Warning: Permanently added '10.128.0.194' (ECDSA) to the list of known hosts. 2021/01/17 09:54:32 fuzzer started 2021/01/17 09:54:33 dialing manager at 10.128.0.105:40813 2021/01/17 09:54:33 syscalls: 3465 2021/01/17 09:54:33 code coverage: enabled 2021/01/17 09:54:33 comparison tracing: enabled 2021/01/17 09:54:33 extra coverage: enabled 2021/01/17 09:54:33 setuid sandbox: enabled 2021/01/17 09:54:33 namespace sandbox: enabled 2021/01/17 09:54:33 Android sandbox: /sys/fs/selinux/policy does not exist 2021/01/17 09:54:33 fault injection: enabled 2021/01/17 09:54:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/01/17 09:54:33 net packet injection: enabled 2021/01/17 09:54:33 net device setup: enabled 2021/01/17 09:54:33 concurrency sanitizer: enabled 2021/01/17 09:54:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/01/17 09:54:33 USB emulation: enabled 2021/01/17 09:54:33 hci packet injection: enabled 2021/01/17 09:54:33 wifi device emulation: enabled 2021/01/17 09:54:33 suppressing KCSAN reports in functions: 'wbt_issue' 'ext4_free_inode' '__xa_clear_mark' 'ext4_free_inodes_count' 'alloc_pid' 2021/01/17 09:54:33 fetching corpus: 0, signal 0/2000 (executing program) 2021/01/17 09:54:33 fetching corpus: 50, signal 28217/30698 (executing program) 2021/01/17 09:54:33 fetching corpus: 100, signal 42938/45399 (executing program) 2021/01/17 09:54:33 fetching corpus: 150, signal 54610/56524 (executing program) 2021/01/17 09:54:33 fetching corpus: 200, signal 61702/63166 (executing program) 2021/01/17 09:54:34 fetching corpus: 242, signal 69829/70219 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70334 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70395 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70463 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70537 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70606 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70677 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70746 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70823 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70894 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/70961 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71016 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71088 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71166 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71234 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71301 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71372 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71427 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71498 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71558 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71628 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71703 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71770 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71836 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71890 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/71964 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/72022 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/72081 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/72160 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/72221 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/72283 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/72283 (executing program) 2021/01/17 09:54:34 fetching corpus: 243, signal 69883/72283 (executing program) 2021/01/17 09:54:36 starting 6 fuzzer processes 09:54:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) 09:54:36 executing program 1: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) 09:54:36 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:36 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) 09:54:37 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) syzkaller login: [ 33.237033][ T8445] IPVS: ftp: loaded support on port[0] = 21 [ 33.313206][ T8445] chnl_net:caif_netlink_parms(): no params data found [ 33.338135][ T8447] IPVS: ftp: loaded support on port[0] = 21 [ 33.381365][ T8445] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.388431][ T8445] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.396179][ T8445] device bridge_slave_0 entered promiscuous mode [ 33.403859][ T8445] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.410930][ T8445] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.418320][ T8445] device bridge_slave_1 entered promiscuous mode [ 33.434434][ T8445] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.446714][ T8445] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.476329][ T8445] team0: Port device team_slave_0 added [ 33.483624][ T8445] team0: Port device team_slave_1 added [ 33.500246][ T8449] IPVS: ftp: loaded support on port[0] = 21 [ 33.505011][ T8445] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.513102][ T8445] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.539100][ T8445] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.551276][ T8445] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.558201][ T8445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.584085][ T8445] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.641764][ T8445] device hsr_slave_0 entered promiscuous mode [ 33.649865][ T8445] device hsr_slave_1 entered promiscuous mode [ 33.667044][ T8451] IPVS: ftp: loaded support on port[0] = 21 [ 33.676685][ T8447] chnl_net:caif_netlink_parms(): no params data found [ 33.723763][ T8449] chnl_net:caif_netlink_parms(): no params data found [ 33.751916][ T8453] IPVS: ftp: loaded support on port[0] = 21 [ 33.833683][ T8449] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.843276][ T8449] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.850884][ T8449] device bridge_slave_0 entered promiscuous mode [ 33.869078][ T8447] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.878738][ T8447] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.890945][ T8447] device bridge_slave_0 entered promiscuous mode [ 33.908037][ T8451] chnl_net:caif_netlink_parms(): no params data found [ 33.916271][ T8449] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.923404][ T8449] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.930848][ T8449] device bridge_slave_1 entered promiscuous mode [ 33.947635][ T8455] IPVS: ftp: loaded support on port[0] = 21 [ 33.954565][ T8447] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.962820][ T8447] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.970448][ T8447] device bridge_slave_1 entered promiscuous mode [ 33.980465][ T8445] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 33.992573][ T8445] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 34.002563][ T8449] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.024607][ T8445] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 34.040220][ T8449] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.050274][ T8447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.071678][ T8445] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 34.082722][ T8453] chnl_net:caif_netlink_parms(): no params data found [ 34.094079][ T8447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.115153][ T8451] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.123488][ T8451] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.131561][ T8451] device bridge_slave_0 entered promiscuous mode [ 34.142074][ T8451] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.149094][ T8451] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.156468][ T8451] device bridge_slave_1 entered promiscuous mode [ 34.174436][ T8449] team0: Port device team_slave_0 added [ 34.182342][ T8449] team0: Port device team_slave_1 added [ 34.196665][ T8449] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.203609][ T8449] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.229541][ T8449] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.244285][ T8451] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.263783][ T8449] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.270761][ T8449] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.296781][ T8449] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.308005][ T8451] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.326003][ T8447] team0: Port device team_slave_0 added [ 34.333979][ T8447] team0: Port device team_slave_1 added [ 34.352074][ T8451] team0: Port device team_slave_0 added [ 34.382050][ T8449] device hsr_slave_0 entered promiscuous mode [ 34.388787][ T8449] device hsr_slave_1 entered promiscuous mode [ 34.395716][ T8449] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 34.403642][ T8449] Cannot create hsr debugfs directory [ 34.409531][ T8451] team0: Port device team_slave_1 added [ 34.421428][ T8453] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.428563][ T8453] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.437304][ T8453] device bridge_slave_0 entered promiscuous mode [ 34.449270][ T8447] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.456597][ T8447] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.482556][ T8447] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.501392][ T8455] chnl_net:caif_netlink_parms(): no params data found [ 34.510794][ T8453] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.517830][ T8453] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.526538][ T8453] device bridge_slave_1 entered promiscuous mode [ 34.533488][ T8447] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.540845][ T8447] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.567532][ T8447] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.586600][ T8451] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.593589][ T8451] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.620212][ T8451] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.632457][ T8451] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.639602][ T8451] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.666064][ T8451] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.685452][ T8453] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.716914][ T8453] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.737819][ T8453] team0: Port device team_slave_0 added [ 34.747706][ T8451] device hsr_slave_0 entered promiscuous mode [ 34.754156][ T8451] device hsr_slave_1 entered promiscuous mode [ 34.760603][ T8451] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 34.768124][ T8451] Cannot create hsr debugfs directory [ 34.775179][ T8447] device hsr_slave_0 entered promiscuous mode [ 34.781866][ T8447] device hsr_slave_1 entered promiscuous mode [ 34.788198][ T8447] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 34.795786][ T8447] Cannot create hsr debugfs directory [ 34.820582][ T8453] team0: Port device team_slave_1 added [ 34.837082][ T8445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.857924][ T8455] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.865274][ T8455] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.872881][ T8455] device bridge_slave_0 entered promiscuous mode [ 34.880652][ T8455] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.887678][ T8455] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.895408][ T8455] device bridge_slave_1 entered promiscuous mode [ 34.925438][ T8455] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.936426][ T8447] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 34.949482][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.956926][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.966314][ T8445] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.973449][ T8453] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.980477][ T8453] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.006431][ T8453] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.019573][ T8453] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.026659][ T8453] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.052759][ T8453] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.072178][ T8455] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.087844][ T8447] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 35.096534][ T8449] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 35.108921][ T8455] team0: Port device team_slave_0 added [ 35.117187][ T8455] team0: Port device team_slave_1 added [ 35.124135][ T8447] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 35.134115][ T8453] device hsr_slave_0 entered promiscuous mode [ 35.140824][ T8453] device hsr_slave_1 entered promiscuous mode [ 35.147001][ T8453] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 35.154991][ T8453] Cannot create hsr debugfs directory [ 35.160895][ T8449] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 35.171083][ T8449] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 35.187439][ T8449] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 35.196530][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.205030][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.215305][ T3667] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.222335][ T3667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.231475][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.239788][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.248006][ T3667] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.255117][ T3667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.262629][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.274233][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.282009][ T8447] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 35.298972][ T7] Bluetooth: hci0: command 0x0409 tx timeout [ 35.303254][ T8451] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 35.316944][ T8451] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 35.325476][ T8451] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 35.334837][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 35.351239][ T8455] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.358284][ T8455] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.384539][ T19] Bluetooth: hci1: command 0x0409 tx timeout [ 35.386140][ T8455] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.402201][ T8451] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 35.416354][ T8445] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 35.427088][ T8445] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.445721][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 35.455140][ T8455] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.462797][ T8455] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.489250][ T8455] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.517727][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 35.526239][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.535257][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 35.544204][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.552362][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.560726][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.568760][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.577281][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.584977][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.592740][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.600699][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.608133][ T3193] Bluetooth: hci2: command 0x0409 tx timeout [ 35.617204][ T8453] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 35.632137][ T8445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.643904][ T8455] device hsr_slave_0 entered promiscuous mode [ 35.651013][ T8455] device hsr_slave_1 entered promiscuous mode [ 35.657228][ T8455] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 35.664855][ T8455] Cannot create hsr debugfs directory [ 35.673863][ T8453] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 35.698860][ T19] Bluetooth: hci3: command 0x0409 tx timeout [ 35.710771][ T8453] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 35.719057][ T8453] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 35.729680][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.738017][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.750019][ T8449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.766623][ T8447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.781567][ T8134] Bluetooth: hci4: command 0x0409 tx timeout [ 35.786992][ T8445] device veth0_vlan entered promiscuous mode [ 35.803846][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.812346][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.827859][ T8447] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.840903][ T8449] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.856573][ T8451] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.864152][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.872922][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.880749][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.888156][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.897199][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.904824][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.919655][ T8455] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 35.938896][ T3193] Bluetooth: hci5: command 0x0409 tx timeout [ 35.943467][ T8453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.953833][ T8445] device veth1_vlan entered promiscuous mode [ 35.964900][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 35.973200][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 35.981097][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.989595][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.997662][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.004694][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.012318][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.020844][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.029070][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.036071][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.043740][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.052533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.061082][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.069498][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.077734][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.086225][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.094523][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.101550][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.109456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.117730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.126068][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.133119][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.141546][ T8455] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 36.154035][ T8455] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 36.162686][ T8455] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 36.189262][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.196991][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.205097][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.213176][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.221123][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.228729][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.237477][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.246431][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.254802][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.263335][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.271676][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.280139][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.288279][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.296428][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.304769][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.313208][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.321442][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.329506][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.337701][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.346949][ T8451] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.362454][ T8445] device veth0_macvtap entered promiscuous mode [ 36.369333][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.377022][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.385419][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.392995][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.400564][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.409317][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.417392][ T4595] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.424406][ T4595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.432133][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.440569][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.448700][ T4595] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.455808][ T4595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.463786][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.485574][ T8453] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.498484][ T8449] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 36.509988][ T8449] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 