last executing test programs: 3.433574206s ago: executing program 1 (id=2): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x804810, &(0x7f0000000a40), 0x26, 0x75d, &(0x7f0000001040)="$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") chdir(&(0x7f0000000240)='./file0\x00') r0 = syz_io_uring_setup(0x1eb1, &(0x7f0000000480)={0x0, 0x100000, 0x400, 0xfffffffe}, &(0x7f0000000080), &(0x7f0000000040)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000240), 0x36, 0xcc800) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) io_uring_enter(r0, 0x151e, 0x5ad1, 0x1, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040), 0x208e24b) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000040000000000000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000040)='sys_enter\x00', r5}, 0xfe26) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1400) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x40200) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000a80)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 3.20522492s ago: executing program 3 (id=4): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x804810, &(0x7f0000000a40), 0x26, 0x75d, &(0x7f0000001040)="$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") chdir(&(0x7f0000000240)='./file0\x00') r0 = syz_io_uring_setup(0x1eb1, &(0x7f0000000480)={0x0, 0x100000, 0x400, 0xfffffffe}, &(0x7f0000000080), &(0x7f0000000040)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000240), 0x36, 0xcc800) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) io_uring_enter(r0, 0x151e, 0x5ad1, 0x1, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040), 0x208e24b) 2.807106086s ago: executing program 4 (id=5): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641c00000000002008007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000580)={r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x800, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes128, 0x0, '\x00', @a}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r6, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=@newtaction={0x68, 0x30, 0x201, 0x0, 0x40000, {0x0, 0x0, 0x6a00}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x28f1, 0xff, 0x0, 0x1000, 0x100}, 0x2, r8}}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x3, 0x4, 0xd5, 0x0, r5, 0x401, '\x00', r8, 0xffffffffffffffff, 0x4, 0x3, 0x2, 0xe}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = socket(0x400000000010, 0x3, 0x0) r11 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r12, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x2, 0x10}}]}}]}, 0x48}}, 0x0) 2.788513056s ago: executing program 2 (id=3): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000"], 0x50) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYRESDEC=r1, @ANYRES32=r0, @ANYRES16=r4], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) stat(0x0, &(0x7f0000000740)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r3, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)=0x4) readv(r5, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000400)=""/184, 0xb8}, {&(0x7f0000000a00)=""/237, 0xed}, {&(0x7f0000000b00)=""/244, 0xf4}], 0x4) ioctl$TIOCVHANGUP(r5, 0x5437, 0x2) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffde6) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6e, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe92a}, 0x94) read$watch_queue(0xffffffffffffffff, &(0x7f0000000500)=""/80, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r6}, 0x10) 2.760514417s ago: executing program 0 (id=1): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000000880)={[{@errors_remount}, {@bsdgroups}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5e}}, {@noauto_da_alloc}, {@bsdgroups}, {@oldalloc}, {@nojournal_checksum}]}, 0x2, 0x44a, &(0x7f0000000400)="$eJzs281vFOUfAPDvzLbl9+OtFfEFRK0SY+NLSwsqBy8aTTxgNNEDHuu2EMJCDa2JECLVGLyYGBI9G48m/gXevBj1ZOJV74aEKBfQU83MzsDuslsobHcr+/kkA8+z82yf57vPPDPPzLMbwMAaz/5JIrZGxG8RMVrPNhcYr/939fLZ6t+Xz1aTWFl5688kL3fl8tlqWbR835YiM5FGpJ8kRSXNFk+fOT5bq82fKvJTSyfem1o8febZYydmj84fnT85c/Dggf3TLzw/81xX4sziurL7w4U9u15758Lr1cMX3v3p26y9W4v9jXF0y3gW+F8rudZ9T3S7sj7b1pBOhvrYENakEhFZdw3n4380KnG980bj1Y/72jhgXWXXpk2ddy+vAHexJPrdAqA/ygt9dv9bbj2aemwIl16q3wBlcV8ttvqeoUiLMsMt97fdNB4Rh5f/+SrbYp2eQwAANPqs+uWheKbd/C+N+xvKbS/WUMYi4p6I2BER90bEzoi4LyIv+0BEPLjG+luXhm6c/6QXbyuwW5TN/14s1raa53/l7C/GKkVuWx7/cHLkWG1+X/GZTMTwpiw/vUod37/y6+ed9jXO/7Itq7+cCxbtuDjU8oBubnZpNp+UdsGljyJ2D7WLP7m2EpBExK6I2L22P729TBx76ps9nQrdPP5VdGGdaeXriCfr/b8cLfGXktXXJ6f+F7X5fVPlUXGjn385/2an+u8o/i7I+n9z8/HfWmQsaVyvXVx7Hed//7TjPc3tHv8jydv5+WikeO2D2aWlU9MRI8mhPN/0+sz195b5snwW/8Te9uN/R/GeLP6HIiI7iB+OiEci4tGi7Y9FxOMRsXeV+H98ufO+jdD/c23Pf9eO/5b+X3uicvyH7zrVf2v9fyBPTRSv5Oe/m7jVBt7JZwcAAAD/FWn+HfgknbyWTtPJyfp3+HfG5rS2sLj09JGF90/O1b8rPxbDafmka7Theeh0slz8xXp+pnhWXO7fXzw3/qLy/zw/WV2ozfU5dhh0WzqM/8wflX63Dlh37dbRZkb60BCg51rHf9qcPfdGLxsD9JTfa8Pgusn4T3vVDqD3XP9hcLUb/+da8tYC4O7k+g+Dy/iHwWX8w+Ay/mEg3cnv+iUGORHphmiGxDol+n1mAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6I5/AwAA///K8u7c") mount$incfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) open(0x0, 0x0, 0x2a) 539.150402ms ago: executing program 1 (id=6): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641c00000000002008007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000580)={r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x800, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes128, 0x0, '\x00', @a}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r6, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=@newtaction={0x68, 0x30, 0x201, 0x0, 0x40000, {0x0, 0x0, 0x6a00}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x28f1, 0xff, 0x0, 0x1000, 0x100}, 0x2, r8}}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x3, 0x4, 0xd5, 0x0, r5, 0x401, '\x00', r8, 0xffffffffffffffff, 0x4, 0x3, 0x2, 0xe}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = socket(0x400000000010, 