Warning: Permanently added '10.128.0.40' (ECDSA) to the list of known hosts. 2021/02/03 03:13:52 fuzzer started 2021/02/03 03:13:52 dialing manager at 10.128.0.169:39723 2021/02/03 03:13:53 syscalls: 3466 2021/02/03 03:13:53 code coverage: enabled 2021/02/03 03:13:53 comparison tracing: enabled 2021/02/03 03:13:53 extra coverage: enabled 2021/02/03 03:13:53 setuid sandbox: enabled 2021/02/03 03:13:53 namespace sandbox: enabled 2021/02/03 03:13:53 Android sandbox: /sys/fs/selinux/policy does not exist 2021/02/03 03:13:53 fault injection: enabled 2021/02/03 03:13:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/02/03 03:13:53 net packet injection: enabled 2021/02/03 03:13:53 net device setup: enabled 2021/02/03 03:13:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/02/03 03:13:53 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/02/03 03:13:53 USB emulation: enabled 2021/02/03 03:13:53 hci packet injection: enabled 2021/02/03 03:13:53 wifi device emulation: enabled 2021/02/03 03:13:53 fetching corpus: 0, signal 0/2000 (executing program) 2021/02/03 03:13:53 fetching corpus: 50, signal 45740/49383 (executing program) 2021/02/03 03:13:53 fetching corpus: 100, signal 71820/76977 (executing program) 2021/02/03 03:13:53 fetching corpus: 150, signal 86885/93506 (executing program) 2021/02/03 03:13:53 fetching corpus: 200, signal 110964/118782 (executing program) 2021/02/03 03:13:53 fetching corpus: 250, signal 120692/129854 (executing program) 2021/02/03 03:13:53 fetching corpus: 300, signal 131187/141585 (executing program) 2021/02/03 03:13:54 fetching corpus: 350, signal 140974/152542 (executing program) 2021/02/03 03:13:54 fetching corpus: 400, signal 148890/161631 (executing program) 2021/02/03 03:13:54 fetching corpus: 450, signal 154067/168055 (executing program) 2021/02/03 03:13:54 fetching corpus: 500, signal 164765/179717 (executing program) 2021/02/03 03:13:54 fetching corpus: 550, signal 173235/189103 (executing program) 2021/02/03 03:13:54 fetching corpus: 600, signal 180017/196844 (executing program) 2021/02/03 03:13:54 fetching corpus: 650, signal 185940/203771 (executing program) 2021/02/03 03:13:55 fetching corpus: 700, signal 191830/210604 (executing program) 2021/02/03 03:13:55 fetching corpus: 750, signal 198811/218415 (executing program) 2021/02/03 03:13:55 fetching corpus: 800, signal 206821/227129 (executing program) 2021/02/03 03:13:55 fetching corpus: 850, signal 213260/234366 (executing program) 2021/02/03 03:13:55 fetching corpus: 900, signal 220359/242151 (executing program) 2021/02/03 03:13:55 fetching corpus: 950, signal 225648/248156 (executing program) 2021/02/03 03:13:56 fetching corpus: 1000, signal 231362/254567 (executing program) 2021/02/03 03:13:56 fetching corpus: 1050, signal 235294/259260 (executing program) 2021/02/03 03:13:56 fetching corpus: 1100, signal 239977/264580 (executing program) 2021/02/03 03:13:56 fetching corpus: 1150, signal 243871/269168 (executing program) 2021/02/03 03:13:56 fetching corpus: 1200, signal 246502/272588 (executing program) 2021/02/03 03:13:57 fetching corpus: 1250, signal 250603/277333 (executing program) 2021/02/03 03:13:57 fetching corpus: 1300, signal 253909/281368 (executing program) 2021/02/03 03:13:57 fetching corpus: 1350, signal 258165/286123 (executing program) 2021/02/03 03:13:57 fetching corpus: 1400, signal 261158/289783 (executing program) 2021/02/03 03:13:57 fetching corpus: 1450, signal 264337/293588 (executing program) 2021/02/03 03:13:57 fetching corpus: 1500, signal 266669/296627 (executing program) 2021/02/03 03:13:57 fetching corpus: 1550, signal 270099/300576 (executing program) 2021/02/03 03:13:57 fetching corpus: 1600, signal 272727/303822 (executing program) 2021/02/03 03:13:57 fetching corpus: 1650, signal 276016/307652 (executing program) 2021/02/03 03:13:58 fetching corpus: 1700, signal 278647/310842 (executing program) 2021/02/03 03:13:58 fetching corpus: 1750, signal 281936/314597 (executing program) 2021/02/03 03:13:58 fetching corpus: 1800, signal 284198/317449 (executing program) 2021/02/03 03:13:58 fetching corpus: 1850, signal 286262/320100 (executing program) 2021/02/03 03:13:58 fetching corpus: 1900, signal 289741/323879 (executing program) 2021/02/03 03:13:58 fetching corpus: 1950, signal 292416/327027 (executing program) 2021/02/03 03:13:58 fetching corpus: 2000, signal 294507/329668 (executing program) 2021/02/03 03:13:59 fetching corpus: 2050, signal 296686/332383 (executing program) 2021/02/03 03:13:59 fetching corpus: 2100, signal 299457/335549 (executing program) 2021/02/03 03:13:59 fetching corpus: 2150, signal 301806/338263 (executing program) 2021/02/03 03:13:59 fetching corpus: 2200, signal 304685/341494 (executing program) 2021/02/03 03:13:59 fetching corpus: 2250, signal 307596/344751 (executing program) 2021/02/03 03:13:59 fetching corpus: 2300, signal 309298/346928 (executing program) 2021/02/03 03:13:59 fetching corpus: 2350, signal 311000/349113 (executing program) 2021/02/03 03:14:00 fetching corpus: 2400, signal 313591/351967 (executing program) 2021/02/03 03:14:00 fetching corpus: 2450, signal 315760/354522 (executing program) 2021/02/03 03:14:00 fetching corpus: 2500, signal 318053/357145 (executing program) 2021/02/03 03:14:00 fetching corpus: 2550, signal 319930/359454 (executing program) 2021/02/03 03:14:01 fetching corpus: 2600, signal 322606/362339 (executing program) 2021/02/03 03:14:01 fetching corpus: 2648, signal 324419/364522 (executing program) 2021/02/03 03:14:01 fetching corpus: 2698, signal 326317/366803 (executing program) 2021/02/03 03:14:01 fetching corpus: 2748, signal 327919/368787 (executing program) 2021/02/03 03:14:01 fetching corpus: 2798, signal 330027/371163 (executing program) 2021/02/03 03:14:01 fetching corpus: 2848, signal 332377/373718 (executing program) 2021/02/03 03:14:02 fetching corpus: 2898, signal 335050/376480 (executing program) 2021/02/03 03:14:02 fetching corpus: 2948, signal 336888/378639 (executing program) 2021/02/03 03:14:02 fetching corpus: 2998, signal 339267/381196 (executing program) 2021/02/03 03:14:02 fetching corpus: 3048, signal 341641/383722 (executing program) 2021/02/03 03:14:02 fetching corpus: 3098, signal 343724/385940 (executing program) 2021/02/03 03:14:02 fetching corpus: 3148, signal 345686/388060 (executing program) 2021/02/03 03:14:02 fetching corpus: 3198, signal 347432/390083 (executing program) 2021/02/03 03:14:03 fetching corpus: 3248, signal 349151/392057 (executing program) 2021/02/03 03:14:03 fetching corpus: 3298, signal 352160/394948 (executing program) 2021/02/03 03:14:03 fetching corpus: 3348, signal 353817/396826 (executing program) 2021/02/03 03:14:03 fetching corpus: 3398, signal 355730/398850 (executing program) 2021/02/03 03:14:03 fetching corpus: 3447, signal 357062/400428 (executing program) 2021/02/03 03:14:03 fetching corpus: 3497, signal 358722/402211 (executing program) 2021/02/03 03:14:04 fetching corpus: 3547, signal 360770/404320 (executing program) 2021/02/03 03:14:04 fetching corpus: 3597, signal 361946/405776 (executing program) 2021/02/03 03:14:04 fetching corpus: 3647, signal 364287/408089 (executing program) 2021/02/03 03:14:04 fetching corpus: 3697, signal 366008/409894 (executing program) 2021/02/03 03:14:04 fetching corpus: 3747, signal 367600/411651 (executing program) 2021/02/03 03:14:04 fetching corpus: 3797, signal 369149/413299 (executing program) 2021/02/03 03:14:04 fetching corpus: 3847, signal 370697/414967 (executing program) 2021/02/03 03:14:04 fetching corpus: 3897, signal 372869/416995 (executing program) 2021/02/03 03:14:05 fetching corpus: 3947, signal 374144/418490 (executing program) 2021/02/03 03:14:05 fetching corpus: 3997, signal 376047/420377 (executing program) 2021/02/03 03:14:05 fetching corpus: 4047, signal 378209/422429 (executing program) 2021/02/03 03:14:05 fetching corpus: 4097, signal 379651/423903 (executing program) 2021/02/03 03:14:05 fetching corpus: 4147, signal 380593/425068 (executing program) 2021/02/03 03:14:06 fetching corpus: 4197, signal 382147/426586 (executing program) 2021/02/03 03:14:06 fetching corpus: 4247, signal 383498/428015 (executing program) 2021/02/03 03:14:06 fetching corpus: 4296, signal 385014/429504 (executing program) 2021/02/03 03:14:06 fetching corpus: 4346, signal 386498/430995 (executing program) 2021/02/03 03:14:06 fetching corpus: 4396, signal 388251/432677 (executing program) 2021/02/03 03:14:06 fetching corpus: 4446, signal 390063/434334 (executing program) 2021/02/03 03:14:06 fetching corpus: 4496, signal 391168/435532 (executing program) 2021/02/03 03:14:07 fetching corpus: 4546, signal 392851/437082 (executing program) 2021/02/03 03:14:07 fetching corpus: 4596, signal 394030/438320 (executing program) 2021/02/03 03:14:07 fetching corpus: 4646, signal 395076/439466 (executing program) 2021/02/03 03:14:07 fetching corpus: 4696, signal 396071/440590 (executing program) 2021/02/03 03:14:07 fetching corpus: 4746, signal 397276/441855 (executing program) 2021/02/03 03:14:07 fetching corpus: 4796, signal 398142/442871 (executing program) 2021/02/03 03:14:07 fetching corpus: 4846, signal 399353/444066 (executing program) 2021/02/03 03:14:08 fetching corpus: 4896, signal 400759/445352 (executing program) 2021/02/03 03:14:08 fetching corpus: 4946, signal 401704/446414 (executing program) 2021/02/03 03:14:08 fetching corpus: 4996, signal 402499/447342 (executing program) 2021/02/03 03:14:08 fetching corpus: 5046, signal 403378/448341 (executing program) 2021/02/03 03:14:09 fetching corpus: 5096, signal 404335/449345 (executing program) 2021/02/03 03:14:09 fetching corpus: 5146, signal 406082/450880 (executing program) 2021/02/03 03:14:09 fetching corpus: 5196, signal 407812/452363 (executing program) 2021/02/03 03:14:09 fetching corpus: 5246, signal 408933/453446 (executing program) 2021/02/03 03:14:09 fetching corpus: 5296, signal 409979/454463 (executing program) 2021/02/03 03:14:09 fetching corpus: 5346, signal 411475/455785 (executing program) 2021/02/03 03:14:09 fetching corpus: 5396, signal 412838/456981 (executing program) 2021/02/03 03:14:10 fetching corpus: 5446, signal 414120/458150 (executing program) 2021/02/03 03:14:10 fetching corpus: 5496, signal 415191/459131 (executing program) 2021/02/03 03:14:10 fetching corpus: 5546, signal 416228/460128 (executing program) 2021/02/03 03:14:10 fetching corpus: 5596, signal 417272/461100 (executing program) 2021/02/03 03:14:10 fetching corpus: 5646, signal 418739/462307 (executing program) 2021/02/03 03:14:10 fetching corpus: 5696, signal 420382/463545 (executing program) 2021/02/03 03:14:10 fetching corpus: 5745, signal 421552/464578 (executing program) 2021/02/03 03:14:11 fetching corpus: 5795, signal 422491/465463 (executing program) 2021/02/03 03:14:11 fetching corpus: 5845, signal 423476/466337 (executing program) 2021/02/03 03:14:11 fetching corpus: 5894, signal 424945/467480 (executing program) 2021/02/03 03:14:11 fetching corpus: 5944, signal 426302/468582 (executing program) 2021/02/03 03:14:11 fetching corpus: 5994, signal 427074/469359 (executing program) 2021/02/03 03:14:11 fetching corpus: 6044, signal 428168/470322 (executing program) 2021/02/03 03:14:11 fetching corpus: 6094, signal 429217/471180 (executing program) 2021/02/03 03:14:12 fetching corpus: 6144, signal 431638/472754 (executing program) 2021/02/03 03:14:16 fetching corpus: 6193, signal 432552/473573 (executing program) 2021/02/03 03:14:16 fetching corpus: 6242, signal 434256/474787 (executing program) 2021/02/03 03:14:16 fetching corpus: 6292, signal 435272/475608 (executing program) 2021/02/03 03:14:16 fetching corpus: 6342, signal 436620/476604 (executing program) 2021/02/03 03:14:17 fetching corpus: 6392, signal 438422/477805 (executing program) 2021/02/03 03:14:17 fetching corpus: 6442, signal 439947/478832 (executing program) 2021/02/03 03:14:17 fetching corpus: 6492, signal 440727/479522 (executing program) 2021/02/03 03:14:17 fetching corpus: 6542, signal 441443/480168 (executing program) 2021/02/03 03:14:17 fetching corpus: 6591, signal 442119/480777 (executing program) 2021/02/03 03:14:17 fetching corpus: 6641, signal 443087/481540 (executing program) 2021/02/03 03:14:18 fetching corpus: 6691, signal 444052/482247 (executing program) 2021/02/03 03:14:18 fetching corpus: 6741, signal 445128/483034 (executing program) 2021/02/03 03:14:18 fetching corpus: 6791, signal 445850/483665 (executing program) 2021/02/03 03:14:18 fetching corpus: 6841, signal 446702/484357 (executing program) 2021/02/03 03:14:18 fetching corpus: 6891, signal 447297/484892 (executing program) 2021/02/03 03:14:18 fetching corpus: 6941, signal 448522/485703 (executing program) 2021/02/03 03:14:18 fetching corpus: 6991, signal 449387/486358 (executing program) 2021/02/03 03:14:18 fetching corpus: 7041, signal 450118/486949 (executing program) 2021/02/03 03:14:19 fetching corpus: 7091, signal 451002/487599 (executing program) 2021/02/03 03:14:19 fetching corpus: 7141, signal 451990/488339 (executing program) 2021/02/03 03:14:19 fetching corpus: 7191, signal 452587/488869 (executing program) 2021/02/03 03:14:19 fetching corpus: 7241, signal 453578/489522 (executing program) 2021/02/03 03:14:19 fetching corpus: 7291, signal 454370/490075 (executing program) 2021/02/03 03:14:19 fetching corpus: 7341, signal 455305/490704 (executing program) 2021/02/03 03:14:20 fetching corpus: 7391, signal 456505/491419 (executing program) 2021/02/03 03:14:20 fetching corpus: 7439, signal 457550/492057 (executing program) 2021/02/03 03:14:20 fetching corpus: 7489, signal 458218/492552 (executing program) 2021/02/03 03:14:20 fetching corpus: 7539, signal 459128/493184 (executing program) 2021/02/03 03:14:20 fetching corpus: 7589, signal 459792/493701 (executing program) 2021/02/03 03:14:20 fetching corpus: 7639, signal 460529/494246 (executing program) 2021/02/03 03:14:20 fetching corpus: 7689, signal 461470/494825 (executing program) 2021/02/03 03:14:21 fetching corpus: 7739, signal 462518/495479 (executing program) 2021/02/03 03:14:21 fetching corpus: 7789, signal 463241/495968 (executing program) 2021/02/03 03:14:21 fetching corpus: 7839, signal 463904/496452 (executing program) 2021/02/03 03:14:21 fetching corpus: 7889, signal 465231/497169 (executing program) 2021/02/03 03:14:21 fetching corpus: 7939, signal 466203/497762 (executing program) 2021/02/03 03:14:21 fetching corpus: 7989, signal 467077/498287 (executing program) 2021/02/03 03:14:21 fetching corpus: 8039, signal 468410/498967 (executing program) 2021/02/03 03:14:21 fetching corpus: 8088, signal 469111/499400 (executing program) 2021/02/03 03:14:22 fetching corpus: 8138, signal 470404/500044 (executing program) 2021/02/03 03:14:22 fetching corpus: 8188, signal 471302/500538 (executing program) 2021/02/03 03:14:22 fetching corpus: 8238, signal 472693/501227 (executing program) 2021/02/03 03:14:22 fetching corpus: 8288, signal 473512/501667 (executing program) 2021/02/03 03:14:22 fetching corpus: 8338, signal 474227/502059 (executing program) 2021/02/03 03:14:22 fetching corpus: 8388, signal 475536/502692 (executing program) 2021/02/03 03:14:23 fetching corpus: 8438, signal 476310/503120 (executing program) 2021/02/03 03:14:23 fetching corpus: 8488, signal 476982/503495 (executing program) 2021/02/03 03:14:23 fetching corpus: 8538, signal 477594/503852 (executing program) 2021/02/03 03:14:23 fetching corpus: 8588, signal 478424/504329 (executing program) 2021/02/03 03:14:23 fetching corpus: 8638, signal 479476/504847 (executing program) 2021/02/03 03:14:23 fetching corpus: 8686, signal 480632/505397 (executing program) 2021/02/03 03:14:24 fetching corpus: 8736, signal 481776/505924 (executing program) 2021/02/03 03:14:24 fetching corpus: 8786, signal 482670/506385 (executing program) 2021/02/03 03:14:24 fetching corpus: 8836, signal 483885/506907 (executing program) 2021/02/03 03:14:24 fetching corpus: 8886, signal 484454/507221 (executing program) 2021/02/03 03:14:24 fetching corpus: 8935, signal 485104/507556 (executing program) 2021/02/03 03:14:24 fetching corpus: 8985, signal 485906/507894 (executing program) 2021/02/03 03:14:24 fetching corpus: 9034, signal 486534/508182 (executing program) 2021/02/03 03:14:25 fetching corpus: 9084, signal 487259/508523 (executing program) 2021/02/03 03:14:25 fetching corpus: 9134, signal 487839/508793 (executing program) 2021/02/03 03:14:25 fetching corpus: 9184, signal 488587/509126 (executing program) 2021/02/03 03:14:25 fetching corpus: 9234, signal 489138/509422 (executing program) 2021/02/03 03:14:25 fetching corpus: 9284, signal 489811/509727 (executing program) 2021/02/03 03:14:25 fetching corpus: 9334, signal 490769/510112 (executing program) 2021/02/03 03:14:25 fetching corpus: 9384, signal 491279/510350 (executing program) 2021/02/03 03:14:25 fetching corpus: 9434, signal 492029/510618 (executing program) 2021/02/03 03:14:26 fetching corpus: 9484, signal 492969/510943 (executing program) 2021/02/03 03:14:26 fetching corpus: 9534, signal 493623/511208 (executing program) 2021/02/03 03:14:26 fetching corpus: 9584, signal 494259/511463 (executing program) 2021/02/03 03:14:26 fetching corpus: 9634, signal 495097/511764 (executing program) 2021/02/03 03:14:26 fetching corpus: 9684, signal 495854/512013 (executing program) 2021/02/03 03:14:26 fetching corpus: 9733, signal 496435/512225 (executing program) 2021/02/03 03:14:26 fetching corpus: 9783, signal 497147/512484 (executing program) 2021/02/03 03:14:27 fetching corpus: 9833, signal 497966/512751 (executing program) 2021/02/03 03:14:27 fetching corpus: 9883, signal 498801/513016 (executing program) 2021/02/03 03:14:27 fetching corpus: 9933, signal 499414/513224 (executing program) 2021/02/03 03:14:27 fetching corpus: 9983, signal 500077/513443 (executing program) 2021/02/03 03:14:27 fetching corpus: 10033, signal 502278/513992 (executing program) 2021/02/03 03:14:27 fetching corpus: 10082, signal 502822/514184 (executing program) 2021/02/03 03:14:27 fetching corpus: 10131, signal 503449/514371 (executing program) 2021/02/03 03:14:28 fetching corpus: 10181, signal 504124/514563 (executing program) 2021/02/03 03:14:28 fetching corpus: 10231, signal 504708/514718 (executing program) 2021/02/03 03:14:28 fetching corpus: 10281, signal 505323/514875 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/514966 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515009 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515049 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515093 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515148 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515182 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515216 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515269 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515320 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515373 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515419 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515457 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515493 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515551 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515580 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515619 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515672 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515723 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515769 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515812 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515852 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515892 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515940 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/515990 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516044 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516088 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516147 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516200 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516240 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516291 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516334 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516382 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516427 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516463 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516512 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516540 