36.528548][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.536613][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.545127][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.553563][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.561835][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.570789][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.579424][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.587605][ T8134] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.594670][ T8134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.602356][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.610934][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.619268][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.627587][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.635892][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.644190][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.652576][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.662856][ T8445] device veth1_macvtap entered promiscuous mode [ 36.687376][ T8449] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.696017][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.703765][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.711556][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.719300][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.727532][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.735902][ T8134] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.742928][ T8134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.750860][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.759540][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.768234][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.775612][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.791731][ T8455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.805263][ T8447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.812683][ T8451] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 36.823490][ T8451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.831118][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.840108][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.848372][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.856672][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.864893][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.872682][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.881294][ T8445] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.893586][ T8445] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.911131][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.919047][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.927316][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.935886][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.944465][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.953248][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.961630][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.976517][ T8455] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.989251][ T8451] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.998250][ T8445] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.006976][ T8445] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.015847][ T8445] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.024784][ T8445] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.042283][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.050995][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.059508][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.066975][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.075187][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.082811][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.090221][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.098272][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.106294][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.114628][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.122693][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.131163][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.143675][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.160525][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.169200][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.177364][ T4595] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.184401][ T4595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.192261][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 37.213511][ T8449] device veth0_vlan entered promiscuous mode [ 37.222409][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.230858][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.239492][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.247358][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.256128][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.264934][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.274003][ T8134] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.281225][ T8134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.305965][ T8447] device veth0_vlan entered promiscuous mode [ 37.315557][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.323460][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.331171][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.339088][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.346549][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.354067][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.361423][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 37.368576][ T7] Bluetooth: hci0: command 0x041b tx timeout [ 37.370006][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 37.383824][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 37.392237][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 37.400708][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.409074][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.439063][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 37.445779][ T8451] device veth0_vlan entered promiscuous mode [ 37.446923][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 37.460778][ T34] Bluetooth: hci1: command 0x041b tx timeout [ 37.481602][ T555] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 37.483628][ T8449] device veth1_vlan entered promiscuous mode [ 37.490776][ T555] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 37.501488][ T8447] device veth1_vlan entered promiscuous mode [ 37.511557][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.519760][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.527533][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 37.535951][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 37.544734][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.553318][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 37.561459][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.569946][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.578550][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 37.589013][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.596551][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.607149][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.615468][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.625403][ T8453] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.636853][ T8455] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.647596][ T8455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.662492][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.671112][ T4595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.681673][ T8451] device veth1_vlan entered promiscuous mode [ 37.690442][ T9717] Bluetooth: hci2: command 0x041b tx timeout [ 37.706269][ T8449] device veth0_macvtap entered promiscuous mode [ 37.728231][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.736739][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.747297][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.756358][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.768412][ T8134] Bluetooth: hci3: command 0x041b tx timeout 09:54:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) [ 37.774106][ T8455] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.788887][ T8449] device veth1_macvtap entered promiscuous mode [ 37.797419][ T8451] device veth0_macvtap entered promiscuous mode [ 37.811563][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 09:54:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) [ 37.821702][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.848912][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.856727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.858269][ T9717] Bluetooth: hci4: command 0x041b tx timeout [ 37.864783][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.877763][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.886345][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.910351][ T8447] device veth0_macvtap entered promiscuous mode [ 37.918338][ T8451] device veth1_macvtap entered promiscuous mode [ 37.930868][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.940286][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.950264][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 09:54:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) [ 37.959125][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.971501][ T8449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.984247][ T8449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.995034][ T8449] batman_adv: batadv0: Interface activated: batadv_slave_0 09:54:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=@newnexthop={0x18, 0x68, 0x1}, 0x18}}, 0x0) [ 38.016845][ T8453] device veth0_vlan entered promiscuous mode [ 38.022940][ T3193] Bluetooth: hci5: command 0x041b tx timeout [ 38.035034][ T8447] device veth1_macvtap entered promiscuous mode [ 38.046650][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.056376][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.068721][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.077198][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.090137][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.101333][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.109107][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.118433][ T8449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.129101][ T8449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.139997][ T8449] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.150473][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 