DUID 00:04:92:3d:a4:bf:d8:99:95:1d:d2:9f:0e:34:7d:20:a7:e6 forked to background, child pid 3173 [ 21.632076][ T3174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 21.643070][ T3174] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.237' (ECDSA) to the list of known hosts. 2022/04/25 21:38:16 fuzzer started 2022/04/25 21:38:17 dialing manager at 10.128.0.169:40067 syzkaller login: [ 35.987686][ T3592] cgroup: Unknown subsys name 'net' [ 36.088799][ T3592] cgroup: Unknown subsys name 'rlimit' 2022/04/25 21:38:17 syscalls: 3654 2022/04/25 21:38:17 code coverage: enabled 2022/04/25 21:38:17 comparison tracing: enabled 2022/04/25 21:38:17 extra coverage: enabled 2022/04/25 21:38:17 delay kcov mmap: enabled 2022/04/25 21:38:17 setuid sandbox: enabled 2022/04/25 21:38:17 namespace sandbox: enabled 2022/04/25 21:38:17 Android sandbox: /sys/fs/selinux/policy does not exist 2022/04/25 21:38:17 fault injection: enabled 2022/04/25 21:38:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/04/25 21:38:17 net packet injection: enabled 2022/04/25 21:38:17 net device setup: enabled 2022/04/25 21:38:17 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/04/25 21:38:17 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/04/25 21:38:17 USB emulation: enabled 2022/04/25 21:38:17 hci packet injection: enabled 2022/04/25 21:38:17 wifi device emulation: enabled 2022/04/25 21:38:17 802.15.4 emulation: enabled 2022/04/25 21:38:17 fetching corpus: 0, signal 0/2000 (executing program) 2022/04/25 21:38:17 fetching corpus: 50, signal 43236/46894 (executing program) 2022/04/25 21:38:17 fetching corpus: 100, signal 58878/64155 (executing program) 2022/04/25 21:38:17 fetching corpus: 150, signal 68211/75112 (executing program) 2022/04/25 21:38:17 fetching corpus: 200, signal 80996/89376 (executing program) 2022/04/25 21:38:18 fetching corpus: 250, signal 93865/103529 (executing program) 2022/04/25 21:38:18 fetching corpus: 300, signal 105767/116749 (executing program) 2022/04/25 21:38:18 fetching corpus: 350, signal 112601/124930 (executing program) 2022/04/25 21:38:19 fetching corpus: 400, signal 120483/134069 (executing program) 2022/04/25 21:38:19 fetching corpus: 450, signal 124566/139469 (executing program) 2022/04/25 21:38:19 fetching corpus: 500, signal 132396/148438 (executing program) 2022/04/25 21:38:19 fetching corpus: 550, signal 137592/154860 (executing program) 2022/04/25 21:38:19 fetching corpus: 600, signal 140823/159385 (executing program) 2022/04/25 21:38:19 fetching corpus: 650, signal 145502/165226 (executing program) 2022/04/25 21:38:19 fetching corpus: 700, signal 151849/172597 (executing program) 2022/04/25 21:38:19 fetching corpus: 750, signal 156569/178359 (executing program) 2022/04/25 21:38:19 fetching corpus: 800, signal 161745/184535 (executing program) 2022/04/25 21:38:19 fetching corpus: 850, signal 165676/189486 (executing program) 2022/04/25 21:38:20 fetching corpus: 900, signal 168131/193111 (executing program) 2022/04/25 21:38:20 fetching corpus: 950, signal 172290/198226 (executing program) 2022/04/25 21:38:20 fetching corpus: 1000, signal 176100/202992 (executing program) 2022/04/25 21:38:20 fetching corpus: 1050, signal 179348/207191 (executing program) 2022/04/25 21:38:20 fetching corpus: 1100, signal 183119/211851 (executing program) 2022/04/25 21:38:20 fetching corpus: 1150, signal 187346/216911 (executing program) 2022/04/25 21:38:20 fetching corpus: 1200, signal 191320/221676 (executing program) 2022/04/25 21:38:20 fetching corpus: 1250, signal 194439/225689 (executing program) 2022/04/25 21:38:20 fetching corpus: 1300, signal 199625/231518 (executing program) 2022/04/25 21:38:20 fetching corpus: 1350, signal 203868/236377 (executing program) 2022/04/25 21:38:21 fetching corpus: 1400, signal 207594/240880 (executing program) 2022/04/25 21:38:21 fetching corpus: 1450, signal 209333/243560 (executing program) 2022/04/25 21:38:21 fetching corpus: 1500, signal 211616/246713 (executing program) 2022/04/25 21:38:21 fetching corpus: 1550, signal 213809/249730 (executing program) 2022/04/25 21:38:21 fetching corpus: 1600, signal 215694/252499 (executing program) 2022/04/25 21:38:21 fetching corpus: 1650, signal 218015/255582 (executing program) 2022/04/25 21:38:21 fetching corpus: 1700, signal 220940/259161 (executing program) 2022/04/25 21:38:21 fetching corpus: 1750, signal 222622/261731 (executing program) 2022/04/25 21:38:22 fetching corpus: 1800, signal 225282/265070 (executing program) 2022/04/25 21:38:22 fetching corpus: 1850, signal 227517/268053 (executing program) 2022/04/25 21:38:22 fetching corpus: 1900, signal 229678/270904 (executing program) 2022/04/25 21:38:22 fetching corpus: 1950, signal 233369/275029 (executing program) 2022/04/25 21:38:22 fetching corpus: 2000, signal 236078/278304 (executing program) 2022/04/25 21:38:22 fetching corpus: 2050, signal 237661/280656 (executing program) 2022/04/25 21:38:22 fetching corpus: 2100, signal 240336/283969 (executing program) 2022/04/25 21:38:22 fetching corpus: 2150, signal 242407/286657 (executing program) 2022/04/25 21:38:22 fetching corpus: 2200, signal 244511/289395 (executing program) 2022/04/25 21:38:22 fetching corpus: 2250, signal 247300/292678 (executing program) 2022/04/25 21:38:23 fetching corpus: 2300, signal 250748/296475 (executing program) 2022/04/25 21:38:23 fetching corpus: 2350, signal 253154/299357 (executing program) 2022/04/25 21:38:23 fetching corpus: 2400, signal 257934/304106 (executing program) 2022/04/25 21:38:23 fetching corpus: 2450, signal 260494/307094 (executing program) 2022/04/25 21:38:23 fetching corpus: 2500, signal 263539/310410 (executing program) 2022/04/25 21:38:23 fetching corpus: 2550, signal 265093/312527 (executing program) 2022/04/25 21:38:23 fetching corpus: 2600, signal 267035/314915 (executing program) 2022/04/25 21:38:23 fetching corpus: 2650, signal 269115/317473 (executing program) 2022/04/25 21:38:24 fetching corpus: 2700, signal 271191/319982 (executing program) 2022/04/25 21:38:24 fetching corpus: 2750, signal 272301/321700 (executing program) 2022/04/25 21:38:24 fetching corpus: 2800, signal 274249/324088 (executing program) 2022/04/25 21:38:24 fetching corpus: 2850, signal 275455/325866 (executing program) 2022/04/25 21:38:24 fetching corpus: 2900, signal 276964/327901 (executing program) 2022/04/25 21:38:24 fetching corpus: 2950, signal 278944/330252 (executing program) 2022/04/25 21:38:24 fetching corpus: 3000, signal 281247/332882 (executing program) 2022/04/25 21:38:24 fetching corpus: 3050, signal 282489/334693 (executing program) 2022/04/25 21:38:24 fetching corpus: 3100, signal 284406/336938 (executing program) 2022/04/25 21:38:24 fetching corpus: 3150, signal 286438/339205 (executing program) 2022/04/25 21:38:25 fetching corpus: 3200, signal 288174/341338 (executing program) 2022/04/25 21:38:25 fetching corpus: 3250, signal 289843/343330 (executing program) 2022/04/25 21:38:25 fetching corpus: 3300, signal 291138/345129 (executing program) 2022/04/25 21:38:25 fetching corpus: 3350, signal 292706/347092 (executing program) 2022/04/25 21:38:25 fetching corpus: 3400, signal 294135/348908 (executing program) 2022/04/25 21:38:25 fetching corpus: 3450, signal 295892/350915 (executing program) 2022/04/25 21:38:25 fetching corpus: 3500, signal 297079/352546 (executing program) 2022/04/25 21:38:25 fetching corpus: 3550, signal 299271/354877 (executing program) 2022/04/25 21:38:26 fetching corpus: 3600, signal 300519/356504 (executing program) 2022/04/25 21:38:26 fetching corpus: 3650, signal 302489/358584 (executing program) 2022/04/25 21:38:26 fetching corpus: 3700, signal 304063/360443 (executing program) 2022/04/25 21:38:26 fetching corpus: 3750, signal 305934/362534 (executing program) 2022/04/25 21:38:26 fetching corpus: 3800, signal 307293/364222 (executing program) 2022/04/25 21:38:26 fetching corpus: 3850, signal 308496/365751 (executing program) 2022/04/25 21:38:26 fetching corpus: 3900, signal 310730/367967 (executing program) 2022/04/25 21:38:26 fetching corpus: 3950, signal 311866/369460 (executing program) 2022/04/25 21:38:26 fetching corpus: 4000, signal 313161/371084 (executing program) 2022/04/25 21:38:27 fetching corpus: 4050, signal 314133/372432 (executing program) 2022/04/25 21:38:27 fetching corpus: 4100, signal 315517/374050 (executing program) 2022/04/25 21:38:27 fetching corpus: 4150, signal 316622/375478 (executing program) 2022/04/25 21:38:27 fetching corpus: 4200, signal 317991/377037 (executing program) 2022/04/25 21:38:27 fetching corpus: 4250, signal 319063/378454 (executing program) 2022/04/25 21:38:27 fetching corpus: 4300, signal 320515/380092 (executing program) 2022/04/25 21:38:27 fetching corpus: 4350, signal 321922/381696 (executing program) 2022/04/25 21:38:27 fetching corpus: 4400, signal 323061/383087 (executing program) 2022/04/25 21:38:27 fetching corpus: 4450, signal 324781/384841 (executing program) 2022/04/25 21:38:27 fetching corpus: 4500, signal 325847/386241 (executing program) 2022/04/25 21:38:28 fetching corpus: 4550, signal 327037/387678 (executing program) 2022/04/25 21:38:28 fetching corpus: 4600, signal 328222/389069 (executing program) 2022/04/25 21:38:28 fetching corpus: 4650, signal 328942/390157 (executing program) 2022/04/25 21:38:28 fetching corpus: 4700, signal 330564/391795 (executing program) 2022/04/25 21:38:28 fetching corpus: 4750, signal 331472/392980 (executing program) 2022/04/25 21:38:28 fetching corpus: 4800, signal 332593/394321 (executing program) 2022/04/25 21:38:28 fetching corpus: 4850, signal 333397/395436 (executing program) 2022/04/25 21:38:28 fetching corpus: 4900, signal 333982/396396 (executing program) 2022/04/25 21:38:29 fetching corpus: 4950, signal 334944/397541 (executing program) 2022/04/25 21:38:29 fetching corpus: 5000, signal 336548/399027 (executing program) 2022/04/25 21:38:29 fetching corpus: 5050, signal 337617/400249 (executing program) 2022/04/25 21:38:29 fetching corpus: 5100, signal 338466/401340 (executing program) 2022/04/25 21:38:29 fetching corpus: 5150, signal 340412/403072 (executing program) 2022/04/25 21:38:29 fetching corpus: 5200, signal 341675/404389 (executing program) 2022/04/25 21:38:29 fetching corpus: 5250, signal 342372/405352 (executing program) 2022/04/25 21:38:30 fetching corpus: 5300, signal 343349/406515 (executing program) 2022/04/25 21:38:30 fetching corpus: 5350, signal 344257/407654 (executing program) 2022/04/25 21:38:30 fetching corpus: 5400, signal 345015/408685 (executing program) 2022/04/25 21:38:30 fetching corpus: 5450, signal 345930/409720 (executing program) 2022/04/25 21:38:30 fetching corpus: 5500, signal 346802/410803 (executing program) 2022/04/25 21:38:30 fetching corpus: 5550, signal 348056/412076 (executing program) 2022/04/25 21:38:30 fetching corpus: 5600, signal 348852/413050 (executing program) 2022/04/25 21:38:30 fetching corpus: 5650, signal 350255/414383 (executing program) 2022/04/25 21:38:31 fetching corpus: 5700, signal 351246/415497 (executing program) 2022/04/25 21:38:31 fetching corpus: 5750, signal 352301/416599 (executing program) 2022/04/25 21:38:31 fetching corpus: 5800, signal 355519/418870 (executing program) 2022/04/25 21:38:31 fetching corpus: 5850, signal 356183/419766 (executing program) 2022/04/25 21:38:31 fetching corpus: 5900, signal 357079/420789 (executing program) 2022/04/25 21:38:31 fetching corpus: 5950, signal 358111/421871 (executing program) 2022/04/25 21:38:31 fetching corpus: 6000, signal 359192/422952 (executing program) 2022/04/25 21:38:31 fetching corpus: 6050, signal 359929/423805 (executing program) 2022/04/25 21:38:31 fetching corpus: 6100, signal 360569/424668 (executing program) 2022/04/25 21:38:31 fetching corpus: 6150, signal 361793/425740 (executing program) 2022/04/25 21:38:32 fetching corpus: 6200, signal 362715/426723 (executing program) 2022/04/25 21:38:32 fetching corpus: 6250, signal 364004/427874 (executing program) 2022/04/25 21:38:32 fetching corpus: 6300, signal 365668/429176 (executing program) 2022/04/25 21:38:32 fetching corpus: 6350, signal 366356/430024 (executing program) 2022/04/25 21:38:32 fetching corpus: 6400, signal 367777/431221 (executing program) 2022/04/25 21:38:32 fetching corpus: 6450, signal 368529/432061 (executing program) 2022/04/25 21:38:32 fetching corpus: 6500, signal 369432/432954 (executing program) 2022/04/25 21:38:32 fetching corpus: 6550, signal 370228/433813 (executing program) 2022/04/25 21:38:32 fetching corpus: 6600, signal 371415/434879 (executing program) 2022/04/25 21:38:33 fetching corpus: 6650, signal 372769/435956 (executing program) 2022/04/25 21:38:33 fetching corpus: 6700, signal 373434/436759 (executing program) 2022/04/25 21:38:33 fetching corpus: 6750, signal 374164/437515 (executing program) 2022/04/25 21:38:33 fetching corpus: 6800, signal 374840/438255 (executing program) 2022/04/25 21:38:33 fetching corpus: 6850, signal 375409/438967 (executing program) 2022/04/25 21:38:33 fetching corpus: 6900, signal 376324/439775 (executing program) 2022/04/25 21:38:33 fetching corpus: 6950, signal 377500/440710 (executing program) 2022/04/25 21:38:33 fetching corpus: 7000, signal 378205/441431 (executing program) 2022/04/25 21:38:34 fetching corpus: 7050, signal 379379/442400 (executing program) 2022/04/25 21:38:34 fetching corpus: 7100, signal 380625/443335 (executing program) 2022/04/25 21:38:34 fetching corpus: 7150, signal 381545/444126 (executing program) 2022/04/25 21:38:34 fetching corpus: 7200, signal 382945/445139 (executing program) 2022/04/25 21:38:34 fetching corpus: 7250, signal 383733/445873 (executing program) 2022/04/25 21:38:34 fetching corpus: 7300, signal 384637/446631 (executing program) 2022/04/25 21:38:34 fetching corpus: 7350, signal 385819/447507 (executing program) 2022/04/25 21:38:34 fetching corpus: 7400, signal 386942/448354 (executing program) 2022/04/25 21:38:34 fetching corpus: 7450, signal 387624/449009 (executing program) 2022/04/25 21:38:34 fetching corpus: 7500, signal 388230/449638 (executing program) 2022/04/25 21:38:35 fetching corpus: 7550, signal 389031/450301 (executing program) 2022/04/25 21:38:35 fetching corpus: 7600, signal 389794/450972 (executing program) 2022/04/25 21:38:35 fetching corpus: 7650, signal 390709/451754 (executing program) 2022/04/25 21:38:35 fetching corpus: 7700, signal 391466/452473 (executing program) 2022/04/25 21:38:35 fetching corpus: 7750, signal 392339/453211 (executing program) 2022/04/25 21:38:35 fetching corpus: 7800, signal 393231/453901 (executing program) 2022/04/25 21:38:35 fetching corpus: 7850, signal 394138/454608 (executing program) 2022/04/25 21:38:35 fetching corpus: 7900, signal 394969/455311 (executing program) 2022/04/25 21:38:35 fetching corpus: 7950, signal 395518/455852 (executing program) 2022/04/25 21:38:36 fetching corpus: 8000, signal 396415/456526 (executing program) 2022/04/25 21:38:36 fetching corpus: 8050, signal 397013/457113 (executing program) 2022/04/25 21:38:36 fetching corpus: 8100, signal 397689/457713 (executing program) 2022/04/25 21:38:36 fetching corpus: 8150, signal 398222/458278 (executing program) 2022/04/25 21:38:36 fetching corpus: 8200, signal 399095/458927 (executing program) 2022/04/25 21:38:36 fetching corpus: 8250, signal 400406/459699 (executing program) 2022/04/25 21:38:36 fetching corpus: 8300, signal 401076/460265 (executing program) 2022/04/25 21:38:36 fetching corpus: 8350, signal 401755/460824 (executing program) 2022/04/25 21:38:36 fetching corpus: 8400, signal 402448/461352 (executing program) 2022/04/25 21:38:36 fetching corpus: 8450, signal 403028/461868 (executing program) 2022/04/25 21:38:37 fetching corpus: 8500, signal 404021/462527 (executing program) 2022/04/25 21:38:37 fetching corpus: 8550, signal 405067/463168 (executing program) 2022/04/25 21:38:37 fetching corpus: 8600, signal 405665/463680 (executing program) 2022/04/25 21:38:37 fetching corpus: 8650, signal 406277/464192 (executing program) 2022/04/25 21:38:37 fetching corpus: 8700, signal 406740/464651 (executing program) 2022/04/25 21:38:37 fetching corpus: 8750, signal 407469/465195 (executing program) 2022/04/25 21:38:37 fetching corpus: 8800, signal 408194/465729 (executing program) 2022/04/25 21:38:37 fetching corpus: 8850, signal 409045/466291 (executing program) 2022/04/25 21:38:37 fetching corpus: 8900, signal 409793/466805 (executing program) 2022/04/25 21:38:38 fetching corpus: 8950, signal 410937/467414 (executing program) 2022/04/25 21:38:38 fetching corpus: 9000, signal 411488/467851 (executing program) 2022/04/25 21:38:38 fetching corpus: 9050, signal 411845/468242 (executing program) 2022/04/25 21:38:38 fetching corpus: 9100, signal 412381/468689 (executing program) 2022/04/25 21:38:38 fetching corpus: 9150, signal 413148/469204 (executing program) 2022/04/25 21:38:38 fetching corpus: 9200, signal 413865/469678 (executing program) 2022/04/25 21:38:38 fetching corpus: 9250, signal 414543/470117 (executing program) 2022/04/25 21:38:38 fetching corpus: 9300, signal 415548/470686 (executing program) 2022/04/25 21:38:39 fetching corpus: 9350, signal 416352/471157 (executing program) 2022/04/25 21:38:39 fetching corpus: 9400, signal 417011/471613 (executing program) 2022/04/25 21:38:39 fetching corpus: 9450, signal 417552/472014 (executing program) 2022/04/25 21:38:39 fetching corpus: 9500, signal 418510/472505 (executing program) 2022/04/25 21:38:39 fetching corpus: 9550, signal 419065/472896 (executing program) 2022/04/25 21:38:39 fetching corpus: 9600, signal 419976/473347 (executing program) 2022/04/25 21:38:39 fetching corpus: 9650, signal 420581/473746 (executing program) 2022/04/25 21:38:39 fetching corpus: 