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516586 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516631 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516676 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516713 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516762 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516800 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516841 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516880 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516939 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/516985 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/517031 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/517074 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/517124 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/517164 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/517220 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/517228 (executing program) 2021/02/03 03:14:28 fetching corpus: 10302, signal 505595/517228 (executing program) 2021/02/03 03:14:30 starting 6 fuzzer processes 03:14:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x50, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x32, 0x33, @action={@with_ht={{{}, {}, @broadcast, @device_b}}, @channel_switch={0x0, 0x4, {{0x25, 0x3}, @val={0x3e, 0x1}, @val={0x76, 0x6}}}}}]}, 0x50}}, 0x0) 03:14:30 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000600)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0xfdffffff00000000) 03:14:31 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000380)="240000001a00110214f9f4072a0904001100000ec0020000000200000800040003000000", 0x24) 03:14:31 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000000)=0xd08c52825bd74bef) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000040)={@host}) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, &(0x7f0000000080)={{}, 0x8}) 03:14:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000066c0)=[{{0x0, 0x10, &(0x7f0000001340)=[{&(0x7f0000001100)="7f8187bbe7ae57f9708da4177ba207ca40dc611f76bffa177757215e4174bee52acebdfa38c1df5f84f2f5f92c60e4814e6f0d311bb1780365d99e73d12b5fdb4a5f1311b2912c8bdebb3fc514b6", 0x4e}, {&(0x7f0000001200)="a9a210e9d28a84756402047efda9bcfcdc26667c776a9226b4b99d9f66fa073bd546b6100bb1d3125925b0c9576d5d307ddc", 0x20001232}], 0x2}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 03:14:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x7, 0x5}, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x1, 0x40ffbc16}, 0x0) r1 = gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="230228efb4a24ee8d3ada293ca002400e9dc3c1e76586ba2400d4bc83baebf2700e02b91d37e7f1c659f520b74ef4ebcc9c3e0665ed060040000007df4108f0a765b"], 0x141) syz_mount_image$squashfs(&(0x7f00000002c0)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x41870, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setattr(r1, &(0x7f0000000080)={0x38, 0x2, 0x78, 0x80000000, 0x1, 0x6, 0x401, 0x3f, 0x4, 0xffffff80}, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 110.001697][ T8397] IPVS: ftp: loaded support on port[0] = 21 [ 110.229154][ T8397] chnl_net:caif_netlink_parms(): no params data found [ 110.233139][ T8399] IPVS: ftp: loaded support on port[0] = 21 [ 110.347703][ T8397] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.358027][ T8397] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.367439][ T8397] device bridge_slave_0 entered promiscuous mode [ 110.413400][ T8397] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.423393][ T8397] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.436694][ T8397] device bridge_slave_1 entered promiscuous mode [ 110.461589][ T8401] IPVS: ftp: loaded support on port[0] = 21 [ 110.544057][ T8397] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 110.569613][ T8397] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 110.582867][ T8399] chnl_net:caif_netlink_parms(): no params data found [ 110.622467][ T8397] team0: Port device team_slave_0 added [ 110.649606][ T8397] team0: Port device team_slave_1 added [ 110.653323][ T8403] IPVS: ftp: loaded support on port[0] = 21 [ 110.753276][ T8397] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 110.779428][ T8397] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.806756][ T8397] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 110.821682][ T8397] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 110.829663][ T8397] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.857434][ T8397] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 110.967835][ T8405] IPVS: ftp: loaded support on port[0] = 21 [ 111.012606][ T8399] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.024911][ T8399] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.032970][ T8399] device bridge_slave_0 entered promiscuous mode [ 111.084153][ T8397] device hsr_slave_0 entered promiscuous mode [ 111.093503][ T8397] device hsr_slave_1 entered promiscuous mode [ 111.100623][ T8399] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.108039][ T8399] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.117455][ T8399] device bridge_slave_1 entered promiscuous mode [ 111.146216][ T8401] chnl_net:caif_netlink_parms(): no params data found [ 111.200731][ T8399] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 111.268971][ T8399] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 111.337676][ T8442] IPVS: ftp: loaded support on port[0] = 21 [ 111.402685][ T8403] chnl_net:caif_netlink_parms(): no params data found [ 111.433651][ T8399] team0: Port device team_slave_0 added [ 111.479887][ T8399] team0: Port device team_slave_1 added [ 111.526045][ T8399] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 111.533036][ T8399] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 111.559205][ T8399] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 111.573881][ T8399] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 111.581687][ T8399] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 111.608672][ T8399] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 111.629863][ T8401] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.637720][ T8401] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.647062][ T8401] device bridge_slave_0 entered promiscuous mode [ 111.686607][ T8401] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.696583][ T8401] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.705532][ T8401] device bridge_slave_1 entered promiscuous mode [ 111.727136][ T8399] device hsr_slave_0 entered promiscuous mode [ 111.734355][ T8399] device hsr_slave_1 entered promiscuous mode [ 111.742303][ T8399] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 111.751052][ T8399] Cannot create hsr debugfs directory [ 111.872581][ T8401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 111.893211][ T8401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 111.903261][ T8403] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.910927][ T8403] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.920594][ T8403] device bridge_slave_0 entered promiscuous mode [ 111.931282][ T8403] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.938429][ T8403] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.947285][ T8403] device bridge_slave_1 entered promiscuous mode [ 111.956120][ T2939] Bluetooth: hci0: command 0x0409 tx timeout [ 111.992492][ T8401] team0: Port device team_slave_0 added [ 111.999187][ T8405] chnl_net:caif_netlink_parms(): no params data found [ 112.022901][ T8401] team0: Port device team_slave_1 added [ 112.101943][ T8403] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 112.118702][ T8403] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 112.130088][ T8401] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 112.138176][ T8401] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 112.164724][ T8401] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 112.194961][ T19] Bluetooth: hci1: command 0x0409 tx timeout [ 112.223285][ T8401] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 112.255339][ T8401] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 112.281903][ T8401] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 112.329458][ T8403] team0: Port device team_slave_0 added [ 112.354705][ T8403] team0: Port device team_slave_1 added [ 112.383767][ T8442] chnl_net:caif_netlink_parms(): no params data found [ 112.424953][ T8397] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 112.443936][ T3143] Bluetooth: hci2: command 0x0409 tx timeout [ 112.452248][ T8403] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 112.461137][ T8403] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 112.487717][ T8403] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 112.518006][ T8397] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 112.548938][ T8401] device hsr_slave_0 entered promiscuous mode [ 112.556699][ T8401] device hsr_slave_1 entered promiscuous mode [ 112.563120][ T8401] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 112.571392][ T8401] Cannot create hsr debugfs directory [ 112.578421][ T8403] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 112.585915][ T8403] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 112.612427][ T8403] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 112.623961][ T8405] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.631249][ T8405] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.639584][ T8405] device bridge_slave_0 entered promiscuous mode [ 112.652076][ T8405] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.659727][ T8405] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.668394][ T8405] device bridge_slave_1 entered promiscuous mode [ 112.675109][ T7] Bluetooth: hci3: command 0x0409 tx timeout [ 112.684409][ T8397] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 112.704684][ T8397] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 112.781428][ T8403] device hsr_slave_0 entered promiscuous mode [ 112.789610][ T8403] device hsr_slave_1 entered promiscuous mode [ 112.796827][ T8403] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 112.804390][ T8403] Cannot create hsr debugfs directory [ 112.820319][ T8405] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 