09:54:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=@newnexthop={0x18, 0x68, 0x1}, 0x18}}, 0x0) [ 38.161076][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.171172][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.181936][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.192670][ T8451] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.211359][ T8453] device veth1_vlan entered promiscuous mode [ 38.219391][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 38.227270][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.236845][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.246243][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.257655][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 09:54:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=@newnexthop={0x18, 0x68, 0x1}, 0x18}}, 0x0) [ 38.269584][ T8449] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.287080][ T8449] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.297750][ T8449] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.320719][ T8449] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.337633][ T8447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.351954][ T8447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.362329][ T8447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.373207][ T8447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.383183][ T8447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.393872][ T8447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.404859][ T8447] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.420295][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.432616][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.442884][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.454964][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:54:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=@newnexthop={0x18, 0x68, 0x1}, 0x18}}, 0x0) [ 38.466542][ T8451] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.484007][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 38.498685][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.507122][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.516141][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.524958][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.547971][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.556827][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.572209][ T8451] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.581193][ T8451] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.590150][ T8451] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.599134][ T8451] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.612822][ T8447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.624766][ T8447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.634663][ T8447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.646348][ T8447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.656453][ T8447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.669749][ T8447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.681353][ T8447] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.703157][ T8453] device veth0_macvtap entered promiscuous mode [ 38.715300][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.738479][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.747487][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.758232][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.769408][ T8447] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.778753][ T8447] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.787588][ T8447] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.797139][ T8447] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.812635][ T8455] device veth0_vlan entered promiscuous mode [ 38.828479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.836419][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.845457][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.854215][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.862194][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.871731][ T8453] device veth1_macvtap entered promiscuous mode [ 38.893401][ T3070] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 38.894786][ T8455] device veth1_vlan entered promiscuous mode [ 38.903868][ T3070] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 38.927744][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.936852][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 38.946388][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 38.962580][ T8453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.979655][ T8453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.989731][ T8453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.000248][ T8453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.010470][ T8453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.022966][ T8453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.033263][ T8453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.045287][ T8453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.056716][ T8453] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.077401][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.085440][ T555] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.093348][ T555] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.093918][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.109235][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 39.125573][ T8453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.125831][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.146620][ T8453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.152976][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.157518][ T8453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.174317][ T8453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.184121][ T8453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.194612][ T8453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.204500][ T8453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.215603][ T8453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.226397][ T8453] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.238223][ T8453] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.246942][ T8453] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.256169][ T8453] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.265485][ T8453] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.276461][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 39.285202][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 39.292978][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 39.301618][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.321005][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 39.329669][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.349687][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.352449][ T8455] device veth0_macvtap entered promiscuous mode [ 39.357509][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.384285][ T555] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.393020][ T555] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.408013][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 39.415942][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 39.431750][ T8455] device veth1_macvtap entered promiscuous mode [ 39.445409][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 39.448051][ T7] Bluetooth: hci0: command 0x040f tx timeout [ 39.465151][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 39.491107][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.507781][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.517028][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.528076][ T4595] Bluetooth: hci1: command 0x040f tx timeout [ 39.534213][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.544257][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.555136][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.565357][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.591933][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.601872][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.612821][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.622759][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.633228][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.644209][ T8455] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.656605][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 39.666124][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.676049][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.691565][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.702767][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.712724][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.723136][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.733078][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.743509][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.753516][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.763919][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.774035][ T5] Bluetooth: hci2: command 0x040f tx timeout [ 39.774467][ T8455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.791158][ T8455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.801996][ T8455] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.812269][ T8455] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.821260][ T8455] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.829975][ T8455] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.838787][ T8455] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.848747][ T5] Bluetooth: hci3: command 0x040f tx timeout [ 39.857734][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 39.866158][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.877829][ T913] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.885622][ T913] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.902798][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 39.927483][ T555] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.935609][ T5] Bluetooth: hci4: command 0x040f tx timeout 09:54:44 executing program 1: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) 09:54:44 executing program 0: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:44 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) [ 39.950410][ T555] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.972337][ T913] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.974836][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.992976][ T913] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.997495][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 40.007132][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 40.022096][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 40.037397][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 40.079244][ C1] sd 0:0:1:0: [sg0] tag#7449 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 40.089028][ T7] Bluetooth: hci5: command 0x040f tx timeout [ 40.089611][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB: Test Unit Ready [ 40.101956][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.111506][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.121073][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.130890][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.140436][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.150005][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.159575][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.169137][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.178679][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.188220][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.197776][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.207306][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.216851][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.226415][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.235959][ C1] sd 0:0:1:0: [sg0] tag#7449 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.259049][ C0] sd 0:0:1:0: [sg0] tag#7450 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 40.260869][ T9940] xt_TCPMSS: Only works on TCP SYN packets [ 40.269455][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB: Test Unit Ready [ 40.281738][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.291299][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.300861][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.310434][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.320138][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.329697][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.339290][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.348879][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.358420][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.367990][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09:54:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) 09:54:44 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:44 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:44 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:44 executing program 1: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) [ 40.377522][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.387058][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.396608][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.406162][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.415732][ C0] sd 0:0:1:0: [sg0] tag#7450 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 09:54:44 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:44 executing program 1: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) 09:54:44 executing program 0: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:44 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) [ 40.514224][ T9960] xt_TCPMSS: Only works on TCP SYN packets 09:54:44 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) [ 40.590979][ C1] sd 0:0:1:0: [sg0] tag#7451 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 40.601649][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB: Test Unit Ready [ 40.608063][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.617605][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.627128][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09:54:45 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) [ 40.636672][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.646230][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.655867][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.665412][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.674970][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.684517][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.694074][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.703621][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.713185][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.722818][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09:54:45 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:45 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) [ 40.732463][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.742014][ C1] sd 0:0:1:0: [sg0] tag#7451 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.751379][ T9975] xt_TCPMSS: Only works on TCP SYN packets 09:54:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) [ 40.799260][ C1] sd 0:0:1:0: [sg0] tag#7452 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 40.809648][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB: Test Unit Ready [ 40.816056][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.825632][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.835199][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.844932][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.854467][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.864116][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.873672][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.883218][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.892756][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.902310][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.911875][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.921427][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.930967][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.940510][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09:54:45 executing program 3: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) [ 40.950082][ C1] sd 0:0:1:0: [sg0] tag#7452 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.973008][ T9991] xt_TCPMSS: Only works on TCP SYN packets [ 40.989478][ C0] sd 0:0:1:0: [sg0] tag#7453 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 40.999877][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB: Test Unit Ready [ 41.006292][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.015854][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.025360][ C1] sd 0:0:1:0: [sg0] tag#7454 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 41.025521][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.035844][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB: Test Unit Ready [ 41.045414][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.051806][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.061326][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.070845][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.080374][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.089896][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.099487][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.109018][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.118534][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.128059][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.137587][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.147194][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.156705][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.166333][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.175849][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.175879][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.185436][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.194921][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.204435][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.213953][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09:54:45 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) [ 41.223465][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.232997][ C0] sd 0:0:1:0: [sg0] tag#7453 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.242593][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.270314][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.279903][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.289467][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09:54:45 executing program 0: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) [ 41.299038][ C1] sd 0:0:1:0: [sg0] tag#7454 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 09:54:45 executing program 5: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="5300000044a6aeabec2e15200000000000f7001000fff64017db9820000000003b08d403f7ff633b27e59aa144175dd106736d26131932c38bba95610fee03d4db17c3f2c876c699010000000000000025da3f0fc7ec6e2656000008004902e181baf9451cd8489f9c5c951d2c0945c08b70c552fc99a7422007653872ecb4f63acdf680812d274014ae40b88f15ff2258dd247239ece16a61fd063f0200000000971f7ee096d74c92fad7e34bd5f0cec52636c2cb6222bc224609aba9e68d66d7e6241bf2cb667da1af58de103c2cd02af1ea185a7d54e80ac2db56f739e0330c79308646735006c58990acd3c4283ac9cf09f72229f105014d"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) [ 41.391027][ C1] sd 0:0:1:0: [sg0] tag#7456 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 41.401429][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB: Test Unit Ready [ 41.407875][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.417422][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.426985][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.436574][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.446132][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.455694][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.465240][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.474784][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.484447][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.494007][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.503557][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.513107][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.522658][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.532290][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09:54:45 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) [ 41.541854][ C1] sd 0:0:1:0: [sg0] tag#7456 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.553018][ C0] sd 0:0:1:0: [sg0] tag#7455 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 41.563410][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB: Test Unit Ready [ 