9700, signal 421105/474152 (executing program) 2022/04/25 21:38:40 fetching corpus: 9750, signal 421942/474581 (executing program) 2022/04/25 21:38:40 fetching corpus: 9800, signal 422480/474952 (executing program) 2022/04/25 21:38:40 fetching corpus: 9850, signal 423111/475330 (executing program) 2022/04/25 21:38:40 fetching corpus: 9900, signal 423697/475709 (executing program) 2022/04/25 21:38:40 fetching corpus: 9950, signal 424436/476127 (executing program) 2022/04/25 21:38:40 fetching corpus: 10000, signal 425177/476517 (executing program) 2022/04/25 21:38:40 fetching corpus: 10050, signal 425867/476900 (executing program) 2022/04/25 21:38:40 fetching corpus: 10100, signal 426516/477239 (executing program) 2022/04/25 21:38:40 fetching corpus: 10150, signal 427399/477659 (executing program) 2022/04/25 21:38:41 fetching corpus: 10200, signal 428063/478004 (executing program) 2022/04/25 21:38:41 fetching corpus: 10250, signal 428679/478343 (executing program) 2022/04/25 21:38:41 fetching corpus: 10300, signal 429419/478679 (executing program) 2022/04/25 21:38:41 fetching corpus: 10350, signal 430104/479024 (executing program) 2022/04/25 21:38:41 fetching corpus: 10400, signal 430710/479342 (executing program) 2022/04/25 21:38:41 fetching corpus: 10450, signal 431183/479680 (executing program) 2022/04/25 21:38:41 fetching corpus: 10500, signal 431701/479983 (executing program) 2022/04/25 21:38:41 fetching corpus: 10550, signal 432406/480302 (executing program) 2022/04/25 21:38:42 fetching corpus: 10600, signal 433047/480600 (executing program) 2022/04/25 21:38:42 fetching corpus: 10650, signal 433569/480868 (executing program) 2022/04/25 21:38:42 fetching corpus: 10700, signal 434102/481167 (executing program) 2022/04/25 21:38:42 fetching corpus: 10750, signal 434495/481429 (executing program) 2022/04/25 21:38:42 fetching corpus: 10800, signal 434998/481686 (executing program) 2022/04/25 21:38:42 fetching corpus: 10850, signal 435474/481931 (executing program) 2022/04/25 21:38:42 fetching corpus: 10900, signal 436086/482180 (executing program) 2022/04/25 21:38:42 fetching corpus: 10950, signal 436535/482468 (executing program) 2022/04/25 21:38:43 fetching corpus: 11000, signal 436906/482699 (executing program) 2022/04/25 21:38:43 fetching corpus: 11050, signal 437403/482973 (executing program) 2022/04/25 21:38:43 fetching corpus: 11100, signal 437710/483184 (executing program) 2022/04/25 21:38:43 fetching corpus: 11150, signal 438421/483453 (executing program) 2022/04/25 21:38:43 fetching corpus: 11200, signal 438865/483683 (executing program) 2022/04/25 21:38:43 fetching corpus: 11250, signal 439514/483886 (executing program) 2022/04/25 21:38:43 fetching corpus: 11300, signal 440120/484146 (executing program) 2022/04/25 21:38:43 fetching corpus: 11350, signal 440773/484411 (executing program) 2022/04/25 21:38:43 fetching corpus: 11400, signal 441134/484622 (executing program) 2022/04/25 21:38:43 fetching corpus: 11450, signal 441947/484836 (executing program) 2022/04/25 21:38:44 fetching corpus: 11500, signal 442729/485056 (executing program) 2022/04/25 21:38:44 fetching corpus: 11550, signal 443121/485262 (executing program) 2022/04/25 21:38:44 fetching corpus: 11600, signal 443627/485464 (executing program) 2022/04/25 21:38:44 fetching corpus: 11650, signal 444211/485657 (executing program) 2022/04/25 21:38:44 fetching corpus: 11700, signal 444733/485854 (executing program) 2022/04/25 21:38:44 fetching corpus: 11750, signal 445580/486063 (executing program) 2022/04/25 21:38:44 fetching corpus: 11800, signal 446221/486259 (executing program) 2022/04/25 21:38:44 fetching corpus: 11850, signal 447078/486436 (executing program) 2022/04/25 21:38:45 fetching corpus: 11900, signal 447455/486601 (executing program) 2022/04/25 21:38:45 fetching corpus: 11950, signal 447890/486797 (executing program) 2022/04/25 21:38:45 fetching corpus: 12000, signal 448504/486953 (executing program) 2022/04/25 21:38:45 fetching corpus: 12050, signal 448987/487116 (executing program) 2022/04/25 21:38:45 fetching corpus: 12100, signal 449873/487264 (executing program) 2022/04/25 21:38:45 fetching corpus: 12150, signal 450236/487346 (executing program) 2022/04/25 21:38:45 fetching corpus: 12200, signal 450737/487346 (executing program) 2022/04/25 21:38:45 fetching corpus: 12250, signal 451205/487346 (executing program) 2022/04/25 21:38:45 fetching corpus: 12300, signal 451709/487346 (executing program) 2022/04/25 21:38:46 fetching corpus: 12350, signal 452417/487355 (executing program) 2022/04/25 21:38:46 fetching corpus: 12400, signal 452741/487355 (executing program) 2022/04/25 21:38:46 fetching corpus: 12450, signal 453283/487355 (executing program) 2022/04/25 21:38:46 fetching corpus: 12500, signal 454036/487356 (executing program) 2022/04/25 21:38:46 fetching corpus: 12550, signal 454631/487356 (executing program) 2022/04/25 21:38:46 fetching corpus: 12600, signal 455192/487356 (executing program) 2022/04/25 21:38:46 fetching corpus: 12650, signal 455698/487356 (executing program) 2022/04/25 21:38:47 fetching corpus: 12700, signal 456026/487356 (executing program) 2022/04/25 21:38:47 fetching corpus: 12750, signal 456472/487356 (executing program) 2022/04/25 21:38:47 fetching corpus: 12799, signal 456900/487358 (executing program) 2022/04/25 21:38:47 fetching corpus: 12849, signal 457506/487358 (executing program) 2022/04/25 21:38:47 fetching corpus: 12899, signal 458072/487358 (executing program) 2022/04/25 21:38:47 fetching corpus: 12949, signal 458372/487358 (executing program) 2022/04/25 21:38:47 fetching corpus: 12999, signal 458871/487358 (executing program) 2022/04/25 21:38:47 fetching corpus: 13049, signal 459613/487361 (executing program) 2022/04/25 21:38:47 fetching corpus: 13099, signal 460231/487361 (executing program) 2022/04/25 21:38:47 fetching corpus: 13149, signal 460885/487361 (executing program) 2022/04/25 21:38:47 fetching corpus: 13199, signal 461468/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13249, signal 461796/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13299, signal 462198/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13349, signal 462648/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13399, signal 463144/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13449, signal 463543/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13499, signal 463875/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13549, signal 464432/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13599, signal 464819/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13649, signal 465422/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13699, signal 465955/487361 (executing program) 2022/04/25 21:38:48 fetching corpus: 13749, signal 466314/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 13799, signal 466736/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 13849, signal 467423/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 13899, signal 467940/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 13949, signal 468419/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 13999, signal 468783/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 14049, signal 469330/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 14099, signal 469680/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 14149, signal 470245/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 14199, signal 470668/487361 (executing program) 2022/04/25 21:38:49 fetching corpus: 14249, signal 471027/487369 (executing program) 2022/04/25 21:38:50 fetching corpus: 14299, signal 471654/487369 (executing program) 2022/04/25 21:38:50 fetching corpus: 14349, signal 472249/487369 (executing program) 2022/04/25 21:38:50 fetching corpus: 14399, signal 472596/487369 (executing program) 2022/04/25 21:38:50 fetching corpus: 14449, signal 473198/487369 (executing program) 2022/04/25 21:38:50 fetching corpus: 14499, signal 473981/487369 (executing program) 2022/04/25 21:38:50 fetching corpus: 14549, signal 474418/487369 (executing program) 2022/04/25 21:38:50 fetching corpus: 14599, signal 474887/487369 (executing program) 2022/04/25 21:38:50 fetching corpus: 14649, signal 475280/487369 (executing program) 2022/04/25 21:38:51 fetching corpus: 14699, signal 475815/487369 (executing program) 2022/04/25 21:38:51 fetching corpus: 14749, signal 476240/487369 (executing program) 2022/04/25 21:38:51 fetching corpus: 14799, signal 476636/487369 (executing program) 2022/04/25 21:38:51 fetching corpus: 14849, signal 477046/487369 (executing program) 2022/04/25 21:38:51 fetching corpus: 14899, signal 477415/487369 (executing program) 2022/04/25 21:38:51 fetching corpus: 14949, signal 477727/487369 (executing program) 2022/04/25 21:38:51 fetching corpus: 14999, signal 478203/487369 (executing program) 2022/04/25 21:38:51 fetching corpus: 15043, signal 478875/487369 (executing program) 2022/04/25 21:38:51 fetching corpus: 15043, signal 478875/487369 (executing program) [ 71.115233][ T1223] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.121558][ T1223] ieee802154 phy1 wpan1: encryption failed: -22 2022/04/25 21:38:53 starting 6 fuzzer processes 21:38:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x50, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x3c, 0xe, 0x0, 0x1, [{0x38, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x31, 0x1, "9f98c0bc693d4c8bc28051c9d94a7dbd0afd5ecf191ec6ea4d4e5922aa85d2acf22df2311d29ab9f982a4903a3"}}]}]}, 0x50}}, 0x0) 21:38:53 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='utf8,errors=remount-ro,case_sensitive=yes,fmask=']) 21:38:53 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 21:38:53 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000180)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000340)={0x1f, @none}, 0x8) 21:38:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x12, &(0x7f0000000200)="f68daf50", 0x4) 21:38:53 executing program 4: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) [ 73.910181][ T3615] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 73.924935][ T3622] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 73.932002][ T3622] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 73.937134][ T3624] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 73.939478][ T3622] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 73.945952][ T3624] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 73.953159][ T3622] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 73.959883][ T3624] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 73.967455][ T3622] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 73.973757][ T3624] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 73.981148][ T3622] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 73.987885][ T3624] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 73.995301][ T3622] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 74.001740][ T3624] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 74.009181][ T3622] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 74.015740][ T3624] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 74.023178][ T3622] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 74.029627][ T3624] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 74.044618][ T3624] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 74.044809][ T3626] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 74.051810][ T3624] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 74.058572][ T3622] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 74.066256][ T3624] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 74.072450][ T3622] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 74.079933][ T3624] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 74.086322][ T3622] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 74.093818][ T3624] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 74.100118][ T3622] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 74.107351][ T3624] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 74.114338][ T3627] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 74.121402][ T3624] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 74.128206][ T3626] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 74.135303][ T3624] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 74.141947][ T3626] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 74.162074][ T3622] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 74.169772][ T3618] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 74.368091][ T3606] chnl_net:caif_netlink_parms(): no params data found [ 74.471266][ T3608] chnl_net:caif_netlink_parms(): no params data found [ 74.490944][ T3604] chnl_net:caif_netlink_parms(): no params data found [ 74.530648][ T3606] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.537916][ T3606] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.545712][ T3606] device bridge_slave_0 entered promiscuous mode [ 74.554853][ T3605] chnl_net:caif_netlink_parms(): no params data found [ 74.576919][ T3607] chnl_net:caif_netlink_parms(): no params data found [ 74.585196][ T3606] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.592251][ T3606] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.600276][ T3606] device bridge_slave_1 entered promiscuous mode [ 74.636567][ T3609] chnl_net:caif_netlink_parms(): no params data found [ 74.661811][ T3606] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.696652][ T3606] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.721890][ T3604] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.729029][ T3604] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.736863][ T3604] device bridge_slave_0 entered promiscuous mode [ 74.768745][ T3604] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.775910][ T3604] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.783435][ T3604] device bridge_slave_1 entered promiscuous mode [ 74.796328][ T3608] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.803468][ T3608] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.811120][ T3608] device bridge_slave_0 entered promiscuous mode [ 74.820852][ T3608] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.829065][ T3608] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.836681][ T3608] device bridge_slave_1 entered promiscuous mode [ 74.848217][ T3605] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.855765][ T3605] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.863286][ T3605] device bridge_slave_0 entered promiscuous mode [ 74.876943][ T3606] team0: Port device team_slave_0 added [ 74.902285][ T3605] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.909480][ T3605] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.917417][ T3605] device bridge_slave_1 entered promiscuous mode [ 74.925045][ T3606] team0: Port device team_slave_1 added [ 74.936643][ T3604] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.949983][ T3607] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.958257][ T3607] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.966122][ T3607] device bridge_slave_0 entered promiscuous mode [ 74.988098][ T3604] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.998159][ T3608] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.007326][ T3607] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.014414][ T3607] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.022124][ T3607] device bridge_slave_1 entered promiscuous mode [ 75.040442][ T3605] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.053859][ T3609] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.061047][ T3609] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.069663][ T3609] device bridge_slave_0 entered promiscuous mode [ 75.088109][ T3608] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.103690][ T3605] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.113186][ T3606] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.120498][ T3606] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.146605][ T3606] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.158470][ T3609] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.165699][ T3609] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.173250][ T3609] device bridge_slave_1 entered promiscuous mode [ 75.181273][ T3604] team0: Port device team_slave_0 added [ 75.193383][ T3607] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.207342][ T3606] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.214288][ T3606] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.240335][ T3606] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.257660][ T3604] team0: Port device team_slave_1 added [ 75.268015][ T3607] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.285210][ T3605] team0: Port device team_slave_0 added [ 75.296831][ T3609] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.310719][ T3608] team0: Port device team_slave_0 added [ 75.318352][ T3608] team0: Port device team_slave_1 added [ 75.335840][ T3605] team0: Port device team_slave_1 added [ 75.342350][ T3609] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.367625][ T3607] team0: Port device team_slave_0 added [ 75.381800][ T3604] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.388778][ T3604] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.414994][ T3604] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.437275][ T3607] team0: Port device team_slave_1 added [ 75.456128][ T3604] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.463069][ T3604] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.489433][ T3604] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.500594][ T3608] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.508698][ T3608] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.534602][ T3608] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.548078][ T3606] device hsr_slave_0 entered promiscuous mode [ 75.555300][ T3606] device hsr_slave_1 entered promiscuous mode [ 75.566678][ T3609] team0: Port device team_slave_0 added [ 75.572616][ T3605] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.579609][ T3605] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.605673][ T3605] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.618651][ T3605] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.625644][ T3605] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.651853][ T3605] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.663055][ T3608] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.670441][ T3608] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.696468][ T3608] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.721236][ T3609] team0: Port device team_slave_1 added [ 75.738175][ T3607] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.745284][ T3607] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.771530][ T3607] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.803713][ T3608] device hsr_slave_0 entered promiscuous mode [ 75.810523][ T3608] device hsr_slave_1 entered promiscuous mode [ 75.817086][ T3608] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 75.825007][ T3608] Cannot create hsr debugfs directory [ 75.830839][ T3607] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.837836][ T3607] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.863886][ T3607] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.886157][ T3604] device hsr_slave_0 entered promiscuous mode [ 75.892633][ T3604] device hsr_slave_1 entered promiscuous mode [ 75.899274][ T3604] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 75.906950][ T3604] Cannot create hsr debugfs directory [ 75.926785][ T3605] device hsr_slave_0 entered promiscuous mode [ 75.933955][ T3605] device hsr_slave_1 entered promiscuous mode [ 75.940557][ T3605] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 75.948135][ T3605] Cannot create hsr debugfs directory [ 75.953894][ T3609] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.961136][ T3609] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.987248][ T3609] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.022976][ T3609] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.029959][ T3609] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.056086][ T3609] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.100648][ T3607] device hsr_slave_0 entered promiscuous mode [ 76.107396][ T3607] device hsr_slave_1 entered promiscuous mode [ 76.113751][ T3607] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 76.121422][ T3607] Cannot create hsr debugfs directory [ 76.161936][ T3609] device hsr_slave_0 entered promiscuous mode [ 76.168497][ T3609] device hsr_slave_1 entered promiscuous mode [ 76.175188][ T3609] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 76.182736][ T3609] Cannot create hsr debugfs directory [ 76.224914][ T26] cfg80211: failed to load regulatory.db [ 76.230579][ T3259] Bluetooth: hci0: command 0x0409 tx timeout [ 76.239805][ T3259] Bluetooth: hci4: command 0x0409 tx timeout [ 76.244625][ T6] Bluetooth: hci5: command 0x0409 tx timeout [ 76.246126][ T3259] Bluetooth: hci2: command 0x0409 tx timeout [ 76.259958][ T3259] Bluetooth: hci1: command 0x0409 tx timeout [ 76.266138][ T3259] Bluetooth: hci3: command 0x0409 tx timeout [ 76.418790][ T3606] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 76.441677][ T3606] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 76.467125][ T3606] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 76.481725][ T3606] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 76.513256][ T3608] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 76.522069][ T3608] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 76.534206][ T3608] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 76.543382][ T3608] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 76.567523][ T3604] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 76.576122][ T3604] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 76.593278][ T3604] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 76.601344][ T3604] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.634336][ T3607] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 76.647411][ T3607] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 76.666621][ T3607] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 76.692195][ T3607] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 76.708110][ T3605] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 76.716837][ T3605] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 76.742778][ T3606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.750279][ T3605] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 76.783921][ T3605] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 76.803336][ T3606] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.812025][ T3609] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 76.820553][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.828268][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.841098][ T3608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.851071][ T3609] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 76.862722][ T3609] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 76.871963][ T3609] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 76.885688][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.894013][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.902329][ T3632] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.909373][ T3632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.917258][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.942786][ T3608] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.959199][ T3604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.975334][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.982834][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.990818][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.999596][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.008057][ T3659] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.015111][ T3659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.034779][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.043149][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.051807][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.060493][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.068809][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.077994][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.088201][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.095974][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.104322][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.112925][ T3659] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.120020][ T3659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.139856][ T3607] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.161476][ T3604] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.169444][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.178757][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.187419][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.196838][ T3657] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.203869][ T3657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.211443][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.220128][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.227976][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.242192][ T3606] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 77.252830][ T3606] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 77.282129][ T3607] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.291829][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.301084][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.309398][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.317515][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.325640][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.333995][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.342459][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.350957][ T3632] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.358037][ T3632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.365767][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.375224][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.383481][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.392012][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.400305][ T3632] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.407369][ T3632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.415144][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.423475][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.431883][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.440062][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.448193][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.458183][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.465850][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.473344][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.481991][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.490419][ T3632] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.497493][ T3632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.513234][ T3605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.537313][ T3608] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 77.548327][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.562276][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.570880][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.579272][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.587199][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.595594][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.603848][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.612745][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.621148][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.629581][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.638069][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.646667][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.655015][ T3632] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.662055][ T3632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.669879][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.678296][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.685720][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.695883][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.703517][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.712027][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.732632][ T3605] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.744119][ T3606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.757022][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.765860][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.773413][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.781346][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.789856][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.798294][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.806866][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.815320][ T3659] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.822369][ T3659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.830278][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.838636][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.858135][ T3609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.878730][ T3607] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 77.889518][ T3607] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 77.904405][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.912708][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.920750][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.928400][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.937213][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.945998][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.954246][ T3657] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.961360][ T3657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.968932][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.977291][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.985610][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.993125][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.000848][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.009115][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.017431][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.025612][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.035406][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.045826][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.058547][ T3604] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 78.069852][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.079791][ T3609] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.092694][ T3608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.100394][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.108800][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.119419][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.143201][ T3605] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 78.153853][ T3605] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 78.184051][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.195579][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.203990][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.213855][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.222671][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.231014][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.239332][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.247686][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.256072][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.264433][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.272819][ T3659] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.279870][ T3659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.287931][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.296392][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.306324][ T3659] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.313355][ T3659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.314835][ T3259] Bluetooth: hci4: command 0x041b tx timeout [ 78.321130][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.335369][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.343590][ T3259] Bluetooth: hci0: command 0x041b tx timeout [ 78.344207][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.358255][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.366789][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.374146][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.382641][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 78.390516][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.398830][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.406545][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 78.415544][ T3659] Bluetooth: hci3: command 0x041b tx timeout [ 78.421573][ T3659] Bluetooth: hci1: command 0x041b tx timeout [ 78.431887][ T3605] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.431980][ T3659] Bluetooth: hci2: command 0x041b tx timeout [ 78.445641][ T3604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.445810][ T3659] Bluetooth: hci5: command 0x041b tx timeout [ 78.464119][ T3607] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.472096][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.483659][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.491400][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.498984][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.506425][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.515133][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.523516][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.531892][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.539975][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.548146][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.572118][ T3606] device veth0_vlan entered promiscuous mode [ 78.580320][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.597540][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 78.613911][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.635250][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 78.645439][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.657645][ T3606] device veth1_vlan entered promiscuous mode [ 78.672994][ T3609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.695653][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.703404][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.735234][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.742758][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.780510][ T3606] device veth0_macvtap entered promiscuous mode [ 78.804226][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 