112.851049][ T8399] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 112.868581][ T8405] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 112.902435][ T8399] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 112.915296][ T8405] team0: Port device team_slave_0 added [ 112.915893][ T3143] Bluetooth: hci4: command 0x0409 tx timeout [ 112.961039][ T8399] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 112.981639][ T8399] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 112.993297][ T8405] team0: Port device team_slave_1 added [ 113.002896][ T8442] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.010089][ T8442] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.018425][ T8442] device bridge_slave_0 entered promiscuous mode [ 113.058501][ T8442] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.065984][ T8442] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.073658][ T8442] device bridge_slave_1 entered promiscuous mode [ 113.113324][ T8405] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 113.122444][ T8405] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 113.149482][ T8405] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 113.186855][ T8442] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 113.198527][ T8442] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 113.208195][ T8405] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 113.215700][ T8405] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 113.243160][ T8405] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 113.244435][ T7] Bluetooth: hci5: command 0x0409 tx timeout [ 113.332946][ T8442] team0: Port device team_slave_0 added [ 113.364584][ T8442] team0: Port device team_slave_1 added [ 113.381765][ T8405] device hsr_slave_0 entered promiscuous mode [ 113.401907][ T8405] device hsr_slave_1 entered promiscuous mode [ 113.414286][ T8405] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 113.422757][ T8405] Cannot create hsr debugfs directory [ 113.511157][ T8397] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.521278][ T8442] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 113.530870][ T8442] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 113.558081][ T8442] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 113.572957][ T8442] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 113.581010][ T8442] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 113.608438][ T8442] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 113.643312][ T8401] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 113.669443][ T8401] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 113.680112][ T8401] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 113.720188][ T8442] device hsr_slave_0 entered promiscuous mode [ 113.727911][ T8442] device hsr_slave_1 entered promiscuous mode [ 113.736316][ T8442] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 113.743884][ T8442] Cannot create hsr debugfs directory [ 113.777778][ T8401] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 113.819184][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.829589][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.869039][ T8397] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.921865][ T8403] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 113.947382][ T8399] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.964461][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.974674][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.984831][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.992111][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.031642][ T8403] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 114.043020][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.052515][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.060916][ T7] Bluetooth: hci0: command 0x041b tx timeout [ 114.063126][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.077668][ T2939] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.084801][ T2939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.093440][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 114.102509][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 114.120631][ T8403] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 114.132332][ T8403] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 114.163630][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.173937][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.183737][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.195670][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.212496][ T8399] 8021q: adding VLAN 0 to HW filter on device team0 [ 114.236982][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 114.245958][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.253675][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.262526][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.272374][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.282377][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.284879][ T7] Bluetooth: hci1: command 0x041b tx timeout [ 114.292320][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.321185][ T8397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 114.345109][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.353711][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.374272][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.381450][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.416536][ T8401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 114.450573][ T8405] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 114.462087][ T8405] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 114.483096][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.492006][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.501001][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.510048][ T9671] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.517192][ T9671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.524950][ T7] Bluetooth: hci2: command 0x041b tx timeout [ 114.525919][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 114.539592][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 114.548517][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 114.557035][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 114.572107][ T8397] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 114.585648][ T8405] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 114.608283][ T8405] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 114.625944][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.634499][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.650708][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 114.683839][ T8401] 8021q: adding VLAN 0 to HW filter on device team0 [ 114.708804][ T8442] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 114.720313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.730811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.739994][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.749719][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.772732][ T8399] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 114.783529][ T8399] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 114.783667][ T7] Bluetooth: hci3: command 0x041b tx timeout [ 114.806421][ T8442] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 114.822809][ T8442] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 114.832280][ T8442] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 114.861561][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.870459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.879685][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.888633][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.922511][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 114.935886][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.944350][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.958177][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.965397][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.975414][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.983943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.998284][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.005456][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.013971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.022813][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.031430][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 115.042386][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.051275][ T7] Bluetooth: hci4: command 0x041b tx timeout [ 115.104120][ T8403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 115.117864][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 115.126423][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 115.133810][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 115.143342][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 115.153052][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 115.168451][ T8399] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 115.181545][ T8397] device veth0_vlan entered promiscuous mode [ 115.210787][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 115.219047][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.228076][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.237601][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 115.247762][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 115.257308][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.266248][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.298303][ T8397] device veth1_vlan entered promiscuous mode [ 115.315281][ T3143] Bluetooth: hci5: command 0x041b tx timeout [ 115.318094][ T8403] 8021q: adding VLAN 0 to HW filter on device team0 [ 115.345071][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.352801][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.361492][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 115.370347][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.379588][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.388368][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 