, &(0x7f0000000100)='F', 0x1) r9 = socket$inet(0x2, 0xa, 0x1) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'vlan0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={r10, 0x3, 0x6, @broadcast}, 0x10) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYRES8=r6, @ANYBLOB="757349e646d1a1b78bd30e076bc0a026299520e8a670331afc64ac6074fae8a4aa9d6e080b04b239c1ba6f3bbd3272e449aba3b9622df305fb1b2eea1ccf657fbae3f94008e7436b6994456c5f31b0ddf323a3a38baa4ed2df4f03bbccd80f111bec2b07a2cf44ecfe32a1c12858862dc0", @ANYBLOB="1b0b04000300000008001b"], 0x28}, 0x1, 0x0, 0x0, 0x68010}, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) clock_getres(0xfffffffffffffff1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.63' (ED25519) to the list of known hosts. [ 25.575477][ T28] audit: type=1400 audit(1771128447.507:64): avc: denied { mounton } for pid=276 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.578961][ T276] cgroup: Unknown subsys name 'net' [ 25.603471][ T28] audit: type=1400 audit(1771128447.507:65): avc: denied { mount } for pid=276 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.625695][ T28] audit: type=1400 audit(1771128447.537:66): avc: denied { unmount } for pid=276 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.626214][ T276] cgroup: Unknown subsys name 'devices' [ 25.770217][ T276] cgroup: Unknown subsys name 'hugetlb' [ 25.775871][ T276] cgroup: Unknown subsys name 'rlimit' [ 25.881039][ T28] audit: type=1400 audit(1771128447.817:67): avc: denied { setattr } for pid=276 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.904271][ T28] audit: type=1400 audit(1771128447.817:68): avc: denied { mounton } for pid=276 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.929087][ T28] audit: type=1400 audit(1771128447.817:69): avc: denied { mount } for pid=276 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.970512][ T278] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.979450][ T28] audit: type=1400 audit(1771128447.917:70): avc: denied { relabelto } for pid=278 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.004943][ T28] audit: type=1400 audit(1771128447.917:71): avc: denied { write } for pid=278 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.024242][ T276] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.031696][ T28] audit: type=1400 audit(1771128447.947:72): avc: denied { read } for pid=276 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.065157][ T28] audit: type=1400 audit(1771128447.947:73): avc: denied { open } for pid=276 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.303001][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.310118][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.317637][ T285] device bridge_slave_0 entered promiscuous mode [ 27.329093][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.336157][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.343764][ T286] device bridge_slave_0 entered promiscuous mode [ 27.351445][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.358581][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.366470][ T286] device bridge_slave_1 entered promiscuous mode [ 27.373076][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.380226][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.387663][ T285] device bridge_slave_1 entered promiscuous mode [ 27.418233][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.425315][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.432867][ T288] device bridge_slave_0 entered promiscuous mode [ 27.441346][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.448448][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.455954][ T288] device bridge_slave_1 entered promiscuous mode [ 27.510868][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.518082][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.525580][ T284] device bridge_slave_0 entered promiscuous mode [ 27.534118][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.541221][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.548812][ T284] device bridge_slave_1 entered promiscuous mode [ 27.632671][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.639887][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.647324][ T287] device bridge_slave_0 entered promiscuous mode [ 27.654578][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.661720][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.669261][ T287] device bridge_slave_1 entered promiscuous mode [ 27.785332][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.792412][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.799738][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.806778][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.828089][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.835167][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.842501][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.849667][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.891044][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.898148][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.905451][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.912545][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.924149][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.931246][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.938608][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.945661][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.961266][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.968704][