78.813245][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.822847][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 78.831894][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 78.847051][ T3606] device veth1_macvtap entered promiscuous mode [ 78.855061][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 78.878153][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 78.892265][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 78.901330][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.911881][ T3608] device veth0_vlan entered promiscuous mode [ 78.927755][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.945162][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.952918][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 78.966998][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.977899][ T3606] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 79.014813][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.023320][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.038404][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.048114][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.059051][ T3608] device veth1_vlan entered promiscuous mode [ 79.072146][ T3604] device veth0_vlan entered promiscuous mode [ 79.082115][ T3606] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 79.097712][ T3605] device veth0_vlan entered promiscuous mode [ 79.118703][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 79.127686][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 79.138077][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.146503][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.154680][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.162755][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.170961][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.180794][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.189591][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.198192][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.206726][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.215143][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.223977][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.231716][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.239440][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.247151][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.258986][ T3604] device veth1_vlan entered promiscuous mode [ 79.267759][ T3606] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.276843][ T3606] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.285909][ T3606] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.294637][ T3606] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.306678][ T3608] device veth0_macvtap entered promiscuous mode [ 79.329152][ T3607] device veth0_vlan entered promiscuous mode [ 79.337132][ T3605] device veth1_vlan entered promiscuous mode [ 79.345450][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 79.353228][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 79.361878][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 79.369867][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.378578][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.387319][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.395521][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.404798][ T3608] device veth1_macvtap entered promiscuous mode [ 79.416897][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 79.424976][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.432496][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.454367][ T3605] device veth0_macvtap entered promiscuous mode [ 79.467947][ T3607] device veth1_vlan entered promiscuous mode [ 79.474763][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 79.482583][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 79.491569][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 79.499662][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.508196][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.521122][ T3608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 79.533299][ T3608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 79.544082][ T3608] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 79.552743][ T3605] device veth1_macvtap entered promiscuous mode [ 79.575943][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 79.583815][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 79.592192][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 79.600236][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.608940][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.617392][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.625886][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.634247][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.643148][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.652645][ T3608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 79.665276][ T3608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 79.676324][ T3608] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 79.684757][ T3604] device veth0_macvtap entered promiscuous mode [ 79.700384][ T3609] device veth0_vlan entered promiscuous mode [ 79.707473][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 79.716456][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.723951][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.731802][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.741315][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.752134][ T3608] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.761332][ T3608] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.770295][ T3608] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.780316][ T3608] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.791157][ T3604] device veth1_macvtap entered promiscuous mode [ 79.809643][ T3609] device veth1_vlan entered promiscuous mode [ 79.811337][ T1253] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.836238][ T1253] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.850214][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 79.858283][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.867243][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.876985][ T3607] device veth0_macvtap entered promiscuous mode [ 79.893735][ T3605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 79.904218][ T3605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 79.914764][ T3605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 79.925449][ T3605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 79.936462][ T3605] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 79.949424][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.951814][ T3604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 79.959573][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.969169][ T3604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 79.985665][ T3604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 79.998177][ T3604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.008210][ T3604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.020036][ T3604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.030820][ T3604] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.043145][ T3607] device veth1_macvtap entered promiscuous mode [ 80.052013][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 80.059970][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.068120][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.076813][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.086692][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 80.094232][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.102831][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.112699][ T3605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.123708][ T3605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.133731][ T3605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.144293][ T3605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.155894][ T3605] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.165221][ T3604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.176311][ T3604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.186529][ T3604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.197736][ T3604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.207765][ T3604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.218569][ T3604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.231721][ T3604] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.243756][ T3609] device veth0_macvtap entered promiscuous mode [ 80.261670][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.272657][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.282915][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.293646][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.303476][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.314420][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.326071][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.336726][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.348282][ T3607] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.356687][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 80.365596][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.373997][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 80.382971][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.385073][ T3659] Bluetooth: hci4: command 0x040f tx timeout [ 80.392204][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 80.405489][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.413723][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.422302][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.435695][ T3604] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.444406][ T3604] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.453877][ T3713] Bluetooth: hci0: command 0x040f tx timeout [ 80.456649][ T3604] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.469124][ T3604] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.474853][ T3632] Bluetooth: hci5: command 0x040f tx timeout [ 80.484721][ T3632] Bluetooth: hci2: command 0x040f tx timeout [ 80.487262][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.490756][ T3632] Bluetooth: hci1: command 0x040f tx timeout [ 80.505110][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.507756][ T3632] Bluetooth: hci3: command 0x040f tx timeout [ 80.519444][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.534135][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.545098][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.555537][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.566795][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.577328][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.588623][ T3607] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.598120][ T3605] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 21:39:01 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 80.608365][ T3605] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.617741][ T3605] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.627805][ T3605] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.638760][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 80.647288][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 21:39:01 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 80.656145][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.669287][ T3609] device veth1_macvtap entered promiscuous mode [ 80.683941][ T3607] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.694747][ T3607] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.703579][ T3607] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 21:39:01 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 21:39:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4cef58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a8021e00b00004e080addde36e5fdc6c42a7b3f912f6906a6e231fd223bc33091dd61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694dff0f0000000000003845404b04bf97c4fea679c032b363956cd8bac9626b5db1b07a0bd7cc85e961506a35a04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034f2fc7c855a8945e9bce678ee9a015abc9daac8876623db56346916674ceb55f60b493f2f4d737acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23ee0800000000000010a49fc8f4b9276e9dc330c9cb7fca701fcb947d6017ad27714772ad790af252e648048c313c604324f5b300000000000000cf327a8f5dd89315b8c8650a70ff2bba30ad7804fa4140f1a754ffff0000000000000066939736e67d897662bee00189f43da46ba3079f869d1ea172908a231c84cbad335fd1d2f2ef93a6a70c8b8ece0e243eab7fa34ab0a7e7e497065e5e282e8852a265d528075214af000000000070d42182d8f3a347d48289865f75331d888c72df1da4b290582f94064227f03204add786a87b23ceb17c25810e769fe2d6a7bd8e504801e747715550f843b66b1a8c7b36194ba9c8f60ac0c9b18d8c1b9e1a736825c91b4dffffff3359c117f78a36f114868ccfe32cebfd72193a5ea7c77cdb7de9ce1a59ab4158097b4dd13ebfaf4425c6855530b56a3320d85c8fe85f667998b1a7e589f4f8c107761108e4e230419fd27b6ad9c10b25c6b6ed84badbb970dcf133279dd355e41de944564bdab99c5c712a9fbc8e9691c775bb94f746505e1e748cf1710d52468b4b1625ce2161342f4c722f8491805c2b0c2ed5e807dfb5f19f3267e5366b2c0b2a0be49ae476263c9407ac6c596bf3cf66204984f5aebf93d1caa220ea6969cea852fe9a7d1eee13f1f48722af9ad9fb850bd093a302b9250245900ad5c8e5f20ddf77ee3d5a168964fad1aa7347d36c502d76b1d96d753ef6fc354fc126cab060c65c147651fca62c0a06939f40c90ebc3042e753fe9135770b24f25c558736dd7e5e9fb26fb6ef4615f4092de54c1ddbd9d25916d642c66383bd2426cb10a96f21ba6f519f4622e1224153463ea80248a45a95a189958f586d606dcaa9aac656cf95a2d35225cfb0e6f47486d5cbb04a590116d4de92e28d655c108728a189b0d537d2442beab2f8ce7b2dd357200dcd139e47267012fc2a2b6bad79be429d1ddaccbe0139f16ca1b9bc110300000000000000ed1ece54cfdbe04670bee9b42fe3dc42033997e2e700b6edb2b49b5f2f6001ed0a9e5d1bee199ce9124a5cb479040000000000000049ead5b02d5ea1dcf6cdcf332fe97e6ca4023bce2c7281d27a2cb62383ab3a3bb535650fbfb96c89936c55eb7a485698f0d20c3eedd6123ef8f218d52ea2c346f80acb8b9a71dbc1d994912a7cffee127b6a1d1ac1e243ed02e49e8aafe835919564af915965a050c35ceff855bd2dec3452c7c38f5dbf1f000000020000000000006a1a029ea6540b40b2f797813af2c7d4ed235c2dc5f1dbbfcc52b2f55fd3f9f100"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x2, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd6000000000002c00632f77", 0x0, 0x100, 0x2000000}, 0x28) [ 80.713984][ T3607] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.745241][ T3259] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.781700][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.792445][ T45] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 80.803222][ T45] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 80.810848][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.821463][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 21:39:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x2, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd6000000000002c00632f77", 0x0, 0x100, 0x2000000}, 0x28) [ 80.833452][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.844758][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.857247][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.870877][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 21:39:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x2, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd6000000000002c00632f77", 0x0, 0x100, 0x2000000}, 0x28) [ 80.882869][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.892938][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.903671][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.916789][ T3609] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.963015][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 80.974162][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.985026][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 81.004978][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.016694][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.027076][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.039028][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.049226][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.060678][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.070789][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.082244][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.092357][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.103747][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.117507][ T3609] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.139725][ T3658] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 81.148609][ T3658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 81.165181][ T45] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.173000][ T45] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.177663][ T3609] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.189891][ T3609] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.198879][ T3609] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.207810][ T3609] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.223918][ T3658] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 81.252329][ T45] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.266221][ T45] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.278912][ T91] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.289463][ T91] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.293494][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 81.305128][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 