115.398413][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 115.439595][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 115.448908][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 115.458509][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 115.467181][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.476271][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.484548][ T2939] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.491649][ T2939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.499401][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.507775][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.516306][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.525085][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.533559][ T2939] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.540673][ T2939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.555824][ T8401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 115.591799][ T8397] device veth0_macvtap entered promiscuous mode [ 115.601536][ T8399] device veth0_vlan entered promiscuous mode [ 115.608833][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.617927][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.626264][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.633830][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.643829][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.657956][ T8442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 115.673606][ T8397] device veth1_macvtap entered promiscuous mode [ 115.683195][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 115.691521][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 115.721137][ T8442] 8021q: adding VLAN 0 to HW filter on device team0 [ 115.736274][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 115.746278][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 115.753676][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 115.762551][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.770637][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.785336][ T8401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 115.792322][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.803016][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.812161][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.819377][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.869161][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.877414][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 115.888564][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 115.897832][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 115.907634][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 115.916942][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.925825][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.934072][ T9671] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.941162][ T9671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.948979][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 115.957961][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 115.968588][ T8399] device veth1_vlan entered promiscuous mode [ 115.991732][ T8397] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 116.000502][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 116.008664][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 116.018582][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.027124][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 116.036719][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 116.045494][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.054127][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.080058][ T8405] 8021q: adding VLAN 0 to HW filter on device bond0 [ 116.093801][ T8397] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 116.102186][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 116.112838][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.122319][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.125069][ T3143] Bluetooth: hci0: command 0x040f tx timeout [ 116.145913][ T8399] device veth0_macvtap entered promiscuous mode [ 116.171967][ T8405] 8021q: adding VLAN 0 to HW filter on device team0 [ 116.184491][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.200485][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.210524][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 116.224033][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.232903][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 116.242312][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.265544][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 116.273360][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.281895][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 116.291685][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 116.301075][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 116.310520][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.320239][ T3143] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.327370][ T3143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.339048][ T8403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 116.354085][ T8399] device veth1_macvtap entered promiscuous mode [ 116.364910][ T9703] Bluetooth: hci1: command 0x040f tx timeout [ 116.378296][ T8397] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.388372][ T8397] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.403772][ T8397] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.418006][ T8397] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.458015][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 116.466840][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.474777][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.482577][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 116.491626][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.500851][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 116.510804][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.520178][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 116.530691][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.539526][ T3143] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.546641][ T3143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.554250][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 116.585019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 116.594085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.610017][ T7] Bluetooth: hci2: command 0x040f tx timeout [ 116.612668][ T8442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 116.651009][ T8399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.666315][ T8399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.679527][ T8399] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 116.691059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.699534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.708249][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.717782][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.727199][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 116.734584][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 116.774113][ T8401] device veth0_vlan entered promiscuous mode [ 116.782390][ T8399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.793455][ T8399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.810317][ T8399] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 116.819789][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 116.829739][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 116.839579][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 116.844957][ T56] Bluetooth: hci3: command 0x040f tx timeout [ 116.850247][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 116.864162][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 116.873185][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.882223][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.892730][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 116.912271][ T8403] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 116.936784][ T8399] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.947708][ T8399] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.960776][ T8399] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.971682][ T8399] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 117.002520][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 117.010449][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 117.018393][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 117.027368][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 117.037222][ T8401] device veth1_vlan entered promiscuous mode [ 117.061245][ T8442] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 117.081626][ T8405] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 117.092598][ T3143] Bluetooth: hci4: command 0x040f tx timeout [ 117.116214][ T8405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 117.153634][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 117.183957][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 117.257155][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 117.266488][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 117.381679][ T8401] device veth0_macvtap entered promiscuous mode [ 117.395561][ T56] Bluetooth: hci5: command 0x040f tx timeout [ 117.427839][ T8401] device veth1_macvtap entered promiscuous mode [ 117.447715][ T283] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 117.457347][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 117.466928][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 117.478276][ T283] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 117.489757][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 117.498291][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 117.507071][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.515627][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 117.523144][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 117.534168][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 