41.569839][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.579426][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.588981][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.598538][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.608084][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.617635][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.627169][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.636689][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.646223][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.655881][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.665453][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.674992][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09:54:45 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) [ 41.684532][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.694075][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.703612][ C0] sd 0:0:1:0: [sg0] tag#7455 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.726274][ T7] Bluetooth: hci0: command 0x0419 tx timeout [ 41.745155][ C1] sd 0:0:1:0: [sg0] tag#7457 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 41.745243][ T4595] Bluetooth: hci1: command 0x0419 tx timeout [ 41.755494][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB: Test Unit Ready [ 41.755509][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.755523][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.755538][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.796469][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.806025][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.815603][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.825139][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.834685][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.844237][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.853187][ C0] sd 0:0:1:0: [sg0] tag#7458 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 41.853775][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.864068][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB: Test Unit Ready [ 41.873576][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.880005][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.889510][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.899031][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.908552][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.918066][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.927586][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.927599][ C1] sd 0:0:1:0: [sg0] tag#7457 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.937115][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.964633][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.974178][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.983724][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.993266][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.002809][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.012380][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.021943][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.031494][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.041038][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.050600][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.060143][ C0] sd 0:0:1:0: [sg0] tag#7458 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.069514][ T4595] Bluetooth: hci2: command 0x0419 tx timeout 09:54:46 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 0: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 3: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 5: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) [ 42.180115][ T4595] Bluetooth: hci3: command 0x0419 tx timeout [ 42.186144][ T4595] Bluetooth: hci4: command 0x0419 tx timeout [ 42.209799][ T5] Bluetooth: hci5: command 0x0419 tx timeout 09:54:46 executing program 0: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 3: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 5: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 0: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="5300000044a6aeabec2e15200000000000f7001000fff64017db9820000000003b08d403f7ff633b27e59aa144175dd106736d26131932c38bba95610fee03d4db17c3f2c876c699010000000000000025da3f0fc7ec6e2656000008004902e181baf9451cd8489f9c5c951d2c0945c08b70c552fc99a7422007653872ecb4f63acdf680812d274014ae40b88f15ff2258dd247239ece16a61fd063f0200000000971f7ee096d74c92fad7e34bd5f0cec52636c2cb6222bc224609aba9e68d66d7e6241bf2cb667da1af58de103c2cd02af1ea185a7d54e80ac2db56f739e0330c79308646735006c58990acd3c4283ac9cf09f72229f105014d"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) 09:54:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) 09:54:47 executing program 0: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:47 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:47 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) 09:54:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) 09:54:47 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="5300000044a6aeabec2e15200000000000f7001000fff64017db9820000000003b08d403f7ff633b27e59aa144175dd106736d26131932c38bba95610fee03d4db17c3f2c876c699010000000000000025da3f0fc7ec6e2656000008004902e181baf9451cd8489f9c5c951d2c0945c08b70c552fc99a7422007653872ecb4f63acdf680812d274014ae40b88f15ff2258dd247239ece16a61fd063f0200000000971f7ee096d74c92fad7e34bd5f0cec52636c2cb6222bc224609aba9e68d66d7e6241bf2cb667da1af58de103c2cd02af1ea185a7d54e80ac2db56f739e0330c79308646735006c58990acd3c4283ac9cf09f72229f105014d"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) [ 42.584232][T10063] xt_TCPMSS: Only works on TCP SYN packets [ 42.603835][T10059] xt_TCPMSS: Only works on TCP SYN packets 09:54:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) [ 42.660744][T10075] xt_TCPMSS: Only works on TCP SYN packets 09:54:47 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) [ 42.707992][T10080] xt_TCPMSS: Only works on TCP SYN packets 09:54:47 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x178) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) msgget$private(0x0, 0x70e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003140), 0x5e3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000040)={0x2d3, &(0x7f0000000280)=""/3, &(0x7f0000000640)=[{0x81, 0x1000, 0x40, &(0x7f0000000900)=""/4096}, {0x1, 0xbb, 0x8, &(0x7f0000000380)=""/187}, {0xffffffff, 0xf6, 0x250, &(0x7f0000000440)=""/255}, {0x101, 0x6, 0x6, &(0x7f00000002c0)=""/6}]}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 09:54:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) 09:54:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) [ 42.758698][T10082] xt_TCPMSS: Only works on TCP SYN packets 09:54:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) 09:54:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) [ 42.816274][T10091] xt_TCPMSS: Only works on TCP SYN packets 09:54:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', 0x0}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x368, 0x240, 0x240, 0x368, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0xc2, 0xc}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x3fc}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c2) 09:54:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 5: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) 09:54:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 3: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) 09:54:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0xa19}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80020000, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a3099a24006c91a5dc7f6ec"], 0x1c) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000002140)={0x2}, &(0x7f0000002180)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 09:54:47 executing program 5: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) 09:54:47 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 3: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) 09:54:47 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 5: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) 09:54:47 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 3: unshare(0x20000400) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f8, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, 0x0) 09:54:47 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 5: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 3: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:47 executing program 5: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:47 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:47 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:48 executing program 3: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:48 executing program 5: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x80000000}, 0x18) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmmsg$alg(r0, &(0x7f00000000c0), 0x4924924924924d8, 0x0) 09:54:48 executing program 4: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:48 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 3: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:48 executing program 4: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:48 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xa0000009, 0x0) 09:54:48 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xa0000009, 0x0) 09:54:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 4: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) 09:54:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xa0000009, 0x0) 09:54:48 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xa0000009, 0x0) 09:54:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xa0000009, 0x0) 09:54:48 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xa0000009, 0x0) 09:54:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xa0000009, 0x0) 09:54:48 executing program 5: clone(0x4b803100, 0x0, 0x0, 0x0, 0x0) 09:54:48 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a0800000001000001120066", 0x67, 0x8b000}], 0x0, &(0x7f0000000340)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000580)=""/121, 0x79) 09:54:48 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x93, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000380)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ee7000/0x3000)=nil, 0x3000}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 44.246170][T10314] IPVS: ftp: loaded support on port[0] = 21 09:54:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x9, 0x8, 0xffff, 0x8, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) 09:54:48 executing program 5: clone(0x4b803100, 0x0, 0x0, 0x0, 0x0) [ 44.292793][T10316] loop0: detected capacity change from 2224 to 0 [ 