81.326540][ T91] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.335459][ T91] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.342863][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 81.407805][ T91] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.416146][ T1253] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.423962][ T1253] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.438617][ T91] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.442520][ T3732] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 81.452180][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 81.470477][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.479117][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 81.482428][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.493451][ T3732] ntfs: (device loop2): parse_options(): The fmask option requires an argument. [ 81.497110][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 81.530630][ T91] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.539010][ T45] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.547657][ T45] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.554202][ T91] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.570046][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 21:39:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x50, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x3c, 0xe, 0x0, 0x1, [{0x38, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x31, 0x1, "9f98c0bc693d4c8bc28051c9d94a7dbd0afd5ecf191ec6ea4d4e5922aa85d2acf22df2311d29ab9f982a4903a3"}}]}]}, 0x50}}, 0x0) 21:39:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x2, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd6000000000002c00632f77", 0x0, 0x100, 0x2000000}, 0x28) 21:39:02 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='utf8,errors=remount-ro,case_sensitive=yes,fmask=']) [ 81.583073][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 81.663195][ T3743] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 21:39:02 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000180)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000340)={0x1f, @none}, 0x8) 21:39:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x12, &(0x7f0000000200)="f68daf50", 0x4) 21:39:03 executing program 4: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) 21:39:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x50, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x3c, 0xe, 0x0, 0x1, [{0x38, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x31, 0x1, "9f98c0bc693d4c8bc28051c9d94a7dbd0afd5ecf191ec6ea4d4e5922aa85d2acf22df2311d29ab9f982a4903a3"}}]}]}, 0x50}}, 0x0) 21:39:03 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000180)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000340)={0x1f, @none}, 0x8) 21:39:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x12, &(0x7f0000000200)="f68daf50", 0x4) [ 81.703728][ T3743] ntfs: (device loop2): parse_options(): The fmask option requires an argument. 21:39:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x50, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x3c, 0xe, 0x0, 0x1, [{0x38, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x31, 0x1, "9f98c0bc693d4c8bc28051c9d94a7dbd0afd5ecf191ec6ea4d4e5922aa85d2acf22df2311d29ab9f982a4903a3"}}]}]}, 0x50}}, 0x0) 21:39:03 executing program 1: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) 21:39:03 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000180)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000340)={0x1f, @none}, 0x8) 21:39:03 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='utf8,errors=remount-ro,case_sensitive=yes,fmask=']) 21:39:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x12, &(0x7f0000000200)="f68daf50", 0x4) 21:39:03 executing program 5: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) 21:39:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action={@wo_ht={{}, {}, @device_b}, @ntf_ch_w}}]}, 0x3c}}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 21:39:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action={@wo_ht={{}, {}, @device_b}, @ntf_ch_w}}]}, 0x3c}}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) [ 81.890404][ T3768] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 21:39:03 executing program 4: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) 21:39:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_int(r0, 0x29, 0x1a, 0x0, &(0x7f0000000040)) 21:39:03 executing program 1: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) 21:39:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action={@wo_ht={{}, {}, @device_b}, @ntf_ch_w}}]}, 0x3c}}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) [ 81.947852][ T3768] ntfs: (device loop2): parse_options(): The fmask option requires an argument. 21:39:03 executing program 5: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) 21:39:03 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='utf8,errors=remount-ro,case_sensitive=yes,fmask=']) 21:39:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_int(r0, 0x29, 0x1a, 0x0, &(0x7f0000000040)) 21:39:03 executing program 1: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) 21:39:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action={@wo_ht={{}, {}, @device_b}, @ntf_ch_w}}]}, 0x3c}}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 21:39:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_int(r0, 0x29, 0x1a, 0x0, &(0x7f0000000040)) 21:39:03 executing program 4: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) [ 82.061548][ T3790] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 21:39:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_int(r0, 0x29, 0x1a, 0x0, &(0x7f0000000040)) 21:39:03 executing program 5: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x200, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x2001}) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0xfdffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x20002002}) close(r4) shutdown(r1, 0x0) close(r0) 21:39:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000580)={'nat\x00', 0x4, "e5a7ce10"}, &(0x7f0000000680)=0x2c) [ 82.134686][ T3790] ntfs: (device loop2): parse_options(): The fmask option requires an argument. 21:39:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000580)={'nat\x00', 0x4, "e5a7ce10"}, &(0x7f0000000680)=0x2c) 21:39:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="bc040000100021000100"/20, @ANYRES32=0x0, @ANYBLOB="c3ffffff0000000008001b0000000000940416801c0001800c0004"], 0x4bc}}, 0x0) 21:39:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCFLSH(r0, 0x8924, 0x20001100) 21:39:03 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x7f, 0x4) 21:39:03 executing program 1: r0 = gettid() r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup2(r2, r1) accept4$unix(r1, 0x0, 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0xb, &(0x7f0000000080)={0x0, 0x0, 0xfffffffc}) 21:39:03 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000022c0), 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f00000000c0)=0x10000) [ 82.272317][ T3814] device lo entered promiscuous mode [ 82.288584][ T3814] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 21:39:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000580)={'nat\x00', 0x4, "e5a7ce10"}, &(0x7f0000000680)=0x2c) 21:39:03 executing program 1: r0 = gettid() r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup2(r2, r1) accept4$unix(r1, 0x0, 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0xb, &(0x7f0000000080)={0x0, 0x0, 0xfffffffc}) 21:39:03 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000022c0), 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f00000000c0)=0x10000) 21:39:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="bc040000100021000100"/20, @ANYRES32=0x0, @ANYBLOB="c3ffffff0000000008001b0000000000940416801c0001800c0004"], 0x4bc}}, 0x0) 21:39:03 executing program 5: r0 = gettid() r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup2(r2, r1) accept4$unix(r1, 0x0, 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0xb, &(0x7f0000000080)={0x0, 0x0, 0xfffffffc}) 21:39:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000580)={'nat\x00', 0x4, "e5a7ce10"}, &(0x7f0000000680)=0x2c) 21:39:03 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000022c0), 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f00000000c0)=0x10000) [ 82.314186][ T3814] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 82.346720][ T3817] sp0: Synchronizing with TNC 21:39:03 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x7, 0x0, &(0x7f0000000080)=0x18) [ 82.420579][ T3834] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 82.434023][ T3834] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 21:39:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCFLSH(r0, 0x8924, 0x20001100) 21:39:03 executing program 1: r0 = gettid() r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup2(r2, r1) accept4$unix(r1, 0x0, 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0xb, &(0x7f0000000080)={0x0, 0x0, 0xfffffffc}) 21:39:03 executing program 5: r0 = gettid() r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup2(r2, r1) accept4$unix(r1, 0x0, 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0xb, &(0x7f0000000080)={0x0, 0x0, 0xfffffffc}) 21:39:03 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000022c0), 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f00000000c0)=0x10000) 21:39:03 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x7, 0x0, &(0x7f0000000080)=0x18) [ 82.465321][ T3656] Bluetooth: hci4: command 0x0419 tx timeout 21:39:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="bc040000100021000100"/20, @ANYRES32=0x0, @ANYBLOB="c3ffffff0000000008001b0000000000940416801c0001800c0004"], 0x4bc}}, 0x0) 21:39:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCFLSH(r0, 0x8924, 0x20001100) 21:39:03 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x7, 0x0, &(0x7f0000000080)=0x18) [ 82.536678][ T3846] sp0: Synchronizing with TNC [ 82.545244][ T26] Bluetooth: hci3: command 0x0419 tx timeout [ 82.552407][ T26] Bluetooth: hci1: command 0x0419 tx timeout [ 82.566606][ T3853] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 82.579853][ T26] Bluetooth: hci2: command 0x0419 tx timeout 21:39:03 executing program 5: r0 = gettid() r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup2(r2, r1) accept4$unix(r1, 0x0, 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0xb, &(0x7f0000000080)={0x0, 0x0, 0xfffffffc}) 21:39:03 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x7, 0x0, &(0x7f0000000080)=0x18) 21:39:03 executing program 1: r0 = gettid() r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup2(r2, r1) accept4$unix(r1, 0x0, 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0xb, &(0x7f0000000080)={0x0, 0x0, 0xfffffffc}) [ 82.593715][ T3853] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 82.604722][ T26] Bluetooth: hci5: command 0x0419 tx timeout [ 82.628357][ T26] Bluetooth: hci0: command 0x0419 tx timeout 21:39:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x24}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x13}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 21:39:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCFLSH(r0, 0x8924, 0x20001100) 21:39:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) times(0x0) 21:39:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'vlan0\x00', 0x400}) [ 82.691564][ T3857] sp0: Synchronizing with TNC 21:39:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="bc040000100021000100"/20, @ANYRES32=0x0, @ANYBLOB="c3ffffff0000000008001b0000000000940416801c0001800c0004"], 0x4bc}}, 0x0) 21:39:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x24}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x13}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 21:39:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) times(0x0) [ 82.763993][ T3879] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 21:39:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCFLSH(r0, 0x8924, 0x20001100) 21:39:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) times(0x0) 21:39:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x24}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x13}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 21:39:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x20, 0x2, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x68}}, 0x0) [ 82.805084][ T3879] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 82.831611][ T3881] sp0: Synchronizing with TNC 21:39:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'vlan0\x00', 0x400}) 21:39:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x20, 0x2, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x68}}, 0x0) [ 82.896557][ T3888] sp0: Synchronizing with TNC 21:39:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCFLSH(r0, 0x8924, 0x20001100) 21:39:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x24}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x13}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 21:39:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) times(0x0) 21:39:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x20, 0x2, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x68}}, 0x0) 21:39:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCFLSH(r0, 0x8924, 0x20001100) 21:39:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x20, 0x2, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x68}}, 0x0) 21:39:04 executing program 5: r0 = socket(0x2, 0xa, 0x0) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) [ 82.998866][ T3901] sp0: Synchronizing with TNC 21:39:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'vlan0\x00', 0x400}) 21:39:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) 21:39:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) [ 83.031905][ T3908] sp1: Synchronizing with TNC [ 83.043922][ T3910] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 21:39:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {0x0, 0x0, 0xfffffffffffffffd}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000180)={[{@stripe={'stripe', 0x3d, 0x10000}}]}) 21:39:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x698, 0x1c8, 0x1c8, 0xffffffff, 0x1c8, 0x1c8, 0x5c8, 0x5c8, 0xffffffff, 0x5c8, 0x5c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@unspec=@limit={{0x48}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @local, @loopback, @remote}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@ipv4, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}, {{@uncond, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@dst={{0x48}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast1, @private0}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @loopback}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@ipv6header={{0x28}}, @common=@ah={{0x30}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4=@broadcast, @icmp_id}}}, {{@ipv6={@private2, @remote, [], [], 'wg2\x00', 'veth0_to_team\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@remote, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x6f8) 21:39:04 executing program 5: r0 = socket(0x2, 0xa, 0x0) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) 21:39:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x698, 0x1c8, 0x1c8, 0xffffffff, 0x1c8, 0x1c8, 0x5c8, 0x5c8, 0xffffffff, 0x5c8, 0x5c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@unspec=@limit={{0x48}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @local, @loopback, @remote}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@ipv4, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}, {{@uncond, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@dst={{0x48}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast1, @private0}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @loopback}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@ipv6header={{0x28}}, @common=@ah={{0x30}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4=@broadcast, @icmp_id}}}, {{@ipv6={@private2, @remote, [], [], 'wg2\x00', 'veth0_to_team\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@remote, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x6f8) 21:39:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x7ff, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x24000044, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 21:39:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) [ 83.129840][ T3920] loop3: detected capacity change from 0 to 16383 21:39:04 executing program 5: r0 = socket(0x2, 0xa, 0x0) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) [ 83.176543][ T3920] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 83.186165][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 21:39:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x698, 0x1c8, 0x1c8, 0xffffffff, 0x1c8, 0x1c8, 0x5c8, 0x5c8, 0xffffffff, 0x5c8, 0x5c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@unspec=@limit={{0x48}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @local, @loopback, @remote}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@ipv4, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}, {{@uncond, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@dst={{0x48}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast1, @private0}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @loopback}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@ipv6header={{0x28}}, @common=@ah={{0x30}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4=@broadcast, @icmp_id}}}, {{@ipv6={@private2, @remote, [], [], 'wg2\x00', 'veth0_to_team\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@remote, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x6f8) 21:39:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x7ff, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x24000044, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 21:39:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'vlan0\x00', 0x400}) 21:39:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) [ 83.227404][ T3920] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. 