117.542766][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 117.561517][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.570132][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.583165][ T8403] device veth0_vlan entered promiscuous mode [ 117.617068][ T8405] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 117.640113][ T211] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 117.653628][ T8403] device veth1_vlan entered promiscuous mode [ 117.690743][ T211] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 117.718476][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 117.746899][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 117.755486][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 117.764095][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 117.774753][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 117.786073][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.797907][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 117.808900][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.820217][ T8401] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 117.858849][ T224] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 117.867835][ T224] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 117.881850][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 117.890773][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 117.900475][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 117.911624][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 117.923161][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.933900][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 117.946365][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.958427][ T8401] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 117.974868][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 117.984501][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 118.011219][ T8401] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.025752][ T8401] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.034453][ T8401] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.043817][ T8401] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.106120][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 118.115243][ T283] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 118.123274][ T283] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 118.133597][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 118.147752][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 118.166124][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.186134][ T8442] device veth0_vlan entered promiscuous mode [ 118.193969][ T8403] device veth0_macvtap entered promiscuous mode [ 118.216618][ T9703] Bluetooth: hci0: command 0x0419 tx timeout [ 118.277349][ T283] wlan0: BSS 50:50:50:50:50:50 switches to unsupported channel (0 MHz), disconnecting [ 118.283666][ T8442] device veth1_vlan entered promiscuous mode [ 118.314934][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 118.326417][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 118.338127][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.347074][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.355613][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 118.363835][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 118.373587][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.388430][ T8403] device veth1_macvtap entered promiscuous mode [ 118.395382][ T283] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 118.403649][ T283] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 118.436419][ T5] Bluetooth: hci1: command 0x0419 tx timeout [ 118.452351][ T193] wlan0: BSS 50:50:50:50:50:50 switches to unsupported channel (0 MHz), disconnecting [ 118.476709][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 03:14:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x50, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x32, 0x33, @action={@with_ht={{{}, {}, @broadcast, @device_b}}, @channel_switch={0x0, 0x4, {{0x25, 0x3}, @val={0x3e, 0x1}, @val={0x76, 0x6}}}}}]}, 0x50}}, 0x0) [ 118.486881][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 118.503061][ T193] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 118.506641][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 118.514478][ T193] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 118.555636][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.588362][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.615512][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.630732][ T8405] device veth0_vlan entered promiscuous mode [ 118.651662][ T283] wlan0: BSS 50:50:50:50:50:50 switches to unsupported channel (0 MHz), disconnecting [ 118.667599][ T224] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 118.676326][ T56] Bluetooth: hci2: command 0x0419 tx timeout [ 118.700433][ T224] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 118.709550][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 03:14:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x50, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x32, 0x33, @action={@with_ht={{{}, {}, @broadcast, @device_b}}, @channel_switch={0x0, 0x4, {{0x25, 0x3}, @val={0x3e, 0x1}, @val={0x76, 0x6}}}}}]}, 0x50}}, 0x0) [ 118.722497][ T283] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 118.728188][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 118.746789][ T283] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 118.777888][ T8442] device veth0_macvtap entered promiscuous mode [ 118.869894][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 118.903001][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 118.925730][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 118.943254][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.955237][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 118.966984][ T3143] Bluetooth: hci3: command 0x0419 tx timeout [ 118.967166][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.987962][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 119.000633][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 119.015385][ T8403] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 119.051167][ T8405] device veth1_vlan entered promiscuous mode [ 119.070277][ T8442] device veth1_macvtap entered promiscuous mode 03:14:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x50, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x32, 0x33, @action={@with_ht={{{}, {}, @broadcast, @device_b}}, @channel_switch={0x0, 0x4, {{0x25, 0x3}, @val={0x3e, 0x1}, @val={0x76, 0x6}}}}}]}, 0x50}}, 0x0) [ 119.102237][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 119.113337][ T9671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.128815][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 119.155606][ T3143] Bluetooth: hci4: command 0x0419 tx timeout [ 119.174579][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 119.184416][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 119.204844][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 119.221552][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 119.232734][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 119.247905][ T8403] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 119.300552][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 119.317202][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 119.361622][ T193] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 119.370780][ T8403] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 119.388245][ T193] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 119.405051][ T8403] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 119.442991][ T8403] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 119.473940][ T8403] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 119.494693][ T56] Bluetooth: hci5: command 0x0419 tx timeout [ 119.531801][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 119.533981][ T211] wlan0: BSS 50:50:50:50:50:50 switches to unsupported channel (0 MHz), disconnecting 03:14:41 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = memfd_create(&(0x7f0000000900)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd930x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x541b, 0x0) 03:14:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000066c0)=[{{0x0, 0x10, &(0x7f0000001340)=[{&(0x7f0000001100)="7f8187bbe7ae57f9708da4177ba207ca40dc611f76bffa177757215e4174bee52acebdfa38c1df5f84f2f5f92c60e4814e6f0d311bb1780365d99e73d12b5fdb4a5f1311b2912c8bdebb3fc514b6", 0x4e}, {&(0x7f0000001200)="a9a210e9d28a84756402047efda9bcfcdc26667c776a9226b4b99d9f66fa073bd546b6100bb1d3125925b0c9576d5d307ddc", 0x20001232}], 0x2}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) [ 124.576112][T10066] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 03:14:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000066c0)=[{{0x0, 0x10, &(0x7f0000001340)=[{&(0x7f0000001100)="7f8187bbe7ae57f9708da4177ba207ca40dc611f76bffa177757215e4174bee52acebdfa38c1df5f84f2f5f92c60e4814e6f0d311bb1780365d99e73d12b5fdb4a5f1311b2912c8bdebb3fc514b6", 0x4e}, {&(0x7f0000001200)="a9a210e9d28a84756402047efda9bcfcdc26667c776a9226b4b99d9f66fa073bd546b6100bb1d3125925b0c9576d5d307ddc", 0x20001232}], 0x2}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 03:14:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0xe02) write$evdev(r0, &(0x7f00000001c0)=[{}], 0x200001d8) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000001200)=""/4108) [ 125.231084][T10065] loop2: detected capacity change from 264192 to 0 03:14:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000066c0)=[{{0x0, 0x10, &(0x7f0000001340)=[{&(0x7f0000001100)="7f8187bbe7ae57f9708da4177ba207ca40dc611f76bffa177757215e4174bee52acebdfa38c1df5f84f2f5f92c60e4814e6f0d311bb1780365d99e73d12b5fdb4a5f1311b2912c8bdebb3fc514b6", 0x4e}, {&(0x7f0000001200)="a9a210e9d28a84756402047efda9bcfcdc26667c776a9226b4b99d9f66fa073bd546b6100bb1d3125925b0c9576d5d307ddc", 0x20001232}], 0x2}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 03:14:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000066c0)=[{{0x0, 