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.975945][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.983675][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.991101][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.998462][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.005621][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.012955][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.021057][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.028620][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.047364][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.085450][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.093825][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.101337][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.108868][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.117025][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.124097][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.132141][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.140427][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.147451][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.168286][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.176205][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.184331][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.193491][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.203416][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.212695][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.221020][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.228108][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.254734][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.263437][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.270544][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.278748][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.286928][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.294007][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.301562][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.309865][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.316890][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.324386][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.332673][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.339747][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.347157][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.355412][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.362453][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.369967][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.378190][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.386647][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.401089][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.409577][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.417802][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.424917][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.432413][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.441594][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.449735][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.458281][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.478058][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.486386][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.494692][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.503007][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.511197][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.519462][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.533880][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.542456][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.556135][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.564498][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.576466][ T286] device veth0_vlan entered promiscuous mode [ 28.584176][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.593058][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.601679][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.609867][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.618107][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.625678][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.642365][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.650419][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.658626][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.666711][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.675005][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.683238][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.692341][ T285] device veth0_vlan entered promiscuous mode [ 28.700680][ T288] device veth0_vlan entered promiscuous mode [ 28.707462][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.715101][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.722794][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.730549][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.738404][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.746808][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.763776][ T286] device veth1_macvtap entered promiscuous mode [ 28.771238][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.779602][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.787770][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.805905][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.814361][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.822739][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.831439][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.845361][ T285] device veth1_macvtap entered promiscuous mode [ 28.854427][ T284] device veth0_vlan entered promiscuous mode [ 28.861250][ T288] device veth1_macvtap entered promiscuous mode [ 28.868630][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.876309][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.884812][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.893403][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.901240][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.909769][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.918485][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.926746][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.935336][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.943474][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.951913][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.959643][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.983796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.992265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.000957][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.009991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.019154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.027062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.035383][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.043861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.052473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.060938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.069507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.077044][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.094069][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.103582][ T286] request_module fs-gadgetfs succeeded, but still no fs? [ 29.104182][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.123335][ T287] device veth0_vlan entered promiscuous mode [ 29.135790][ T284] device veth1_macvtap entered promiscuous mode [ 29.221239][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.235292][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.246025][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.254715][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.256904][ T344] loop2: detected capacity change from 0 to 512 [ 29.270630][ T341] xt_CT: No such helper "pptp" [ 29.287685][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.304039][ T287] device veth1_macvtap entered promiscuous mode [ 29.314899][ T349] loop0: detected capacity change from 0 to 1024 [ 29.331353][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.343521][ T349] ======================================================= [ 29.343521][ T349] WARNING: The mand mount option has been deprecated and [ 29.343521][ T349] and is ignored by this kernel. Remove the mand [ 29.343521][ T349] option from the mount to silence this warning. [ 29.343521][ T349] ======================================================= [ 29.354872][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.398176][ T344] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 29.412532][ T344] ext4 filesystem being mounted at /0/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 29.423006][ T349] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 29.461134][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.470329][ T349] ================================================================== [ 29.474335][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.478434][ T349] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x979/0x21d0 [ 29.478475][ T349] Read of size 18446744073709551588 at addr ffff888113643840 by task syz.0.1/349 [ 29.503413][ T349] [ 29.505778][ T349] CPU: 1 PID: 349 Comm: syz.0.1 Not tainted syzkaller #0 [ 29.512841][ T349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 29.522911][ T349] Call Trace: [ 29.526193][ T349] [ 29.529119][ T349] __dump_stack+0x21/0x24 [ 29.533458][ T349] dump_stack_lvl+0x110/0x170 [ 29.538147][ T349] ? __cfi_dump_stack_lvl+0x8/0x8 [ 29.543236][ T349] ? kasan_save_alloc_info+0x25/0x30 [ 29.548533][ T349] ? ext4_xattr_block_set+0x9d5/0x3260 [ 29.554017][ T349] ? ext4_xattr_set+0x242/0x320 [ 29.558881][ T349] ? ext4_xattr_security_set+0x3c/0x50 [ 29.564373][ T349] ? ext4_xattr_set_entry+0x979/0x21d0 [ 29.569860][ T349] print_address_description+0x71/0x200 [ 29.575438][ T349] print_report+0x4a/0x60 [ 29.579795][ T349] kasan_report+0x122/0x150 [ 29.584331][ T349] ? ext4_xattr_set_entry+0x979/0x21d0 [ 29.589835][ T349] ? ext4_xattr_set_entry+0x979/0x21d0 [ 29.595327][ T349] kasan_check_range+0x249/0x2a0 [ 29.600301][ T349] ? ext4_xattr_set_entry+0x979/0x21d0 [ 29.605962][ T349] memmove+0x2d/0x70 [ 29.609873][ T349] ext4_xattr_set_entry+0x979/0x21d0 [ 29.615190][ T349] ext4_xattr_block_set+0xad3/0x3260 [ 29.620852][ T349] ? __kasan_check_write+0x14/0x20 [ 29.625984][ T349] ? iput+0x620/0x670 [ 29.629980][ T349] ? ext4_xattr_block_find+0x310/0x310 [ 29.635487][ T349] ext4_xattr_set_handle+0xbc4/0x12c0 [ 29.640887][ T349] ? __cfi_ext4_xattr_set_handle+0x10/0x10 [ 29.646715][ T349] ? __kasan_check_read+0x11/0x20 [ 29.651759][ T349] ? __ext4_journal_start_sb+0x2ed/0x4a0 [ 29.657497][ T349] ext4_xattr_set+0x242/0x320 [ 29.662199][ T349] ? ns_capable+0x8c/0xf0 [ 29.666545][ T349] ? __cfi_ext4_xattr_set+0x10/0x10 [ 29.671762][ T349] ? selinux_inode_setxattr+0x5cf/0xbf0 [ 29.677326][ T349] ext4_xattr_security_set+0x3c/0x50 [ 29.682626][ T349] ? __cfi_ext4_xattr_security_set+0x10/0x10 [ 29.688620][ T349] __vfs_setxattr+0x3f2/0x440 [ 29.693330][ T349] __vfs_setxattr_noperm+0x12a/0x5e0 [ 29.698655][ T349] __vfs_setxattr_locked+0x212/0x230 [ 29.703975][ T349] vfs_setxattr+0x167/0x2e0 [ 29.708603][ T349] ? __cfi_vfs_setxattr+0x10/0x10 [ 29.713650][ T349] ? copy_user_enhanced_fast_string+0xa/0x40 [ 29.719652][ T349] setxattr+0x346/0x360 [ 29.723860][ T349] ? path_setxattr+0x290/0x290 [ 29.728668][ T349] ? __mnt_want_write+0x1e6/0x260 [ 29.733709][ T349] ? mnt_want_write+0x220/0x300 [ 29.738586][ T349] path_setxattr+0x147/0x290 [ 29.743197][ T349] ? simple_xattr_list_add+0x120/0x120 [ 29.748681][ T349] ? __kasan_check_write+0x14/0x20 [ 29.753823][ T349] ? fpregs_restore_userregs+0x128/0x260 [ 29.759505][ T349] __x64_sys_setxattr+0xc5/0xe0 [ 29.764387][ T349] x64_sys_call+0x633/0x9a0 [ 29.768913][ T349] do_syscall_64+0x4c/0xa0 [ 29.773371][ T349] ? clear_bhb_loop+0x30/0x80 [ 29.778076][ T349] ? clear_bhb_loop+0x30/0x80 [ 29.782805][ T349] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.788731][ T349] RIP: 0033:0x7f323d19bf79 [ 29.793166][ T349] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 29.812790][ T349] RSP: 002b:00007f323e0c6028 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 29.821235][ T349] RAX: ffffffffffffffda RBX: 00007f323d415fa0 RCX: 00007f323d19bf79 [ 29.829220][ T349] RDX: 00002000000013c0 RSI: 0000200000000140 RDI: 0000200000000100 [ 29.837215][ T349] RBP: 00007f323d2327e0 R08: 0000000000000000 R09: 0000000000000000 [ 29.845213][ T349] R10: 0000000000000700 R11: 0000000000000246 R12: 0000000000000000 [ 29.853296][ T349] R13: 00007f323d416038 R14: 00007f323d415fa0 R15: 00007fff44bfb828 [ 29.861298][ T349] [ 29.864341][ T349] [ 29.866680][ T349] Allocated by task 349: [ 29.870934][ T349] kasan_set_track+0x4b/0x70 [ 29.875551][ T349] kasan_save_alloc_info+0x25/0x30 [ 29.880729][ T349] __kasan_kmalloc+0x95/0xb0 [ 29.885345][ T349] __kmalloc_node_track_caller+0xb1/0x1e0 [ 29.891075][ T349] kmemdup+0x2b/0x60 [ 29.894999][ T349] ext4_xattr_block_set+0x9d5/0x3260 [ 29.900308][ T349] ext4_xattr_set_handle+0xbc4/0x12c0 [ 29.905708][ T349] ext4_xattr_set+0x242/0x320 [ 29.910407][ T349] ext4_xattr_security_set+0x3c/0x50 [ 29.915711][ T349] __vfs_setxattr+0x3f2/0x440 [ 29.920409][ T349] __vfs_setxattr_noperm+0x12a/0x5e0 [ 29.925720][ T349] __vfs_setxattr_locked+0x212/0x230 [ 29.931032][ T349] vfs_setxattr+0x167/0x2e0 [ 29.935555][ T349] setxattr+0x346/0x360 [ 29.939737][ T349] path_setxattr+0x147/0x290 [ 29.944350][ T349] __x64_sys_setxattr+0xc5/0xe0 [ 29.949215][ T349] x64_sys_call+0x633/0x9a0 [ 29.953740][ T349] do_syscall_64+0x4c/0xa0 [ 29.958183][ T349] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.964114][ T349] [ 29.966447][ T349] The buggy address belongs to the object at ffff888113643800 [ 29.966447][ T349] which belongs to the cache kmalloc-1k of size 1024 [ 29.980509][ T349] The buggy address is located 64 bytes inside of [ 29.980509][ T349] 1024-byte region [ffff888113643800, ffff888113643c00) [ 29.993796][ T349] [ 29.996133][ T349] The buggy address belongs to the physical page: [ 30.002657][ T349] page:ffffea00044d9000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113640 [ 30.013011][ T349] head:ffffea00044d9000 order:3 compound_mapcount:0 compound_pincount:0 [ 30.021346][ T349] flags: 0x4000000000010200(slab|head|zone=1) [ 30.027475][ T349] raw: 4000000000010200 0000000000000000 dead000000000001 ffff888100043080 [ 30.036081][ T349] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 30.044671][ T349] page dumped because: kasan: bad access detected [ 30.051117][ T349] page_owner tracks the page as allocated [ 30.056850][ T349] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 103, tgid 103 (udevd), ts 6338778983, free_ts 0 [ 30.076488][ T349] post_alloc_hook+0x1f5/0x210 [ 30.081275][ T349] prep_new_page+0x1c/0x110 [ 30.085795][ T349] get_page_from_freelist+0x2d12/0x2d80 [ 30.091363][ T349] __alloc_pages+0x1d9/0x480 [ 30.095971][ T349] alloc_slab_page+0x6e/0xf0 [ 30.100581][ T349] new_slab+0x98/0x3d0 [ 30.104670][ T349] ___slab_alloc+0x6bd/0xb20 [ 30.109284][ T349] __slab_alloc+0x5e/0xa0 [ 30.113643][ T349] __kmem_cache_alloc_node+0x203/0x2c0 [ 30.119118][ T349] __kmalloc_node_track_caller+0xa0/0x1e0 [ 30.124848][ T349] __alloc_skb+0x236/0x4b0 [ 30.129283][ T349] netlink_sendmsg+0x635/0xbd0 [ 30.134062][ T349] ____sys_sendmsg+0x5cc/0x990 [ 30.138840][ T349] ___sys_sendmsg+0x2a2/0x360 [ 30.143531][ T349] __x64_sys_sendmsg+0x205/0x2d0 [ 30.148511][ T349] x64_sys_call+0x171/0x9a0 [ 30.153027][ T349] page_owner free stack trace missing [ 30.158401][ T349] [ 30.160731][ T349] Memory state around the buggy address: [ 30.166368][ T349] ffff888113643700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.174455][ T349] ffff888113643780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.182539][ T349] >ffff888113643800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.190609][ T349] ^ [ 30.196786][ T349] ffff888113643880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.204894][ T349] ffff888113643900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.212961][ T349] ================================================================== [ 30.244025][ T349] Disabling lock debugging due to kernel taint [ 30.253308][ T288] EXT4-fs (loop2): unmounting filesystem. [ 30.382565][ T284] EXT4-fs (loop0): unmounting filesystem. [ 30.464286][ T360] syz.1.6 uses obsolete (PF_INET,SOCK_PACKET) [ 30.512104][ T351] Zero length message leads to an empty skb [ 30.521159][ T351] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.