21:39:04 executing program 5: r0 = socket(0x2, 0xa, 0x0) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) 21:39:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {0x0, 0x0, 0xfffffffffffffffd}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000180)={[{@stripe={'stripe', 0x3d, 0x10000}}]}) 21:39:04 executing program 0: statx(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="f79a6ece22ea803695cac51ff5fe728b65b5815f355195dba5ef241bf20f173f2ee9bf1c7a13fcc766362fa1c0f3412140b965bf9a286a04912b33b343ce178cf1b50c35eba9fc2113e2d7b9c69f4902a797d6edb5b5643d1fab81ccc1a935be0f8b0e7762e68791739b5eec05bf6b3c327e39c5ddedda", 0x77, 0x2004006d, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="0510ac4bc4e136845eef5dd7c4fdde25b2bcf516d55a1c92870c420c5721d5df3a0eff9e96b13f88bb15cd06103d36a8abec5f5a2087bbf60723c788ade1196b2706dc57034212b2a024c561f2e446f3e62242c4dd75e8ba626f45a6d112a8690cd2e70b3d723426e11a0c76e19b328ff79a", 0x72, 0x0, &(0x7f0000000200)={r0, r1+10000000}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000140)='./file1\x00', 0x0, 0x30}, 0xfffffffffffffee6) r2 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='&\x00', 0xffffffffffffffff) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='\x00', r2) 21:39:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x698, 0x1c8, 0x1c8, 0xffffffff, 0x1c8, 0x1c8, 0x5c8, 0x5c8, 0xffffffff, 0x5c8, 0x5c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@unspec=@limit={{0x48}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @local, @loopback, @remote}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@ipv4, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}, {{@uncond, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@dst={{0x48}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast1, @private0}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @loopback}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@ipv6header={{0x28}}, @common=@ah={{0x30}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4=@broadcast, @icmp_id}}}, {{@ipv6={@private2, @remote, [], [], 'wg2\x00', 'veth0_to_team\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@remote, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x6f8) [ 83.284021][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 21:39:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000140000003d0301000000000095000009000000006926000000000000bf67000000000000560600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507f3ff01000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad53010000000000840400000000000005000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:39:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)={0x1, 0x0, [{0x80000000}]}) 21:39:04 executing program 0: statx(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="f79a6ece22ea803695cac51ff5fe728b65b5815f355195dba5ef241bf20f173f2ee9bf1c7a13fcc766362fa1c0f3412140b965bf9a286a04912b33b343ce178cf1b50c35eba9fc2113e2d7b9c69f4902a797d6edb5b5643d1fab81ccc1a935be0f8b0e7762e68791739b5eec05bf6b3c327e39c5ddedda", 0x77, 0x2004006d, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="0510ac4bc4e136845eef5dd7c4fdde25b2bcf516d55a1c92870c420c5721d5df3a0eff9e96b13f88bb15cd06103d36a8abec5f5a2087bbf60723c788ade1196b2706dc57034212b2a024c561f2e446f3e62242c4dd75e8ba626f45a6d112a8690cd2e70b3d723426e11a0c76e19b328ff79a", 0x72, 0x0, &(0x7f0000000200)={r0, r1+10000000}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000140)='./file1\x00', 0x0, 0x30}, 0xfffffffffffffee6) r2 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='&\x00', 0xffffffffffffffff) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='\x00', r2) 21:39:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x7ff, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x24000044, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 21:39:04 executing program 1: statx(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="f79a6ece22ea803695cac51ff5fe728b65b5815f355195dba5ef241bf20f173f2ee9bf1c7a13fcc766362fa1c0f3412140b965bf9a286a04912b33b343ce178cf1b50c35eba9fc2113e2d7b9c69f4902a797d6edb5b5643d1fab81ccc1a935be0f8b0e7762e68791739b5eec05bf6b3c327e39c5ddedda", 0x77, 0x2004006d, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="0510ac4bc4e136845eef5dd7c4fdde25b2bcf516d55a1c92870c420c5721d5df3a0eff9e96b13f88bb15cd06103d36a8abec5f5a2087bbf60723c788ade1196b2706dc57034212b2a024c561f2e446f3e62242c4dd75e8ba626f45a6d112a8690cd2e70b3d723426e11a0c76e19b328ff79a", 0x72, 0x0, &(0x7f0000000200)={r0, r1+10000000}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000140)='./file1\x00', 0x0, 0x30}, 0xfffffffffffffee6) r2 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='&\x00', 0xffffffffffffffff) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='\x00', r2) [ 83.365305][ T3948] loop3: detected capacity change from 0 to 16383 21:39:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x7ff, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x24000044, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 21:39:04 executing program 0: statx(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="f79a6ece22ea803695cac51ff5fe728b65b5815f355195dba5ef241bf20f173f2ee9bf1c7a13fcc766362fa1c0f3412140b965bf9a286a04912b33b343ce178cf1b50c35eba9fc2113e2d7b9c69f4902a797d6edb5b5643d1fab81ccc1a935be0f8b0e7762e68791739b5eec05bf6b3c327e39c5ddedda", 0x77, 0x2004006d, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="0510ac4bc4e136845eef5dd7c4fdde25b2bcf516d55a1c92870c420c5721d5df3a0eff9e96b13f88bb15cd06103d36a8abec5f5a2087bbf60723c788ade1196b2706dc57034212b2a024c561f2e446f3e62242c4dd75e8ba626f45a6d112a8690cd2e70b3d723426e11a0c76e19b328ff79a", 0x72, 0x0, &(0x7f0000000200)={r0, r1+10000000}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000140)='./file1\x00', 0x0, 0x30}, 0xfffffffffffffee6) r2 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='&\x00', 0xffffffffffffffff) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='\x00', r2) [ 83.415864][ T3948] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 83.427226][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 83.428159][ T3954] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 21:39:04 executing program 1: statx(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="f79a6ece22ea803695cac51ff5fe728b65b5815f355195dba5ef241bf20f173f2ee9bf1c7a13fcc766362fa1c0f3412140b965bf9a286a04912b33b343ce178cf1b50c35eba9fc2113e2d7b9c69f4902a797d6edb5b5643d1fab81ccc1a935be0f8b0e7762e68791739b5eec05bf6b3c327e39c5ddedda", 0x77, 0x2004006d, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="0510ac4bc4e136845eef5dd7c4fdde25b2bcf516d55a1c92870c420c5721d5df3a0eff9e96b13f88bb15cd06103d36a8abec5f5a2087bbf60723c788ade1196b2706dc57034212b2a024c561f2e446f3e62242c4dd75e8ba626f45a6d112a8690cd2e70b3d723426e11a0c76e19b328ff79a", 0x72, 0x0, &(0x7f0000000200)={r0, r1+10000000}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000140)='./file1\x00', 0x0, 0x30}, 0xfffffffffffffee6) r2 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='&\x00', 0xffffffffffffffff) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='\x00', r2) [ 83.485726][ T3948] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. 21:39:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {0x0, 0x0, 0xfffffffffffffffd}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000180)={[{@stripe={'stripe', 0x3d, 0x10000}}]}) 21:39:04 executing program 0: statx(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="f79a6ece22ea803695cac51ff5fe728b65b5815f355195dba5ef241bf20f173f2ee9bf1c7a13fcc766362fa1c0f3412140b965bf9a286a04912b33b343ce178cf1b50c35eba9fc2113e2d7b9c69f4902a797d6edb5b5643d1fab81ccc1a935be0f8b0e7762e68791739b5eec05bf6b3c327e39c5ddedda", 0x77, 0x2004006d, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="0510ac4bc4e136845eef5dd7c4fdde25b2bcf516d55a1c92870c420c5721d5df3a0eff9e96b13f88bb15cd06103d36a8abec5f5a2087bbf60723c788ade1196b2706dc57034212b2a024c561f2e446f3e62242c4dd75e8ba626f45a6d112a8690cd2e70b3d723426e11a0c76e19b328ff79a", 0x72, 0x0, &(0x7f0000000200)={r0, r1+10000000}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000140)='./file1\x00', 0x0, 0x30}, 0xfffffffffffffee6) r2 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='&\x00', 0xffffffffffffffff) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='\x00', r2) [ 83.531377][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 21:39:04 executing program 1: statx(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="f79a6ece22ea803695cac51ff5fe728b65b5815f355195dba5ef241bf20f173f2ee9bf1c7a13fcc766362fa1c0f3412140b965bf9a286a04912b33b343ce178cf1b50c35eba9fc2113e2d7b9c69f4902a797d6edb5b5643d1fab81ccc1a935be0f8b0e7762e68791739b5eec05bf6b3c327e39c5ddedda", 0x77, 0x2004006d, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="0510ac4bc4e136845eef5dd7c4fdde25b2bcf516d55a1c92870c420c5721d5df3a0eff9e96b13f88bb15cd06103d36a8abec5f5a2087bbf60723c788ade1196b2706dc57034212b2a024c561f2e446f3e62242c4dd75e8ba626f45a6d112a8690cd2e70b3d723426e11a0c76e19b328ff79a", 0x72, 0x0, &(0x7f0000000200)={r0, r1+10000000}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000140)='./file1\x00', 0x0, 0x30}, 0xfffffffffffffee6) r2 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='&\x00', 0xffffffffffffffff) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='\x00', r2) 21:39:04 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, @desc2}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') rmdir(&(0x7f0000000340)='./file0\x00') [ 83.618327][ T3978] loop3: detected capacity change from 0 to 16383 [ 83.672619][ T3978] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 83.673373][ T3987] syz-executor.4 (pid 3987) is setting deprecated v1 encryption policy; recommend upgrading to v2. [ 83.706627][ T3987] overlayfs: failed to create directory ./file1/work (errno: 126); mounting read-only [ 83.707642][ T3978] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. 21:39:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000140000003d0301000000000095000009000000006926000000000000bf67000000000000560600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507f3ff01000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad53010000000000840400000000000005000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:39:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000040)=0x5, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000080)) 21:39:05 executing program 1: mmap$KVM_VCPU(&(0x7f0000003000/0x1000)=nil, 0x930, 0x2000005, 0x2831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0xc000)=nil, 0xc000, 0x3) 21:39:05 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short}, 0x14) 21:39:05 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, @desc2}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') rmdir(&(0x7f0000000340)='./file0\x00') 21:39:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {0x0, 0x0, 0xfffffffffffffffd}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000180)={[{@stripe={'stripe', 0x3d, 0x10000}}]}) 21:39:05 executing program 1: mmap$KVM_VCPU(&(0x7f0000003000/0x1000)=nil, 0x930, 0x2000005, 0x2831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0xc000)=nil, 0xc000, 0x3) 21:39:05 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, @desc2}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') rmdir(&(0x7f0000000340)='./file0\x00') 21:39:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000040)=0x5, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000080)) [ 84.306397][ T4000] loop3: detected capacity change from 0 to 16383 [ 84.329966][ T3997] overlayfs: failed to create directory ./file1/work (errno: 126); mounting read-only 21:39:05 executing program 1: mmap$KVM_VCPU(&(0x7f0000003000/0x1000)=nil, 0x930, 0x2000005, 0x2831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0xc000)=nil, 0xc000, 0x3) 21:39:05 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, @desc2}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') rmdir(&(0x7f0000000340)='./file0\x00') 21:39:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000040)=0x5, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000080)) [ 84.365211][ T4000] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 84.402459][ T4000] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 84.442009][ T4008] overlayfs: failed to create directory ./file1/work (errno: 126); mounting read-only [ 84.479888][ T4018] overlayfs: failed to create directory ./file1/work (errno: 126); mounting read-only 21:39:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000140000003d0301000000000095000009000000006926000000000000bf67000000000000560600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507f3ff01000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad53010000000000840400000000000005000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:39:06 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, @desc2}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') rmdir(&(0x7f0000000340)='./file0\x00') 21:39:06 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000040)=0x5, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000080)) 21:39:06 executing program 1: mmap$KVM_VCPU(&(0x7f0000003000/0x1000)=nil, 0x930, 0x2000005, 0x2831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0xc000)=nil, 0xc000, 0x3) 21:39:06 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, @desc2}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') rmdir(&(0x7f0000000340)='./file0\x00') 21:39:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x9, 0x3, 0x7f, 0x4e}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@jmp={0x5, 0x0, 0x3, 0x0, 0x7}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000280)='syzkaller\x00', 0x7, 0xbc, &(0x7f00000002c0)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:39:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x9, 0x3, 0x7f, 0x4e}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@jmp={0x5, 0x0, 0x3, 0x0, 0x7}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000280)='syzkaller\x00', 0x7, 0xbc, &(0x7f00000002c0)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:39:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 21:39:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1}, 0x8, 0x10, 0x0}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xb, 0x80, 0x2, 0xbf22, 0x85}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000000), &(0x7f0000002100)=""/4096}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140), &(0x7f0000000180)=""/45}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f0000001940), &(0x7f0000002100)=""/4090}, 0x20) [ 85.045302][ T4024] overlayfs: failed to create directory ./file1/work (errno: 126); mounting read-only 21:39:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1}, 0x8, 0x10, 0x0}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xb, 0x80, 0x2, 0xbf22, 0x85}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000000), &(0x7f0000002100)=""/4096}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140), &(0x7f0000000180)=""/45}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f0000001940), &(0x7f0000002100)=""/4090}, 0x20) 21:39:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 21:39:06 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, @desc2}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') rmdir(&(0x7f0000000340)='./file0\x00') [ 85.087338][ T4027] overlayfs: failed to create directory ./file1/work (errno: 126); mounting read-only [ 85.201926][ T4044] overlayfs: failed to create directory ./file1/work (errno: 126); mounting read-only 21:39:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000140000003d0301000000000095000009000000006926000000000000bf67000000000000560600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507f3ff01000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad53010000000000840400000000000005000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:39:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x9, 0x3, 0x7f, 0x4e}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@jmp={0x5, 0x0, 0x3, 0x0, 0x7}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000280)='syzkaller\x00', 0x7, 0xbc, &(0x7f00000002c0)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:39:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 21:39:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1}, 0x8, 0x10, 0x0}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xb, 0x80, 0x2, 0xbf22, 0x85}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000000), &(0x7f0000002100)=""/4096}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140), &(0x7f0000000180)=""/45}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f0000001940), &(0x7f0000002100)=""/4090}, 0x20) 21:39:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1}, 0x8, 0x10, 0x0}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xb, 0x80, 0x2, 0xbf22, 0x85}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000000), &(0x7f0000002100)=""/4096}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140), &(0x7f0000000180)=""/45}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f0000001940), &(0x7f0000002100)=""/4090}, 