44.310145][T10314] IPVS: ftp: loaded support on port[0] = 21 09:54:48 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x6, 0x5e0f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:54:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x64, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1={0xff, 0x0}}, @L2TP_ATTR_UDP_SPORT={0x6}]}, 0x64}}, 0x0) 09:54:48 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a0800000001000001120066", 0x67, 0x8b000}], 0x0, &(0x7f0000000340)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000580)=""/121, 0x79) [ 44.391928][T10380] IPVS: ftp: loaded support on port[0] = 21 09:54:48 executing program 5: clone(0x4b803100, 0x0, 0x0, 0x0, 0x0) 09:54:48 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a0800000001000001120066", 0x67, 0x8b000}], 0x0, &(0x7f0000000340)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000580)=""/121, 0x79) 09:54:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x64, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1={0xff, 0x0}}, @L2TP_ATTR_UDP_SPORT={0x6}]}, 0x64}}, 0x0) 09:54:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x93, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000380)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ee7000/0x3000)=nil, 0x3000}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 09:54:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x93, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000380)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ee7000/0x3000)=nil, 0x3000}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 09:54:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x64, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1={0xff, 0x0}}, @L2TP_ATTR_UDP_SPORT={0x6}]}, 0x64}}, 0x0) 09:54:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x93, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000380)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ee7000/0x3000)=nil, 0x3000}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 44.547016][T10423] IPVS: ftp: loaded support on port[0] = 21 [ 44.550497][T10426] loop1: detected capacity change from 2224 to 0 [ 44.570336][T10428] loop0: detected capacity change from 2224 to 0 09:54:49 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a0800000001000001120066", 0x67, 0x8b000}], 0x0, &(0x7f0000000340)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000580)=""/121, 0x79) 09:54:49 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a0800000001000001120066", 0x67, 0x8b000}], 0x0, &(0x7f0000000340)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000580)=""/121, 0x79) 09:54:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x93, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000380)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ee7000/0x3000)=nil, 0x3000}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 09:54:49 executing program 5: clone(0x4b803100, 0x0, 0x0, 0x0, 0x0) 09:54:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x93, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000380)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ee7000/0x3000)=nil, 0x3000}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 09:54:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x64, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1={0xff, 0x0}}, @L2TP_ATTR_UDP_SPORT={0x6}]}, 0x64}}, 0x0) 09:54:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha12,serpent)\x00'}, 0x58) close(r0) [ 44.728823][T10473] loop1: detected capacity change from 2224 to 0 [ 44.739338][T10480] loop0: detected capacity change from 2224 to 0 [ 44.754247][T10482] IPVS: ftp: loaded support on port[0] = 21 09:54:49 executing program 2: r0 = getpid() process_vm_readv(r0, &(0x7f0000004f80)=[{&(0x7f0000002800)=""/4096, 0x1000}], 0x1, &(0x7f0000005100)=[{&(0x7f0000003980)=""/240, 0xf0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 09:54:49 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a0800000001000001120066", 0x67, 0x8b000}], 0x0, &(0x7f0000000340)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000580)=""/121, 0x79) 09:54:49 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a0800000001000001120066", 0x67, 0x8b000}], 0x0, &(0x7f0000000340)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000580)=""/121, 0x79) 09:54:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x93, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000380)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ee7000/0x3000)=nil, 0x3000}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 09:54:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha12,serpent)\x00'}, 0x58) close(r0) 09:54:49 executing program 2: r0 = getpid() process_vm_readv(r0, &(0x7f0000004f80)=[{&(0x7f0000002800)=""/4096, 0x1000}], 0x1, &(0x7f0000005100)=[{&(0x7f0000003980)=""/240, 0xf0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 09:54:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha12,serpent)\x00'}, 0x58) close(r0) 09:54:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha12,serpent)\x00'}, 0x58) close(r0) [ 44.951222][T10528] loop0: detected capacity change from 2224 to 0 09:54:49 executing program 0: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x2) getdents(r0, 0x0, 0x0) 09:54:49 executing program 2: r0 = getpid() process_vm_readv(r0, &(0x7f0000004f80)=[{&(0x7f0000002800)=""/4096, 0x1000}], 0x1, &(0x7f0000005100)=[{&(0x7f0000003980)=""/240, 0xf0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 09:54:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha12,serpent)\x00'}, 0x58) close(r0) [ 45.063228][T10544] loop1: detected capacity change from 2224 to 0 09:54:49 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 09:54:49 executing program 0: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x2) getdents(r0, 0x0, 0x0) 09:54:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha12,serpent)\x00'}, 0x58) close(r0) 09:54:49 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x2) getdents(r0, 0x0, 0x0) 09:54:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha12,serpent)\x00'}, 0x58) close(r0) 09:54:49 executing program 2: r0 = getpid() process_vm_readv(r0, &(0x7f0000004f80)=[{&(0x7f0000002800)=""/4096, 0x1000}], 0x1, &(0x7f0000005100)=[{&(0x7f0000003980)=""/240, 0xf0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 09:54:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_mpls={0x38, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000000) 09:54:49 executing program 0: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x2) getdents(r0, 0x0, 0x0) [ 45.332941][T10573] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 09:54:49 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x2) getdents(r0, 0x0, 0x0) 09:54:49 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 09:54:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="b70200000b400000bfa300000000000024020000fffeff7f7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff07cd02020404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000002995000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a3562978ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b783ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a62d79b4c03e53466fa4f22d8c19f958e8b34de35949a7a0077a81ea65e652c1d71b7ee86a75bb32935f542127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41ac37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893ff7ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45577c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8c97c00eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc3809001fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37d2fe7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e757bae30b356521df06f995cb57f97052fc4158250ccecfb47ea8faf509593fadc7eafb613313b052397af1ede94d87590ce90a0a7579766f7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf27193af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691d368dde47e6672e93a314a5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b8cec5d165ee78a8d6add011be32b9bf8b32b518e01ffb985f8054d37959c529e99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c4d69e5749901b09e4902a6f5addc0103756b894418e4591c624a9b2ccabbfb888d413d923b0d7c9d997d6d8e64787c4d397ec78f589550a31699088da767fba53f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b775152786118384eebd5fc19928ceb713ff09e179c307b6c84344374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8c18119a6926083f4a2c008a9f2a29e30820e98cb3a39cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f8bc03d11811ac6eec9a3ecd9e3c325fcabbab3d129c0cced3ce11dafa387a8077db8a7dfec70919aa19f1d006ae15108abb50a518f079627a689f15b362690eedaf1ecab34173736775f27a2235747036d462df98f936aa6dd528ebaccb36b32e5862b6277002ebb615688fd2ad137073c970ea542cac6042eda9d70e7db82585587bdecd4e3ed0b217dfaeccdb27a19a1c444d63b211d78c44a320f5533e62ca0650a0af2dd3b6ae9fe33f143144d85a49c13149b545542ede32498fffe9e2372c543201a3c1b478ca9ce64f48a5f8d65e35ab49b52a9e80c24d45749d30390ea83ec14900a5a65f1e81ed14bc12255f98aabe7687bde8ff17526bfe039d0065193e867d80ca0d7e614a8d99e5c6a6d25e85f9e84e6f273dbbf059045a928c6130018b630e892329edfe0d1496bf81407f0ddc7d4aad7799542b5dcf1bb84503cf9b1339d89e89bcba7a727405e933b2ba4358f4bc3307873339cfe820afb16d414e712a78b48806dbf775f96fb08e927110058ede0ee5e82f378f21384b353250ad560b5bb76edb59663ba3982eda094961be7e865b0797564db1e855114d7fc7fe0e16df764749240f2d457b6503f1399932e726cd8ee1473243b1a1f64dbdd35c4a2135687d472edb0268fcd89b4d1f0e5925aed359a53e79ddb9bdfb2ddf469416e83f9f44a9ca568f26d626b0eccca74a3d00ecc55b3ec1bf955595f505ccf287496977eb62bfc81acb12d8ba0010e44a6a8ee06a00000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) prctl$PR_SET_ENDIAN(0x14, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000640)="8a", 0x1}], 0x1, 0x0) 09:54:49 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 09:54:49 executing program 0: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x2) getdents(r0, 0x0, 0x0) [ 45.511188][ T35] audit: type=1804 audit(1610877289.937:2): pid=10582 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir989453168/syzkaller.EyAngQ/30/cgroup.controllers" dev="sda1" ino=15830 res=1 errno=0 09:54:50 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 45.594169][ C1] hrtimer: interrupt took 32845 ns 09:54:50 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x2) getdents(r0, 0x0, 0x0) 09:54:50 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 09:54:50 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 09:54:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) prctl$PR_SET_ENDIAN(0x14, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000640)="8a", 0x1}], 0x1, 0x0) 09:54:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_mpls={0x38, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000000) 