0x3, 0x0) r11 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r12, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x2, 0x10}}]}}]}, 0x48}}, 0x0) 390.414784ms ago: executing program 0 (id=7): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0xd0, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x24}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0xfffd}]}, @CTA_EXPECT_MASK={0x3c, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @dev}}}]}, @CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x14}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x1000}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xe, 0x28011, r0, 0x0) ftruncate(r0, 0xc17a) read$FUSE(r0, &(0x7f0000005940)={0x2020}, 0x1cf9) lseek(r0, 0x0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYRES16=r0], &(0x7f0000001200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1000"/15, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r3}, &(0x7f00000008c0), &(0x7f0000000900)=r2}, 0x20) 0s ago: executing program 2 (id=8): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x804810, &(0x7f0000000a40), 0x26, 0x75d, &(0x7f0000001040)="$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") chdir(&(0x7f0000000240)='./file0\x00') r0 = syz_io_uring_setup(0x1eb1, &(0x7f0000000480)={0x0, 0x100000, 0x400, 0xfffffffe}, &(0x7f0000000080), &(0x7f0000000040)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000240), 0x36, 0xcc800) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000c}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) io_uring_enter(r0, 0x151e, 0x5ad1, 0x1, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000040000000000000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000040)='sys_enter\x00', r6}, 0xfe26) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1400) truncate(&(0x7f0000000000)='./file0\x00', 0x40200) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000a80)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.16' (ED25519) to the list of known hosts. [ 26.388780][ T28] audit: type=1400 audit(1751160389.603:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.390127][ T275] cgroup: Unknown subsys name 'net' [ 26.411463][ T28] audit: type=1400 audit(1751160389.603:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.438767][ T28] audit: type=1400 audit(1751160389.643:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.438949][ T275] cgroup: Unknown subsys name 'devices' [ 26.548028][ T275] cgroup: Unknown subsys name 'hugetlb' [ 26.553728][ T275] cgroup: Unknown subsys name 'rlimit' [ 26.688989][ T28] audit: type=1400 audit(1751160389.903:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.712177][ T28] audit: type=1400 audit(1751160389.903:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.736900][ T28] audit: type=1400 audit(1751160389.903:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.774646][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 26.783509][ T28] audit: type=1400 audit(1751160389.993:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.808922][ T28] audit: type=1400 audit(1751160389.993:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.815291][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.834506][ T28] audit: type=1400 audit(1751160390.033:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.869161][ T28] audit: type=1400 audit(1751160390.033:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.913598][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.920991][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.928459][ T283] device bridge_slave_0 entered promiscuous mode [ 28.948542][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.955595][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.963042][ T283] device bridge_slave_1 entered promiscuous mode [ 29.007488][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.014523][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.022014][ T286] device bridge_slave_0 entered promiscuous mode [ 29.030389][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.037498][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.044906][ T286] device bridge_slave_1 entered promiscuous mode [ 29.062679][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.069800][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.077321][ T285] device bridge_slave_0 entered promiscuous mode [ 29.095764][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.102838][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.110338][ T285] device bridge_slave_1 entered promiscuous mode [ 29.176276][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.183339][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.190855][ T284] device bridge_slave_0 entered promiscuous mode [ 29.209837][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.216940][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.224295][ T284] device bridge_slave_1 entered promiscuous mode [ 29.274628][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.281745][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.289236][ T287] device bridge_slave_0 entered promiscuous mode [ 29.296135][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.303180][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.310660][ T287] device bridge_slave_1 entered promiscuous mode [ 