0x20) 21:39:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r2, 0x4068aea3, &(0x7f0000000100)) 21:39:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 21:39:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1}, 0x8, 0x10, 0x0}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xb, 0x80, 0x2, 0xbf22, 0x85}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000000), &(0x7f0000002100)=""/4096}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140), &(0x7f0000000180)=""/45}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f0000001940), &(0x7f0000002100)=""/4090}, 0x20) 21:39:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1}, 0x8, 0x10, 0x0}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xb, 0x80, 0x2, 0xbf22, 0x85}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000000), &(0x7f0000002100)=""/4096}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140), &(0x7f0000000180)=""/45}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f0000001940), &(0x7f0000002100)=""/4090}, 0x20) 21:39:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x9, 0x3, 0x7f, 0x4e}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@jmp={0x5, 0x0, 0x3, 0x0, 0x7}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000280)='syzkaller\x00', 0x7, 0xbc, &(0x7f00000002c0)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:39:07 executing program 2: syz_clone(0x40805000, 0x0, 0x0, &(0x7f0000001040), 0x0, 0x0) 21:39:07 executing program 1: syz_clone(0x41002400, 0x0, 0x0, 0x0, 0x0, 0x0) 21:39:07 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000180)=[0x0]) socket$nl_netfilter(0x10, 0x3, 0xc) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x80}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x1060}}], 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f00000001c0)=0x10001) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0xa00, 0xfffffffffffffd83, 0xfa00, {0x0, 0x0}}, 0xfdbc) 21:39:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1}, 0x8, 0x10, 0x0}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xb, 0x80, 0x2, 0xbf22, 0x85}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000000), &(0x7f0000002100)=""/4096}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140), &(0x7f0000000180)=""/45}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f0000001940), &(0x7f0000002100)=""/4090}, 0x20) 21:39:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610100000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010001fe870325132510000e870325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c453120202020202020001fe870325132510000e870325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c453220202020202020001fe870325132510000e870325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c20001fe870325132510000e8703251070064000000", 0x120, 0x11000}, {&(0x7f0000010800)="2e2020202020202020202010001fe870325132510000e87032510300000000002e2e20202020202020202010001fe870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020001fe870325132510000e870325104001a040000", 0x80, 0x51000}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x91000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0xd1000}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x151000}], 0x0, &(0x7f0000011000)) 21:39:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r2, 0x4068aea3, &(0x7f0000000100)) 21:39:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x275204bb}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 21:39:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0x68, 0x30, 0x3ed, 0x0, 0x0, {}, [{0x54, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x0, 0x0, 0x34000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 21:39:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:07 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x3, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000140)=@lang_id={0x4}}, {0x2, &(0x7f0000000240)=@string={0x2}}]}) [ 86.379586][ T4079] loop3: detected capacity change from 0 to 5392 21:39:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0x68, 0x30, 0x3ed, 0x0, 0x0, {}, [{0x54, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x0, 0x0, 0x34000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 21:39:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0x68, 0x30, 0x3ed, 0x0, 0x0, {}, [{0x54, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x0, 0x0, 0x34000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 21:39:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0x4c, 0x4) [ 86.491595][ T4092] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:39:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0x4c, 0x4) [ 86.806164][ T3632] usb 5-1: new high-speed USB device number 2 using dummy_hcd 21:39:08 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000180)=[0x0]) socket$nl_netfilter(0x10, 0x3, 0xc) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x80}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x1060}}], 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f00000001c0)=0x10001) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0xa00, 0xfffffffffffffd83, 0xfa00, {0x0, 0x0}}, 0xfdbc) 21:39:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0x68, 0x30, 0x3ed, 0x0, 0x0, {}, [{0x54, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x0, 0x0, 0x34000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 21:39:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0x4c, 0x4) 21:39:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r2, 0x4068aea3, &(0x7f0000000100)) [ 87.185252][ T3632] usb 5-1: config 1 interface 0 altsetting 3 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 87.198532][ T3632] usb 5-1: config 1 interface 0 has no altsetting 0 21:39:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0x4c, 0x4) [ 87.313017][ T4119] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 87.404842][ T3632] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 87.423478][ T3632] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 87.438416][ T3632] usb 5-1: Product: syz [ 87.446026][ T3632] usb 5-1: SerialNumber: syz [ 87.495426][ T3632] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 87.697704][ T22] usb 5-1: USB disconnect, device number 2 21:39:09 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000040)={{0xff}}) 21:39:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r2, 0x4068aea3, &(0x7f0000000100)) 21:39:09 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000180)=[0x0]) socket$nl_netfilter(0x10, 0x3, 0xc) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x80}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x1060}}], 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f00000001c0)=0x10001) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0xa00, 0xfffffffffffffd83, 0xfa00, {0x0, 0x0}}, 0xfdbc) 21:39:09 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000040)={{0xff}}) [ 88.241701][ T4132] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:39:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:09 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000040)={{0xff}}) 21:39:09 executing program 0: unshare(0x20000000) syz_clone(0x201000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:39:09 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000040)={{0xff}}) 21:39:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:09 executing program 4: sendto(0xffffffffffffffff, &(0x7f00000000c0)="120000001200e7", 0x7, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 21:39:09 executing program 0: unshare(0x20000000) syz_clone(0x201000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:39:09 executing program 4: sendto(0xffffffffffffffff, &(0x7f00000000c0)="120000001200e7", 0x7, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 21:39:09 executing program 4: sendto(0xffffffffffffffff, &(0x7f00000000c0)="120000001200e7", 0x7, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 21:39:10 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000180)=[0x0]) socket$nl_netfilter(0x10, 0x3, 0xc) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x80}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x1060}}], 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f00000001c0)=0x10001) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0xa00, 0xfffffffffffffd83, 0xfa00, {0x0, 0x0}}, 0xfdbc) 21:39:10 executing program 4: sendto(0xffffffffffffffff, &(0x7f00000000c0)="120000001200e7", 0x7, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 21:39:10 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='udf\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) 21:39:10 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f00000002c0)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) sendmsg$tipc(r1, &(0x7f0000000440)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 21:39:10 executing program 0: unshare(0x20000000) syz_clone(0x201000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:39:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000005c0)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x58) sendto$inet(r0, &(0x7f0000000580)="8f", 0x20000581, 0x400c040, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="90"], 0x90}, 0x40007) close(r0) 21:39:10 executing program 4: r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0xed}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x3}) madvise(&(0x7f00009b7000/0x2000)=nil, 0x2000, 0x4) r1 = dup(r0) ioctl$UFFDIO_CONTINUE(r1, 0xc020aa07, 0x0) [ 89.120815][ T4180] I/O error, dev loop10, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 89.164025][ T4180] I/O error, dev loop10, sector 256 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 89.184167][ T4180] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 89.205158][ T4180] I/O error, dev loop10, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 21:39:10 executing program 0: unshare(0x20000000) syz_clone(0x201000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 89.215671][ T4180] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 89.226112][ T4180] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found [ 89.233966][ T4180] UDF-fs: Scanning with blocksize 512 failed [ 89.240748][ T4180] I/O error, dev loop10, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 89.250508][ T4180] I/O error, dev loop10, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 21:39:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff7c, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r0) [ 89.276076][ T4180] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 21:39:10 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x20, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) [ 89.319874][ T4180] I/O error, dev loop10, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 89.340001][ T4180] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 89.362384][ T4180] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found 21:39:10 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x20, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) [ 89.375358][ T4180] UDF-fs: Scanning with blocksize 1024 failed [ 89.382200][ T4180] I/O error, dev loop10, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 89.406694][ T4180] I/O error, dev loop10, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 21:39:10 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x20, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) [ 89.422170][ T4180] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 89.436234][ T4180] I/O error, dev loop10, sector 2048 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 89.455515][ T4180] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 89.465572][ T4180] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found [ 89.473441][ T4180] UDF-fs: Scanning with blocksize 2048 failed [ 89.480614][ T4180] I/O error, dev loop10, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 89.491665][ T4180] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 89.502532][ T4180] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 89.513239][ T4180] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found [ 89.521160][ T4180] UDF-fs: Scanning with blocksize 4096 failed [ 89.528076][ T4180] UDF-fs: warning (device loop10): udf_fill_super: No partition found (1) 21:39:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') getdents(r0, &(0x7f0000000100)=""/243, 0x18) getdents64(r0, &(0x7f0000000200)=""/4096, 0x1000) 21:39:11 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x20, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) 21:39:11 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x8802, 0x0) write$UHID_INPUT(r0, 0x0, 0x0) 21:39:11 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='udf\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) 21:39:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) prlimit64(0x0, 0x0, &(0x7f0000000280)={0xffff}, &(0x7f00000002c0)) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r4, r5, 0x0, 0x10000) open(&(0x7f0000000100)='./file0\x00', 0x4c0000, 0x0) 21:39:11 executing program 4: r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0xed}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x3}) madvise(&(0x7f00009b7000/0x2000)=nil, 0x2000, 0x4) r1 = dup(r0) ioctl$UFFDIO_CONTINUE(r1, 0xc020aa07, 0x0) 21:39:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') getdents(r0, &(0x7f0000000100)=""/243, 0x18) getdents64(r0, &(0x7f0000000200)=""/4096, 0x1000) 21:39:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') getdents(r0, &(0x7f0000000100)=""/243, 0x18) getdents64(r0, &(0x7f0000000200)=""/4096, 0x1000) 21:39:11 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="53000000070000ab"], 0x53) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) [ 89.990614][ T4210] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 90.002074][ T4210] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 90.019534][ T4210] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found 21:39:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') getdents(r0, &(0x7f0000000100)=""/243, 0x18) getdents64(r0, &(0x7f0000000200)=""/4096, 0x1000) 21:39:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') getdents(r0, &(0x7f0000000100)=""/243, 0x18) getdents64(r0, &(0x7f0000000200)=""/4096, 0x1000) [ 90.068837][ T4210] UDF-fs: Scanning with blocksize 512 failed [ 90.106366][ T4210] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 21:39:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') getdents(r0, &(0x7f0000000100)=""/243, 0x18) getdents64(r0, &(0x7f0000000200)=""/4096, 0x1000) [ 90.238265][ T27] audit: type=1804 audit(1650922751.432:2): pid=4229 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir3872099287/syzkaller.UTPLFe/26/bus" dev="sda1" ino=1173 res=1 errno=0 21:39:11 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="53000000070000ab"], 0x53) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) [ 90.298692][ T4210] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 90.508168][ T4210] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found 21:39:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') getdents(r0, &(0x7f0000000100)=""/243, 0x18) getdents64(r0, &(0x7f0000000200)=""/4096, 0x1000) [ 90.621561][ T4210] UDF-fs: Scanning with blocksize 1024 failed [ 90.639491][ T27] audit: type=1800 audit(1650922751.432:3): pid=4229 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1173 res=0 errno=0 21:39:11 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000e80)={{0x12, 0x1, 0x0, 0x29, 0xfe, 0x6f, 0x40, 0x46d, 0xa0e, 0x42aa, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3}}]}}]}}, 0x0) [ 90.665311][ T4210] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 90.694795][ T4210] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 90.719113][ T4210] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found [ 90.755282][ T4210] UDF-fs: Scanning with blocksize 2048 failed [ 90.764187][ T4210] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 90.775510][ T4210] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 90.786017][ T4210] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found [ 90.793911][ T4210] UDF-fs: Scanning with blocksize 4096 failed 21:39:12 executing program 0: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f0000000080)='./bus\x00', 0x11250c2, 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r2, 0x208200) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 90.800305][ T4210] UDF-fs: warning (device loop10): udf_fill_super: No partition found (1) [ 90.852781][ T27] audit: type=1800 audit(1650922752.102:4): pid=4243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=1169 res=0 errno=0 21:39:12 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="53000000070000ab"], 0x53) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) 21:39:12 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='udf\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) 21:39:12 executing program 4: r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0xed}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x3}) madvise(&(0x7f00009b7000/0x2000)=nil, 0x2000, 0x4) r1 = dup(r0) ioctl$UFFDIO_CONTINUE(r1, 0xc020aa07, 0x0) 21:39:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) prlimit64(0x0, 0x0, &(0x7f0000000280)={0xffff}, &(0x7f00000002c0)) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r4, r5, 0x0, 0x10000) open(&(0x7f0000000100)='./file0\x00', 0x4c0000, 0x0) [ 90.956357][ T4246] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 90.967305][ T4246] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 