09:54:50 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 09:54:50 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 46.045795][ T35] audit: type=1804 audit(1610877290.467:3): pid=10622 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir989453168/syzkaller.EyAngQ/31/cgroup.controllers" dev="sda1" ino=15799 res=1 errno=0 09:54:50 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 09:54:50 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 09:54:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) prctl$PR_SET_ENDIAN(0x14, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000640)="8a", 0x1}], 0x1, 0x0) 09:54:50 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x8) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 09:54:50 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 09:54:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_mpls={0x38, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000000) 09:54:50 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 09:54:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) prctl$PR_SET_ENDIAN(0x14, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000640)="8a", 0x1}], 0x1, 0x0) [ 46.463803][ T35] audit: type=1804 audit(1610877290.887:4): pid=10641 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir989453168/syzkaller.EyAngQ/32/cgroup.controllers" dev="sda1" ino=15826 res=1 errno=0 09:54:50 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 09:54:50 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 09:54:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_mpls={0x38, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000000) 09:54:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_mpls={0x38, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000000) [ 46.760327][ T35] audit: type=1804 audit(1610877291.187:5): pid=10666 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir989453168/syzkaller.EyAngQ/33/cgroup.controllers" dev="sda1" ino=15852 res=1 errno=0 [ 46.901871][ T35] audit: type=1804 audit(1610877291.327:6): pid=10670 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir162652942/syzkaller.TyvczH/34/cgroup.controllers" dev="sda1" ino=15853 res=1 errno=0 09:54:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_mpls={0x38, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000000) [ 47.104702][ T35] audit: type=1804 audit(1610877291.527:7): pid=10673 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir989453168/syzkaller.EyAngQ/34/cgroup.controllers" dev="sda1" ino=15852 res=1 errno=0 09:54:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_mpls={0x38, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000000) 09:54:51 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) [ 47.326144][ T35] audit: type=1804 audit(1610877291.748:8): pid=10678 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir162652942/syzkaller.TyvczH/35/cgroup.controllers" dev="sda1" ino=15853 res=1 errno=0 09:54:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_mpls={0x38, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000000) 09:54:51 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 09:54:51 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 09:54:51 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 09:54:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_mpls={0x38, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000000) [ 47.636891][ T35] audit: type=1804 audit(1610877292.068:9): pid=10687 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir989453168/syzkaller.EyAngQ/35/cgroup.controllers" dev="sda1" ino=15781 res=1 errno=0 [ 47.733253][ T35] audit: type=1804 audit(1610877292.158:10): pid=10697 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir162652942/syzkaller.TyvczH/36/cgroup.controllers" dev="sda1" ino=15862 res=1 errno=0 [ 47.787680][T10697] ================================================================== [ 47.795779][T10697] BUG: KCSAN: data-race in blk_mq_dispatch_rq_list / blk_mq_dispatch_rq_list [ 47.804527][T10697] [ 47.806847][T10697] read-write to 0xffff888102350560 of 8 bytes by task 10687 on cpu 1: [ 47.814994][T10697] blk_mq_dispatch_rq_list+0x9a2/0xe50 [ 47.820473][T10697] blk_mq_do_dispatch_sched+0x370/0x610 [ 47.826016][T10697] __blk_mq_sched_dispatch_requests+0x1fd/0x2a0 [ 47.832248][T10697] blk_mq_sched_dispatch_requests+0x8f/0xf0 [ 47.838130][T10697] __blk_mq_delay_run_hw_queue+0x1ff/0x410 [ 47.843927][T10697] blk_mq_run_hw_queue+0x231/0x260 [ 47.849019][T10697] blk_mq_sched_insert_requests+0x144/0x210 [ 47.855001][T10697] blk_mq_flush_plug_list+0x2f5/0x400 [ 47.860373][T10697] blk_flush_plug_list+0x235/0x260 [ 47.865485][T10697] blk_finish_plug+0x44/0x60 [ 47.870064][T10697] __iomap_dio_rw+0x60f/0x9b0 [ 47.874866][T10697] iomap_dio_rw+0x30/0x70 [ 47.879188][T10697] ext4_file_read_iter+0x3bd/0x420 [ 47.884285][T10697] generic_file_splice_read+0x22a/0x310 [ 47.889819][T10697] splice_direct_to_actor+0x2aa/0x650 [ 47.895179][T10697] do_splice_direct+0xf5/0x170 [ 47.899933][T10697] do_sendfile+0x5db/0xca0 [ 47.904342][T10697] __x64_sys_sendfile64+0xf2/0x130 [ 47.909435][T10697] do_syscall_64+0x39/0x80 [ 47.913847][T10697] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 47.919735][T10697] [ 47.922045][T10697] read-write to 0xffff888102350560 of 8 bytes by task 10697 on cpu 0: [ 47.930270][T10697] blk_mq_dispatch_rq_list+0x9a2/0xe50 [ 47.935729][T10697] blk_mq_do_dispatch_sched+0x370/0x610 [ 47.941261][T10697] __blk_mq_sched_dispatch_requests+0x1fd/0x2a0 [ 47.947501][T10697] blk_mq_sched_dispatch_requests+0x8f/0xf0 [ 47.953391][T10697] __blk_mq_delay_run_hw_queue+0x1ff/0x410 [ 47.959190][T10697] blk_mq_run_hw_queue+0x231/0x260 [ 47.964285][T10697] blk_mq_sched_insert_requests+0x144/0x210 [ 47.970181][T10697] blk_mq_flush_plug_list+0x2f5/0x400 [ 47.975537][T10697] blk_flush_plug_list+0x235/0x260 [ 47.980630][T10697] blk_finish_plug+0x44/0x60 [ 47.985199][T10697] __iomap_dio_rw+0x60f/0x9b0 [ 47.989878][T10697] iomap_dio_rw+0x30/0x70 [ 47.994196][T10697] ext4_file_read_iter+0x3bd/0x420 [ 47.999304][T10697] generic_file_splice_read+0x22a/0x310 [ 48.004851][T10697] splice_direct_to_actor+0x2aa/0x650 [ 48.010219][T10697] do_splice_direct+0xf5/0x170 [ 48.014968][T10697] do_sendfile+0x5db/0xca0 [ 48.019369][T10697] __x64_sys_sendfile64+0xf2/0x130 [ 48.024490][T10697] do_syscall_64+0x39/0x80 [ 48.028902][T10697] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 48.034790][T10697] [ 48.037101][T10697] Reported by Kernel Concurrency Sanitizer on: [ 48.043231][T10697] CPU: 0 PID: 10697 Comm: syz-executor.4 Not tainted 5.11.0-rc3-syzkaller #0 [ 48.051975][T10697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.062031][T10697] ================================================================== [ 48.070072][T10697] Kernel panic - not syncing: panic_on_warn set ... [ 48.076635][T10697] CPU: 0 PID: 10697 Comm: syz-executor.4 Not tainted 5.11.0-rc3-syzkaller #0 [ 48.085383][T10697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.095427][T10697] Call Trace: [ 48.098691][T10697] dump_stack+0x116/0x15d [ 48.103009][T10697] panic+0x1e7/0x5fa [ 48.106899][T10697] ? vprintk_emit+0x2e2/0x360 [ 48.111561][T10697] kcsan_report+0x67b/0x680 [ 48.116051][T10697] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 48.121589][T10697] ? blk_mq_dispatch_rq_list+0x9a2/0xe50 [ 48.127209][T10697] ? blk_mq_do_dispatch_sched+0x370/0x610 [ 48.132909][T10697] ? __blk_mq_sched_dispatch_requests+0x1fd/0x2a0 [ 48.139315][T10697] ? blk_mq_sched_dispatch_requests+0x8f/0xf0 [ 48.145366][T10697] ? __blk_mq_delay_run_hw_queue+0x1ff/0x410 [ 48.151343][T10697] ? blk_mq_run_hw_queue+0x231/0x260 [ 48.156611][T10697] ? blk_mq_sched_insert_requests+0x144/0x210 [ 48.162670][T10697] ? blk_mq_flush_plug_list+0x2f5/0x400 [ 48.168196][T10697] ? blk_flush_plug_list+0x235/0x260 [ 48.173469][T10697] ? blk_finish_plug+0x44/0x60 [ 48.178213][T10697] ? __iomap_dio_rw+0x60f/0x9b0 [ 48.183052][T10697] ? iomap_dio_rw+0x30/0x70 [ 48.187538][T10697] ? ext4_file_read_iter+0x3bd/0x420 [ 48.192809][T10697] ? generic_file_splice_read+0x22a/0x310 [ 48.198541][T10697] ? splice_direct_to_actor+0x2aa/0x650 [ 48.204077][T10697] ? do_splice_direct+0xf5/0x170 [ 48.209001][T10697] ? do_sendfile+0x5db/0xca0 [ 48.213578][T10697] ? __x64_sys_sendfile64+0xf2/0x130 [ 48.218856][T10697] ? do_syscall_64+0x39/0x80 [ 48.223460][T10697] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 48.229529][T10697] ? virtscsi_queuecommand+0x513/0x590 [ 48.234978][T10697] ? scsi_dispatch_cmd+0x298/0x4c0 [ 48.240076][T10697] kcsan_setup_watchpoint+0x47b/0x4e0 [ 48.245531][T10697] blk_mq_dispatch_rq_list+0x9a2/0xe50 [ 48.251167][T10697] ? _raw_spin_unlock+0x22/0x40 [ 48.256010][T10697] blk_mq_do_dispatch_sched+0x370/0x610 [ 48.261537][T10697] ? submit_bio+0x1f3/0x350 [ 48.266033][T10697] __blk_mq_sched_dispatch_requests+0x1fd/0x2a0 [ 48.272275][T10697] ? rb_insert_color+0x2c9/0x2e0 [ 48.277220][T10697] blk_mq_sched_dispatch_requests+0x8f/0xf0 [ 48.283115][T10697] __blk_mq_delay_run_hw_queue+0x1ff/0x410 [ 48.288918][T10697] ? dd_insert_requests+0x4e0/0x4f0 [ 48.294113][T10697] blk_mq_run_hw_queue+0x231/0x260 [ 48.299223][T10697] ? dd_finish_request+0x100/0x100 [ 48.304429][T10697] blk_mq_sched_insert_requests+0x144/0x210 [ 48.310315][T10697] blk_mq_flush_plug_list+0x2f5/0x400 [ 48.315696][T10697] blk_flush_plug_list+0x235/0x260 [ 48.320813][T10697] blk_finish_plug+0x44/0x60 [ 48.325395][T10697] __iomap_dio_rw+0x60f/0x9b0 [ 48.330081][T10697] iomap_dio_rw+0x30/0x70 [ 48.334404][T10697] ext4_file_read_iter+0x3bd/0x420 [ 48.339594][T10697] generic_file_splice_read+0x22a/0x310 [ 48.345135][T10697] ? splice_shrink_spd+0x60/0x60 [ 48.350057][T10697] splice_direct_to_actor+0x2aa/0x650 [ 48.355416][T10697] ? do_splice_direct+0x170/0x170 [ 48.360420][T10697] do_splice_direct+0xf5/0x170 [ 48.365188][T10697] do_sendfile+0x5db/0xca0 [ 48.369595][T10697] __x64_sys_sendfile64+0xf2/0x130 [ 48.374683][T10697] do_syscall_64+0x39/0x80 [ 48.379107][T10697] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 48.384976][T10697] RIP: 0033:0x45e219 [ 48.388846][T10697] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 48.408434][T10697] RSP: 002b:00007fe29e738c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 48.416833][T10697] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 48.424810][T10697] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 48.432868][T10697] RBP: 000000000119bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 48.440817][T10697] R10: 0000000100000000 R11: 0000000000000246 R12: 000000000119bf8c [ 48.448766][T10697] R13: 00007ffcdf9470ef R14: 00007fe29e7399c0 R15: 000000000119bf8c [ 48.457536][T10697] Kernel Offset: disabled [ 48.461845][T10697] Rebooting in 86400 seconds..