0x10, &(0x7f0000001340)=[{&(0x7f0000001100)="7f8187bbe7ae57f9708da4177ba207ca40dc611f76bffa177757215e4174bee52acebdfa38c1df5f84f2f5f92c60e4814e6f0d311bb1780365d99e73d12b5fdb4a5f1311b2912c8bdebb3fc514b6", 0x4e}, {&(0x7f0000001200)="a9a210e9d28a84756402047efda9bcfcdc26667c776a9226b4b99d9f66fa073bd546b6100bb1d3125925b0c9576d5d307ddc", 0x20001232}], 0x2}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 03:14:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000066c0)=[{{0x0, 0x10, &(0x7f0000001340)=[{&(0x7f0000001100)="7f8187bbe7ae57f9708da4177ba207ca40dc611f76bffa177757215e4174bee52acebdfa38c1df5f84f2f5f92c60e4814e6f0d311bb1780365d99e73d12b5fdb4a5f1311b2912c8bdebb3fc514b6", 0x4e}, {&(0x7f0000001200)="a9a210e9d28a84756402047efda9bcfcdc26667c776a9226b4b99d9f66fa073bd546b6100bb1d3125925b0c9576d5d307ddc", 0x20001232}], 0x2}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) [ 125.950493][T10096] loop2: detected capacity change from 264192 to 0 03:14:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000066c0)=[{{0x0, 0x10, &(0x7f0000001340)=[{&(0x7f0000001100)="7f8187bbe7ae57f9708da4177ba207ca40dc611f76bffa177757215e4174bee52acebdfa38c1df5f84f2f5f92c60e4814e6f0d311bb1780365d99e73d12b5fdb4a5f1311b2912c8bdebb3fc514b6", 0x4e}, {&(0x7f0000001200)="a9a210e9d28a84756402047efda9bcfcdc26667c776a9226b4b99d9f66fa073bd546b6100bb1d3125925b0c9576d5d307ddc", 0x20001232}], 0x2}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 03:14:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) [ 127.049712][T10119] loop2: detected capacity change from 264192 to 0 03:14:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) [ 127.139403][T10127] loop0: detected capacity change from 264192 to 0 [ 127.230432][T10128] loop4: detected capacity change from 264192 to 0 03:14:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000066c0)=[{{0x0, 0x10, &(0x7f0000001340)=[{&(0x7f0000001100)="7f8187bbe7ae57f9708da4177ba207ca40dc611f76bffa177757215e4174bee52acebdfa38c1df5f84f2f5f92c60e4814e6f0d311bb1780365d99e73d12b5fdb4a5f1311b2912c8bdebb3fc514b6", 0x4e}, {&(0x7f0000001200)="a9a210e9d28a84756402047efda9bcfcdc26667c776a9226b4b99d9f66fa073bd546b6100bb1d3125925b0c9576d5d307ddc", 0x20001232}], 0x2}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 03:14:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) [ 128.012187][T10153] loop0: detected capacity change from 264192 to 0 03:14:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$nfc_llcp(r0, 0x6, 0xd, 0x0, 0x805400) 03:14:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) [ 130.887018][T10176] loop2: detected capacity change from 264192 to 0 [ 130.979960][T10193] loop4: detected capacity change from 264192 to 0 [ 131.060846][T10182] loop0: detected capacity change from 264192 to 0 03:14:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) [ 131.190513][T10185] loop3: detected capacity change from 264192 to 0 03:14:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:53 executing program 0: syz_mount_image$ntfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(&(0x7f0000003940)='127.0.0.1\x00', &(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)='9p\x00', 0x0, &(0x7f0000003a00)={'trans=rdma,', {'port'}}) [ 131.270778][T10184] loop1: detected capacity change from 264192 to 0 03:14:53 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x7fffffff}]) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$CHAR_RAW_REPORTZONE(r0, 0xc0101282, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 03:14:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000340)={0x0, 'veth1_vlan\x00'}, 0x18) 03:14:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:53 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 03:14:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) [ 131.939541][T10237] loop2: detected capacity change from 264192 to 0 03:14:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000340)={0x0, 'veth1_vlan\x00'}, 0x18) 03:14:54 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x7fffffff}]) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$CHAR_RAW_REPORTZONE(r0, 0xc0101282, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 03:14:54 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) [ 132.098434][T10242] loop3: detected capacity change from 264192 to 0 [ 132.266505][T10253] loop1: detected capacity change from 264192 to 0 03:14:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000340)={0x0, 'veth1_vlan\x00'}, 0x18) 03:14:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x0, 0xb8) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {0x0, 0x0, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, 0x0) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x0) 03:14:54 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x7fffffff}]) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$CHAR_RAW_REPORTZONE(r0, 0xc0101282, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 03:14:54 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 03:14:54 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) membarrier(0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000540)={0x750, {0x2, 0x0, @rand_addr=0xfffffffc}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x2, 0x46a}) unshare(0x60000000) syz_open_dev$ttys(0xc, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) r0 = dup(0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) 03:14:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000340)={0x0, 'veth1_vlan\x00'}, 0x18) [ 132.647280][T10279] loop2: detected capacity change from 264192 to 0 [ 132.731703][T10280] loop3: detected capacity change from 264192 to 0 03:14:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) [ 132.844826][T10294] IPVS: ftp: loaded support on port[0] = 21 03:14:55 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 03:14:55 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x7fffffff}]) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$CHAR_RAW_REPORTZONE(r0, 0xc0101282, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 03:14:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) [ 133.386442][T10337] loop4: detected capacity change from 264192 to 0 [ 133.406608][T10339] loop2: detected capacity change from 264192 to 0 03:14:55 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) membarrier(0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000540)={0x750, {0x2, 0x0, @rand_addr=0xfffffffc}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x2, 0x46a}) unshare(0x60000000) syz_open_dev$ttys(0xc, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) r0 = dup(0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) 03:14:55 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) [ 133.494933][T10344] loop0: detected capacity change from 264192 to 0 03:14:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) [ 133.888753][T10356] IPVS: ftp: loaded support on port[0] = 21 03:14:56 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) [ 134.040321][T10371] loop4: detected capacity change from 264192 to 0 [ 134.074218][T10373] loop0: detected capacity change from 264192 to 0 [ 134.110117][T10377] loop2: detected capacity change from 264192 to 0 03:14:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) 03:14:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:56 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) [ 134.749668][T10418] loop4: detected capacity change from 264192 to 0 [ 134.801527][T10415] loop0: detected capacity change from 264192 to 0 [ 134.847193][T10431] loop2: detected capacity change from 264192 to 0 03:14:59 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) membarrier(0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000540)={0x750, {0x2, 0x0, @rand_addr=0xfffffffc}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x2, 0x46a}) unshare(0x60000000) syz_open_dev$ttys(0xc, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) r0 = dup(0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) 03:14:59 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) 03:14:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:14:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070700f5e0b326000b0000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000090001007072696f00000000180002000d"], 0x48}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 03:14:59 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000300)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0x8) 03:14:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 03:14:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 03:14:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070700f5e0b326000b0000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000090001007072696f00000000180002000d"], 0x48}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 137.673962][T10464] loop3: detected capacity change from 264192 to 0 03:14:59 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) [ 137.844118][T10474] IPVS: ftp: loaded support on port[0] = 21 03:14:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:15:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 03:15:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070700f5e0b326000b0000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000090001007072696f00000000180002000d"], 0x48}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 03:15:00 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) membarrier(0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000540)={0x750, {0x2, 0x0, @rand_addr=0xfffffffc}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x2, 0x46a}) unshare(0x60000000) syz_open_dev$ttys(0xc, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) r0 = dup(0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) 03:15:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) [ 138.725566][T10528] IPVS: ftp: loaded support on port[0] = 21 03:15:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070700f5e0b326000b0000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000090001007072696f00000000180002000d"], 0x48}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 03:15:01 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000300)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0x8) 03:15:01 