29.445263][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.452442][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.459747][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.466787][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.477698][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.484843][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.492161][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.499209][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.513421][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.520578][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.527861][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.534887][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.549124][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.556287][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.563564][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.570610][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.613127][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.620216][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.627528][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.634561][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.657685][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.665008][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.672668][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.679997][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.687396][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.694545][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.701813][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.709388][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.716745][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.724251][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.731495][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.745450][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.753938][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.762198][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.769251][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.793038][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.801034][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.809463][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.816507][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.823948][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.832389][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.839450][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.846898][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.855064][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.862108][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.889516][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.897119][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.904555][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.912852][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.921268][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.928334][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.936512][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.944476][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.952882][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.959943][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.967393][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.975288][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.001879][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.010389][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.018757][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.025784][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.033270][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.041013][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.048535][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.056932][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.065028][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.072067][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.079595][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.087857][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.095762][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.104099][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.112303][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.119341][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.126759][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.134756][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.142783][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.151197][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.159536][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.166593][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.173904][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.182038][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.194293][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.202726][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.221869][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.230218][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.238712][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.248047][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.256158][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.263979][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.272219][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.280612][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.288691][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.296944][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.305264][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.312864][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.323521][ T286] device veth0_vlan entered promiscuous mode [ 30.334415][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.342888][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.360680][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.368560][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.381660][ T284] device veth0_vlan entered promiscuous mode [ 30.389087][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.397482][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.404905][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.416630][ T286] device veth1_macvtap entered promiscuous mode [ 30.425184][ T287] device veth0_vlan entered promiscuous mode [ 30.438060][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.446337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.453709][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.461657][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.470079][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.478409][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.486164][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.494018][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.502208][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.509770][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.518487][ T285] device veth0_vlan entered promiscuous mode [ 30.535719][ T284] device veth1_macvtap entered promiscuous mode [ 30.542938][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.551460][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.560741][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.569134][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.577624][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.585835][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.594335][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.602439][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.610842][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.619245][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.627433][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.634967][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.644208][ T283] device veth0_vlan entered promiscuous mode [ 30.656496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.664845][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.674701][ T287] device veth1_macvtap entered promiscuous mode [ 30.685646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.694462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.704035][ T286] request_module fs-gadgetfs succeeded, but still no fs? [ 30.723595][ T285] device veth1_macvtap entered promiscuous mode [ 30.745647][ T283] device veth1_macvtap entered promiscuous mode [ 30.758827][ T306] loop1: detected capacity change from 0 to 2048 [ 30.766459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.775108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.784196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.792382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.797048][ T306] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 30.801013][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.809233][ T306] ext4 filesystem being mounted at /0/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 30.817342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.834773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.845688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.854487][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.863040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.871726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.880393][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.949438][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.968954][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.973029][ T315] loop3: detected capacity change from 0 to 2048 [ 30.979785][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.992401][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.252633][ T316] fs-verity: sha512 using implementation "sha512-avx2" [ 31.270159][ T316] fs-verity (loop1, inode 13): Error -28 writing Merkle tree block 1 [ 31.276343][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.281612][ T315] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 31.286349][ T316] fs-verity (loop1, inode 13): Error -28 building Merkle tree [ 31.295454][ T315] ext4 filesystem being mounted at /0/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 31.303386][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.409142][ T325] loop0: detected capacity change from 0 to 512 [ 31.415919][ T325] EXT4-fs: Ignoring removed oldalloc option [ 31.425630][ T325] EXT4-fs error (device loop0): ext4_xattr_inode_iget:400: comm syz.0.1: Parent and EA inode have the same ino 15 [ 31.528750][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 31.528769][ T28] audit: type=1400 audit(1751160394.723:113): avc: denied { map_read map_write } for pid=322 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.531242][ T325] EXT4-fs (loop0): Remounting filesystem read-only [ 31.599120][ T316] syz.1.2 (316) used greatest stack depth: 22456 bytes left [ 33.105028][ T325] EXT4-fs warning (device loop0): ext4_expand_extra_isize_ea:2818: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 33.175177][ T286] EXT4-fs (loop1): unmounting filesystem. [ 33.414991][ T325] EXT4-fs error (device loop0): ext4_xattr_inode_iget:400: comm syz.0.1: Parent and EA inode have the same ino 15 [ 33.617470][ T325] EXT4-fs (loop0): Remounting filesystem read-only [ 33.626417][ T325] EXT4-fs (loop0): 1 orphan inode deleted [ 33.639905][ T325] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 33.668259][ T28] audit: type=1400 audit(1751160396.883:114): avc: denied { mounton } for pid=324 comm="syz.0.1" path="/0/file0/file0" dev="loop0" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 33.708680][ T28] audit: type=1400 audit(1751160396.913:115): avc: denied { create } for pid=324 comm="syz.0.1" name=".index" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 33.746598][ T283] EXT4-fs error (device loop0): htree_dirblock_to_tree:1112: inode #2: block 13: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=76, inode=0, rec_len=0, size=1024 fake=0 [ 34.132028][ T28] audit: type=1400 audit(1751160397.053:116): avc: denied { create } for pid=339 