90.977098][ T4246] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found [ 90.986182][ T4246] UDF-fs: Scanning with blocksize 512 failed [ 90.992753][ T4246] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 91.004200][ T4246] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 [ 91.015827][ T4246] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found [ 91.023957][ T4246] UDF-fs: Scanning with blocksize 1024 failed [ 91.031651][ T4246] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 91.043111][ T4246] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 21:39:12 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="53000000070000ab"], 0x53) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) [ 91.059435][ T4246] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found [ 91.079958][ T4246] UDF-fs: Scanning with blocksize 2048 failed [ 91.086889][ T4246] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=256, location=256 [ 91.097786][ T4246] UDF-fs: error (device loop10): udf_read_tagged: read failed, block=512, location=512 21:39:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) prlimit64(0x0, 0x0, &(0x7f0000000280)={0xffff}, &(0x7f00000002c0)) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r4, r5, 0x0, 0x10000) open(&(0x7f0000000100)='./file0\x00', 0x4c0000, 0x0) [ 91.108099][ T4246] UDF-fs: warning (device loop10): udf_load_vrs: No anchor found [ 91.117207][ T4246] UDF-fs: Scanning with blocksize 4096 failed [ 91.123385][ T4246] UDF-fs: warning (device loop10): udf_fill_super: No partition found (1) [ 195.934529][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 195.941147][ C0] rcu: 0-...!: (1 GPs behind) idle=79f/1/0x4000000000000000 softirq=7495/7497 fqs=15 [ 195.950770][ C0] (t=10501 jiffies g=6541 q=337 ncpus=2) [ 195.956467][ C0] rcu: rcu_preempt kthread starved for 10408 jiffies! g6541 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 195.967554][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 195.977498][ C0] rcu: RCU grace-period kthread stack dump: [ 195.983361][ C0] task:rcu_preempt state:R running task stack:28680 pid: 16 ppid: 2 flags:0x00004000 [ 195.994130][ C0] Call Trace: [ 195.997406][ C0] [ 196.000321][ C0] __schedule+0xa9a/0x4cc0 [ 196.004753][ C0] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 196.010542][ C0] ? trace_hardirqs_on+0x56/0x1c0 [ 196.015556][ C0] ? __mod_timer+0x83c/0xe30 [ 196.020131][ C0] ? io_schedule_timeout+0x140/0x140 [ 196.025403][ C0] ? lock_acquire+0x480/0x570 [ 196.030077][ C0] ? debug_object_free+0x350/0x350 [ 196.035182][ C0] schedule+0xd2/0x1f0 [ 196.039251][ C0] schedule_timeout+0x14a/0x2a0 [ 196.044094][ C0] ? usleep_range_state+0x1b0/0x1b0 [ 196.049283][ C0] ? destroy_timer_on_stack+0x20/0x20 [ 196.054640][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 196.060432][ C0] ? prepare_to_swait_event+0xee/0x470 [ 196.065878][ C0] rcu_gp_fqs_loop+0x1c0/0x840 [ 196.070629][ C0] ? force_qs_rnp+0x800/0x800 [ 196.075287][ C0] ? _raw_spin_lock_irqsave+0x41/0x50 [ 196.080645][ C0] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 196.086439][ C0] rcu_gp_kthread+0x1de/0x320 [ 196.091103][ C0] ? rcu_gp_init+0x1430/0x1430 [ 196.095853][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 196.102080][ C0] ? __kthread_parkme+0x15f/0x220 [ 196.107094][ C0] ? rcu_gp_init+0x1430/0x1430 [ 196.111841][ C0] kthread+0x2e9/0x3a0 [ 196.115891][ C0] ? kthread_complete_and_exit+0x40/0x40 [ 196.121508][ C0] ret_from_fork+0x1f/0x30 [ 196.125917][ C0] [ 196.128919][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 196.135233][ C0] Sending NMI from CPU 0 to CPUs 1: [ 196.140430][ C1] NMI backtrace for cpu 1 [ 196.140441][ C1] CPU: 1 PID: 4242 Comm: syz-executor.0 Not tainted 5.18.0-rc3-next-20220422-syzkaller #0 [ 196.140464][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.140477][ C1] RIP: 0010:kvm_wait+0x98/0x100 [ 196.140536][ C1] Code: fa 83 e2 07 38 d0 7f 04 84 c0 75 63 0f b6 07 40 38 c6 74 35 48 83 c4 10 c3 c3 e8 23 91 4b 00 eb 07 0f 00 2d da b1 94 08 fb f4 <48> 83 c4 10 c3 89 74 24 0c 48 89 3c 24 e8 56 8f 4b 00 8b 74 24 0c [ 196.140557][ C1] RSP: 0018:ffffc90013737c08 EFLAGS: 00000246 [ 196.140575][ C1] RAX: 0000000000000007 RBX: ffff8880b9c3ae40 RCX: 1ffffffff1b73199 [ 196.140589][ C1] RDX: 0000000000000000 RSI: ffffffff81807171 RDI: ffffffff8134dffd [ 196.140604][ C1] RBP: ffff8880b9d3ae54 R08: 0000000000000000 R09: 0000000000000000 [ 196.140618][ C1] R10: ffffffff81807158 R11: 0000000000000000 R12: ffffed10173875ca [ 196.140632][ C1] R13: ffff8880b9c3ae54 R14: dffffc0000000000 R15: ffff8880b9d3ae40 [ 196.140647][ C1] FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 196.140668][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 196.140683][ C1] CR2: 0000001b2c928000 CR3: 000000001d9a0000 CR4: 00000000003506e0 [ 196.140697][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 196.140710][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 196.140724][ C1] Call Trace: [ 196.140730][ C1] [ 196.140738][ C1] __pv_queued_spin_lock_slowpath+0x6d8/0xb50 [ 196.140765][ C1] ? trace_contention_end.constprop.0+0x1b0/0x1b0 [ 196.140788][ C1] ? rcu_read_lock_sched_held+0xd/0x70 [ 196.140820][ C1] ? lock_acquire+0x480/0x570 [ 196.140854][ C1] ? lock_release+0x780/0x780 [ 196.140888][ C1] do_raw_spin_lock+0x200/0x2a0 [ 196.140909][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 196.140930][ C1] ? lock_release+0x560/0x780 [ 196.140973][ C1] mm_update_next_owner+0x21a/0x7a0 [ 196.141013][ C1] do_exit+0xa0a/0x2a00 [ 196.141044][ C1] ? lock_release+0x560/0x780 [ 196.141075][ C1] ? do_group_exit+0x190/0x2f0 [ 196.141108][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 196.141142][ C1] ? mm_update_next_owner+0x7a0/0x7a0 [ 196.141176][ C1] ? signal_wake_up_state+0x4e/0x60 [ 196.141212][ C1] do_group_exit+0xd2/0x2f0 [ 196.141247][ C1] __x64_sys_exit_group+0x3a/0x50 [ 196.141280][ C1] do_syscall_64+0x35/0xb0 [ 196.141313][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 196.141343][ C1] RIP: 0033:0x7f2c45c890e9 [ 196.141358][ C1] Code: Unable to access opcode bytes at RIP 0x7f2c45c890bf. [ 196.141367][ C1] RSP: 002b:00007ffc0debe508 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 196.141388][ C1] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f2c45c890e9 [ 196.141402][ C1] RDX: 00007f2c45c3bd2b RSI: ffffffffffffffb8 RDI: 0000000000000000 [ 196.141417][ C1] RBP: 0000000000000000 R08: 0000000048f5edc8 R09: 0000000000000000 [ 196.141430][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.141443][ C1] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffc0debe5f0 [ 196.141463][ C1] [ 196.142413][ C0] NMI backtrace for cpu 0 [ 196.444558][ C0] CPU: 0 PID: 4243 Comm: syz-executor.0 Not tainted 5.18.0-rc3-next-20220422-syzkaller #0 [ 196.454427][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.464469][ C0] Call Trace: [ 196.467738][ C0] [ 196.470566][ C0] dump_stack_lvl+0xcd/0x134 [ 196.475150][ C0] nmi_cpu_backtrace.cold+0x47/0x144 [ 196.480429][ C0] ? lapic_can_unplug_cpu+0x80/0x80 [ 196.485610][ C0] nmi_trigger_cpumask_backtrace+0x1e6/0x230 [ 196.491581][ C0] rcu_dump_cpu_stacks+0x262/0x3f0 [ 196.496677][ C0] rcu_sched_clock_irq.cold+0x144/0x8fc [ 196.502210][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 196.507655][ C0] ? lock_acquire+0x480/0x570 [ 196.512321][ C0] ? rcutree_dead_cpu+0x30/0x30 [ 196.517156][ C0] ? lock_release+0x560/0x780 [ 196.521819][ C0] ? lock_release+0x780/0x780 [ 196.526483][ C0] ? tick_sched_timer+0x27/0x120 [ 196.531411][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 196.536247][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 196.542037][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 196.547488][ C0] ? tick_sched_do_timer+0x470/0x470 [ 196.552761][ C0] update_process_times+0x16d/0x200 [ 196.557940][ C0] tick_sched_handle+0x9b/0x180 [ 196.562776][ C0] tick_sched_timer+0xee/0x120 [ 196.567529][ C0] __hrtimer_run_queues+0x1c0/0xe50 [ 196.572712][ C0] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 196.578672][ C0] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 196.584731][ C0] hrtimer_interrupt+0x31c/0x790 [ 196.589654][ C0] __sysvec_apic_timer_interrupt+0x146/0x530 [ 196.595625][ C0] sysvec_apic_timer_interrupt+0x40/0xc0 [ 196.601238][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 196.607210][ C0] RIP: 0010:kvm_wait+0x98/0x100 [ 196.612042][ C0] Code: fa 83 e2 07 38 d0 7f 04 84 c0 75 63 0f b6 07 40 38 c6 74 35 48 83 c4 10 c3 c3 e8 23 91 4b 00 eb 07 0f 00 2d da b1 94 08 fb f4 <48> 83 c4 10 c3 89 74 24 0c 48 89 3c 24 e8 56 8f 4b 00 8b 74 24 0c [ 196.631628][ C0] RSP: 0018:ffffc900000075f8 EFLAGS: 00000246 [ 196.637675][ C0] RAX: 0000000000000007 RBX: 0000000000000000 RCX: 1ffffffff1b73199 [ 196.645628][ C0] RDX: 0000000000000000 RSI: ffffffff81807171 RDI: ffffffff8134dffd [ 196.653577][ C0] RBP: ffff888077a6c448 R08: 0000000000000000 R09: 0000000000000000 [ 196.661531][ C0] R10: ffffffff81807158 R11: 0000000000000001 R12: 0000000000000000 [ 196.669481][ C0] R13: ffffed100ef4d889 R14: 0000000000000001 R15: ffff8880b9c3ae40 [ 196.677436][ C0] ? trace_hardirqs_on+0x38/0x1c0 [ 196.682452][ C0] ? trace_hardirqs_on+0x51/0x1c0 [ 196.687460][ C0] ? kvm_wait+0x8d/0x100 [ 196.691703][ C0] ? kvm_wait+0x8d/0x100 [ 196.695925][ C0] __pv_queued_spin_lock_slowpath+0x8c7/0xb50 [ 196.701975][ C0] ? trace_contention_end.constprop.0+0x1b0/0x1b0 [ 196.708372][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 196.713821][ C0] ? lock_acquire+0x480/0x570 [ 196.718487][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 196.724709][ C0] ? debug_locks_off+0x23/0x80 [ 196.729457][ C0] do_raw_spin_lock+0x200/0x2a0 [ 196.734290][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 196.739206][ C0] ? wg_expired_send_keepalive+0x1d/0x340 [ 196.744914][ C0] __get_task_comm+0x23/0x50 [ 196.749490][ C0] __set_page_owner+0x253/0x380 [ 196.754320][ C0] get_page_from_freelist+0xba2/0x3e00 [ 196.759763][ C0] ? ip6_finish_output2+0x58e/0x1500 [ 196.765031][ C0] ? neigh_connected_output+0x3be/0x510 [ 196.770557][ C0] ? ip6_finish_output2+0x58e/0x1500 [ 196.775824][ C0] ? __local_bh_enable_ip+0xa0/0x120 [ 196.781091][ C0] ? ip6_finish_output2+0x5c1/0x1500 [ 196.786355][ C0] ? __zone_watermark_ok+0x450/0x450 [ 196.791625][ C0] ? prepare_alloc_pages+0x17b/0x570 [ 196.796960][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 196.802410][ C0] __alloc_pages+0x1b2/0x500 [ 196.806980][ C0] ? __alloc_pages_slowpath.constprop.0+0x20a0/0x20a0 [ 196.813724][ C0] ? lock_acquire+0x480/0x570 [ 196.818394][ C0] ? lock_acquire+0x480/0x570 [ 196.823057][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 196.828505][ C0] ? lock_release+0x560/0x780 [ 196.833167][ C0] ? lock_release+0x780/0x780 [ 196.837828][ C0] ? __slab_alloc.constprop.0+0x4d/0xa0 [ 196.843360][ C0] alloc_pages+0x1aa/0x310 [ 196.847767][ C0] allocate_slab+0x26c/0x3c0 [ 196.852341][ C0] ___slab_alloc+0x985/0xd90 [ 196.856920][ C0] ? __alloc_skb+0x215/0x340 [ 196.861497][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 196.866943][ C0] ? lock_release+0x560/0x780 [ 196.871621][ C0] ? addrconf_rs_timer+0x2aa/0x820 [ 196.876729][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 196.881570][ C0] ? __alloc_skb+0x215/0x340 [ 196.886146][ C0] __slab_alloc.constprop.0+0x4d/0xa0 [ 196.891505][ C0] kmem_cache_alloc_node+0x122/0x3f0 [ 196.896773][ C0] ? __alloc_skb+0x215/0x340 [ 196.901349][ C0] __alloc_skb+0x215/0x340 [ 196.905753][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 196.910675][ C0] ? wg_expired_retransmit_handshake+0x5a0/0x5a0 [ 196.916997][ C0] wg_packet_send_keepalive+0x6e/0x300 [ 196.922446][ C0] wg_expired_send_keepalive+0x1d/0x340 [ 196.927977][ C0] call_timer_fn+0x1a5/0x6b0 [ 196.932549][ C0] ? timer_fixup_activate+0x350/0x350 [ 196.937900][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 196.942741][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 196.947662][ C0] ? __next_timer_interrupt+0x244/0x2c0 [ 196.953187][ C0] ? wg_expired_retransmit_handshake+0x5a0/0x5a0 [ 196.959503][ C0] ? wg_expired_retransmit_handshake+0x5a0/0x5a0 [ 196.965828][ C0] __run_timers.part.0+0x679/0xa80 [ 196.970926][ C0] ? call_timer_fn+0x6b0/0x6b0 [ 196.975675][ C0] ? kvm_sched_clock_read+0x14/0x40 [ 196.980872][ C0] ? sched_clock_cpu+0x15/0x1f0 [ 196.985713][ C0] ? tick_program_event+0xb4/0x140 [ 196.990815][ C0] run_timer_softirq+0xb3/0x1d0 [ 196.995647][ C0] __do_softirq+0x29b/0x9c2 [ 197.000145][ C0] __irq_exit_rcu+0x123/0x180 [ 197.004811][ C0] irq_exit_rcu+0x5/0x20 [ 197.009034][ C0] sysvec_apic_timer_interrupt+0x93/0xc0 [ 197.014670][ C0] [ 197.017581][ C0] [ 197.020495][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 197.026461][ C0] RIP: 0010:strscpy+0xae/0x2a0 [ 197.031216][ C0] Code: 08 4c 89 e6 4c 29 ee 4c 29 e8 48 83 f8 07 0f 86 a1 00 00 00 4a 8d 3c 2b e8 3f ff ff ff 48 89 c6 48 f7 d0 4a 8d 3c 36 48 21 f8 <4b> 8d 3c 2f 48 21 e8 74 a7 48 8d 48 ff 48 f7 d0 49 89 f8 48 21 c8 [ 197.050821][ C0] RSP: 0018:ffffc9001345f0c0 EFLAGS: 00000286 [ 197.056870][ C0] RAX: feff0f0101000300 RBX: ffff888077a6c330 RCX: ffffffff841f6e0e [ 197.064820][ C0] RDX: ffffed100ef4d868 RSI: 0000302e726f7475 RDI: feff2f2d716e7374 [ 197.072772][ C0] RBP: 8080808080808080 R08: 0000000000000000 R09: ffff888077a6c338 [ 197.080724][ C0] R10: ffffed100ef4d867 R11: 0000000000000001 R12: 0000000000000010 [ 197.088679][ C0] R13: 0000000000000008 R14: fefefefefefefeff R15: ffff88801390a1a8 [ 197.096637][ C0] ? read_word_at_a_time+0xe/0x20 [ 197.101674][ C0] strscpy_pad+0x20/0x70 [ 197.105907][ C0] __get_task_comm+0x35/0x50 [ 197.110484][ C0] __set_page_owner+0x253/0x380 [ 197.115338][ C0] get_page_from_freelist+0xba2/0x3e00 [ 197.120787][ C0] ? lock_release+0x780/0x780 [ 197.125451][ C0] ? lock_release+0x560/0x780 [ 197.130114][ C0] ? prepare_alloc_pages+0x164/0x570 [ 197.135381][ C0] ? __zone_watermark_ok+0x450/0x450 [ 197.140653][ C0] ? prepare_alloc_pages+0x415/0x570 [ 197.145932][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.152155][ C0] ? alloc_vmap_area+0xb27/0x1f00 [ 197.157165][ C0] __alloc_pages+0x1b2/0x500 [ 197.161736][ C0] ? lock_release+0x780/0x780 [ 197.166398][ C0] ? __alloc_pages_slowpath.constprop.0+0x20a0/0x20a0 [ 197.173144][ C0] ? lock_release+0x560/0x780 [ 197.177822][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 197.182667][ C0] ? __kmalloc_node+0x62/0x390 [ 197.187428][ C0] ? trace_kmalloc_node+0x32/0x100 [ 197.192531][ C0] alloc_pages+0x1aa/0x310 [ 197.196961][ C0] __vmalloc_node_range+0x8a7/0x13c0 [ 197.202244][ C0] ? netlink_sendmsg+0x687/0xe00 [ 197.207180][ C0] ? vfree_atomic+0xe0/0xe0 [ 197.211673][ C0] ? netlink_sendmsg+0x687/0xe00 [ 197.216600][ C0] vmalloc+0x67/0x80 [ 197.220481][ C0] ? netlink_sendmsg+0x687/0xe00 [ 197.225411][ C0] netlink_sendmsg+0x687/0xe00 [ 197.230164][ C0] ? netlink_unicast+0x7f0/0x7f0 [ 197.235091][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.241333][ C0] ? netlink_unicast+0x7f0/0x7f0 [ 197.246258][ C0] sock_sendmsg+0xcf/0x120 [ 197.250662][ C0] sock_no_sendpage+0xf6/0x140 [ 197.255408][ C0] ? sock_no_shutdown+0x10/0x10 [ 197.260244][ C0] ? trace_hardirqs_on+0x56/0x1c0 [ 197.265356][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 197.270802][ C0] ? lock_acquire+0x480/0x570 [ 197.275476][ C0] kernel_sendpage.part.0+0x1ff/0x7b0 [ 197.280847][ C0] sock_sendpage+0xdf/0x140 [ 197.285342][ C0] ? kernel_sendpage+0xd0/0xd0 [ 197.290155][ C0] pipe_to_sendpage+0x2ad/0x380 [ 197.295016][ C0] ? propagate_umount+0x19f0/0x19f0 [ 197.300199][ C0] ? __put_page+0x145/0x280 [ 197.304686][ C0] __splice_from_pipe+0x43e/0x8a0 [ 197.309696][ C0] ? propagate_umount+0x19f0/0x19f0 [ 197.314881][ C0] generic_splice_sendpage+0xd4/0x140 [ 197.320238][ C0] ? __do_sys_vmsplice+0xa50/0xa50 [ 197.325338][ C0] ? security_file_permission+0xab/0xd0 [ 197.330871][ C0] ? __do_sys_vmsplice+0xa50/0xa50 [ 197.335970][ C0] direct_splice_actor+0x110/0x180 [ 197.341065][ C0] splice_direct_to_actor+0x34b/0x8c0 [ 197.346423][ C0] ? generic_file_splice_read+0x5d0/0x5d0 [ 197.352126][ C0] ? do_splice_to+0x240/0x240 [ 197.356786][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.363015][ C0] ? security_file_permission+0xab/0xd0 [ 197.368544][ C0] do_splice_direct+0x1a7/0x270 [ 197.373384][ C0] ? splice_direct_to_actor+0x8c0/0x8c0 [ 197.378928][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.385151][ C0] ? security_file_permission+0xab/0xd0 [ 197.390682][ C0] do_sendfile+0xae0/0x1240 [ 197.395178][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 197.400638][ C0] ? vfs_iocb_iter_write+0x480/0x480 [ 197.405906][ C0] ? __context_tracking_exit+0xb8/0xe0 [ 197.411348][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 197.416192][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 197.421025][ C0] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 197.426905][ C0] __x64_sys_sendfile64+0x1cc/0x210 [ 197.432091][ C0] ? __ia32_sys_sendfile+0x220/0x220 [ 197.437372][ C0] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.443250][ C0] do_syscall_64+0x35/0xb0 [ 197.447656][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 197.453535][ C0] RIP: 0033:0x7f2c45c890e9 [ 197.457944][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.477532][ C0] RSP: 002b:00007f2c46e7a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 197.485926][ C0] RAX: ffffffffffffffda RBX: 00007f2c45d9bf60 RCX: 00007f2c45c890e9 [ 197.493879][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 197.501828][ C0] RBP: 00007f2c45ce308d R08: 0000000000000000 R09: 0000000000000000 [ 197.509778][ C0] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000000 [ 197.517730][ C0] R13: 00007ffc0debe2cf R14: 00007f2c46e7a300 R15: 0000000000022000 [ 197.525687][ C0]