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 34.204840][ T283] EXT4-fs (loop0): Remounting filesystem read-only [ 34.212631][ T283] ------------[ cut here ]------------ [ 34.218222][ T283] kernel BUG at fs/namei.c:2954! [ 34.238741][ T283] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 34.244850][ T283] CPU: 0 PID: 283 Comm: syz-executor Not tainted 6.1.141-syzkaller-00033-g36d69f6a49eb #0 [ 34.251177][ T346] loop2: detected capacity change from 0 to 2048 [ 34.254755][ T283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 34.254769][ T283] RIP: 0010:may_delete+0x701/0x710 [ 34.276286][ T283] Code: ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 fe ff ff 48 89 df e8 a0 16 f4 ff e9 77 fe ff ff e8 f6 bc af ff 0f 0b e8 ef bc af ff <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 55 48 89 e5 41 56 53 [ 34.281385][ T28] audit: type=1400 audit(1751160397.073:117): avc: denied { ioctl } for pid=339 comm="syz.1.6" path="socket:[15758]" dev="sockfs" ino=15758 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 34.295908][ T283] RSP: 0018:ffffc9000ceafc20 EFLAGS: 00010293 [ 34.295940][ T283] RAX: ffffffff81c03a31 RBX: ffff8881063c7aa0 RCX: ffff888107c39440 [ 34.295957][ T283] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000000000000000 [ 34.343281][ T283] RBP: ffffc9000ceafc88 R08: 0000000000000004 R09: 0000000000000003 [ 34.351289][ T283] R10: fffff520019d5f64 R11: 1ffff920019d5f64 R12: dffffc0000000000 [ 34.359269][ T283] R13: 0000000000000001 R14: ffff8881063cc030 R15: 1ffff11020c78f54 [ 34.367241][ T283] FS: 000055557d5c5500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 34.376175][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.382757][ T283] CR2: 000055568eb634a8 CR3: 000000012fab6000 CR4: 00000000003506b0 [ 34.390742][ T283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.398712][ T283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.406683][ T283] Call Trace: [ 34.409955][ T283] [ 34.412889][ T283] vfs_rmdir+0x32/0x500 [ 34.417048][ T283] incfs_kill_sb+0x105/0x220 [ 34.421636][ T283] deactivate_locked_super+0xb5/0x120 [ 34.427011][ T283] deactivate_super+0xaf/0xe0 [ 34.431712][ T283] cleanup_mnt+0x45f/0x4e0 [ 34.436151][ T283] __cleanup_mnt+0x19/0x20 [ 34.440582][ T283] task_work_run+0x1db/0x240 [ 34.445189][ T283] ? __cfi_task_work_run+0x10/0x10 [ 34.450317][ T283] ? __x64_sys_umount+0x125/0x160 [ 34.455353][ T283] ? __cfi___x64_sys_umount+0x10/0x10 [ 34.460744][ T283] exit_to_user_mode_loop+0x9b/0xb0 [ 34.465945][ T283] exit_to_user_mode_prepare+0x5a/0xa0 [ 34.471405][ T283] syscall_exit_to_user_mode+0x1a/0x30 [ 34.476877][ T283] do_syscall_64+0x58/0xa0 [ 34.481302][ T283] ? clear_bhb_loop+0x30/0x80 [ 34.486072][ T283] ? clear_bhb_loop+0x30/0x80 [ 34.490781][ T283] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 34.496688][ T283] RIP: 0033:0x7f38ee98fc57 [ 34.501119][ T283] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 34.520725][ T283] RSP: 002b:00007ffc73957fb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 34.529142][ T283] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f38ee98fc57 [ 34.537114][ T283] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc73958070 [ 34.545099][ T283] RBP: 00007ffc73958070 R08: 0000000000000000 R09: 0000000000000000 [ 34.553071][ T283] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc73959160 [ 34.561040][ T283] R13: 00007f38eea10925 R14: 0000000000007a91 R15: 00007ffc7395a230 [ 34.569016][ T283] [ 34.572030][ T283] Modules linked in: [ 34.646001][ T283] ---[ end trace 0000000000000000 ]--- [ 34.658108][ T346] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 34.664030][ T283] RIP: 0010:may_delete+0x701/0x710 [ 34.679908][ T283] Code: ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 fe ff ff 48 89 df e8 a0 16 f4 ff e9 77 fe ff ff e8 f6 bc af ff 0f 0b e8 ef bc af ff <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 55 48 89 e5 41 56 53 [ 34.704539][ T346] ext4 filesystem being mounted at /1/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 34.719769][ T28] audit: type=1400 audit(1751160397.083:118): avc: denied { create } for pid=339 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 34.728875][ T283] RSP: 0018:ffffc9000ceafc20 EFLAGS: 00010293 [ 34.762689][ T283] RAX: ffffffff81c03a31 RBX: ffff8881063c7aa0 RCX: ffff888107c39440 [ 34.779384][ T283] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000000000000000 [ 34.795626][ T283] RBP: ffffc9000ceafc88 R08: 0000000000000004 R09: 0000000000000003 [ 34.815585][ T283] R10: fffff520019d5f64 R11: 1ffff920019d5f64 R12: dffffc0000000000 [ 34.835610][ T283] R13: 0000000000000001 R14: ffff8881063cc030 R15: 1ffff11020c78f54 [ 34.835979][ T28] audit: type=1400 audit(1751160397.423:119): avc: denied { remove_name } for pid=283 comm="syz-executor" name="lost+found" dev="loop0" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 34.855721][ T283] FS: 000055557d5c5500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 34.890876][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.895990][ T28] audit: type=1400 audit(1751160397.423:120): avc: denied { unlink } for pid=283 comm="syz-executor" name="lost+found" dev="loop0" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 [ 34.904047][ T283] CR2: 00007f9863ff5000 CR3: 000000012fab6000 CR4: 00000000003506a0 [ 34.945523][ T28] audit: type=1400 audit(1751160397.423:121): avc: denied { rmdir } for pid=283 comm="syz-executor" name="file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 34.963802][ T283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.985456][ T283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.987712][ T28] audit: type=1400 audit(1751160397.423:122): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 34.994661][ T283] Kernel panic - not syncing: Fatal exception [ 35.013870][ T283] Kernel Offset: disabled [ 35.024228][ T283] Rebooting in 86400 seconds..