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x7ff) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400200, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001480)) 03:15:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000240)=0xc) ptrace$setregs(0xf, r1, 0x1, &(0x7f0000000340)="dd2a604a67cda1ba37f1d9e21f39442518c1506044") wait4(0x0, 0x0, 0x80000002, 0x0) getrusage(0x0, &(0x7f0000000380)) getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffde) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="b94bfc4722a8e5494984a5a2ca2a9347b29407a7c1f9f2b3f121903f1a9f637695fa29bbc3366dd1cb7ef7d9b5f2f3131d6c9bcab9fdb14c8932a5bd4fbbe20d4ecbda51f52150ecd434b3993ea81fd4a4de8501034312841411ceceec33f162fa4028a91ce0b51991c6e93e4218ce2866cdf97bb6b7dc44dc7444a5b065f5939092ba6995abf80911ae54584fb646ec49efd00e35f94a59206a", 0x9a, 0x10000}, {&(0x7f0000000200)="128a538da555676fd27b524f90553b34c676e054a36d732334b117e2ac602a3656d3649286e230c8", 0x28, 0xffffffff}, {&(0x7f0000000340), 0x0, 0x6}, {0x0}], 0x1084c0, &(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="2c6465636f6d706f7317690893213d737978303030303030303030303030303335332c6673636f6e746578743d757365725f752c7375626a5f757365723d2c61756469", @ANYBLOB=',']) dup(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0xa, &(0x7f0000000000)={0xe, 0xea6}) eventfd(0x81) 03:15:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x7, &(0x7f0000000200)=@framed={{}, [@exit, @alu={0x0, 0x0, 0x2}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000280)='GPL\x00', 0x4, 0x83, &(0x7f00000002c0)=""/131, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 139.139590][T10559] loop3: detected capacity change from 264192 to 0 03:15:01 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) 03:15:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, 0x0, &(0x7f0000001140)) 03:15:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}]}, 0x94}}, 0x0) 03:15:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, 0x0, &(0x7f0000001140)) 03:15:01 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) [ 139.620534][T10580] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 03:15:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300506, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa00200000fdff86dd60ee090003000000fe80209c00a0000000220040b0d047960047d44e340000000000c204173401e91065"], 0x0) 03:15:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}]}, 0x94}}, 0x0) 03:15:01 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) 03:15:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, 0x0, &(0x7f0000001140)) 03:15:02 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000300)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0x8) 03:15:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300506, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa00200000fdff86dd60ee090003000000fe80209c00a0000000220040b0d047960047d44e340000000000c204173401e91065"], 0x0) [ 139.960593][T10593] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 03:15:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}]}, 0x94}}, 0x0) 03:15:02 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) 03:15:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}]}, 0x94}}, 0x0) 03:15:02 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, 0x0, &(0x7f0000001140)) 03:15:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300506, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa00200000fdff86dd60ee090003000000fe80209c00a0000000220040b0d047960047d44e340000000000c204173401e91065"], 0x0) [ 140.855208][T10614] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 03:15:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}}]}, 0x44}}, 0x0) 03:15:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300506, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa00200000fdff86dd60ee090003000000fe80209c00a0000000220040b0d047960047d44e340000000000c204173401e91065"], 0x0) 03:15:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) [ 140.932433][T10617] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:15:03 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000300)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0x8) 03:15:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}]}, 0x94}}, 0x0) 03:15:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}]}, 0x94}}, 0x0) 03:15:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}}]}, 0x44}}, 0x0) [ 141.164579][T10627] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 03:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0xffffffff, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/197, 0x4a, 0xc5, 0x8}, 0x20) 03:15:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) [ 141.254497][T10632] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:15:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 03:15:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x94, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}]}, 0x94}}, 0x0) 03:15:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}}]}, 0x44}}, 0x0) 03:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0xffffffff, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/197, 0x4a, 0xc5, 0x8}, 0x20) [ 141.463234][T10640] new mount options do not match the existing superblock, will be ignored [ 141.540122][T10640] new mount options do not match the existing superblock, will be ignored [ 141.561588][T10645] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:15:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 03:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0xffffffff, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/197, 0x4a, 0xc5, 0x8}, 0x20) 03:15:04 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 03:15:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x19, &(0x7f0000000280)={&(0x7f0000000040)=@bridge_newneigh={0x24, 0x18, 0x1, 0x0, 0x0, {0xa}, [@NDA_IFINDEX={0x8}]}, 0x24}}, 0x0) 03:15:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) 03:15:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}}]}, 0x44}}, 0x0) 03:15:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0xffffffff, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/197, 0x4a, 0xc5, 0x8}, 0x20) 03:15:04 executing program 5: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 142.119929][T10667] new mount options do not match the existing superblock, will be ignored 03:15:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x19, &(0x7f0000000280)={&(0x7f0000000040)=@bridge_newneigh={0x24, 0x18, 0x1, 0x0, 0x0, {0xa}, [@NDA_IFINDEX={0x8}]}, 0x24}}, 0x0) 03:15:04 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) mkdir(&(0x7f0000000040)='./control/file0\x00', 0x0) r3 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000100)='./control\x00', 0x0) getdents64(r3, &(0x7f0000fc4fbe)=""/80, 0x50) getdents64(r3, 0x0, 0x7ffffffff000) 03:15:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="0e9b08073f00003968"], 0x40) 03:15:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) 03:15:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0xc042) 03:15:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x19, &(0x7f0000000280)={&(0x7f0000000040)=@bridge_newneigh={0x24, 0x18, 0x1, 0x0, 0x0, {0xa}, [@NDA_IFINDEX={0x8}]}, 0x24}}, 0x0) 03:15:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="0e9b08073f00003968"], 0x40) [ 142.492599][T10684] new mount options do not match the existing superblock, will be ignored 03:15:04 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) mkdir(&(0x7f0000000040)='./control/file0\x00', 0x0) r3 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000100)='./control\x00', 0x0) getdents64(r3, &(0x7f0000fc4fbe)=""/80, 0x50) getdents64(r3, 0x0, 0x7ffffffff000) 03:15:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) 03:15:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x19, &(0x7f0000000280)={&(0x7f0000000040)=@bridge_newneigh={0x24, 0x18, 0x1, 0x0, 0x0, {0xa}, [@NDA_IFINDEX={0x8}]}, 0x24}}, 0x0) 03:15:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0xc042) 03:15:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="0e9b08073f00003968"], 0x40) [ 142.885920][T10699] new mount options do not match the existing superblock, will be ignored 03:15:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0xc042) 03:15:05 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() ptrace$cont(0x20, r1, 0x0, 0x10001) sendmmsg$unix(r0, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}], 0x49249249249263a, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e20, @empty}}, 0x0, 0x0, 0x41, 0x0, "d6b47e4d7204a59cc4737d9c7c6cd759ba2109e56e879c86dbbbea936da6be3138329930c0ca38d9e1d1e04607a6d27507a049c236790fb1c1392191d095f91eef4fc55b569744ecb97c73aa16c91a10"}, 0xd8) 03:15:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="0e9b08073f00003968"], 0x40) 03:15:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:05 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) mkdir(&(0x7f0000000040)='./control/file0\x00', 0x0) r3 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000100)='./control\x00', 0x0) getdents64(r3, &(0x7f0000fc4fbe)=""/80, 0x50) getdents64(r3, 0x0, 0x7ffffffff000) 03:15:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0xc042) 03:15:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:05 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) mkdir(&(0x7f0000000040)='./control/file0\x00', 0x0) r3 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000100)='./control\x00', 0x0) getdents64(r3, &(0x7f0000fc4fbe)=""/80, 0x50) getdents64(r3, 0x0, 0x7ffffffff000) 03:15:05 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) 03:15:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:06 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006600)=[{{0x0, 0x0, &(0x7f0000001a80)=[{0x0}, {&(0x7f0000001900)=""/223, 0xdf}], 0x2}}, {{0x0, 0x0, &(0x7f00000024c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000002080)=""/40, 0x28}, {0x0}, {&(0x7f0000002180)=""/211, 0xd3}, {0x0}, {0x0}], 0x8}}, {{0x0, 0x0, &(0x7f0000005340)=[{&(0x7f0000003080)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {&(0x7f0000004240)=""/4096, 0x1000}], 0x5}}], 0x3, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000540)=[{{&(0x7f0000000080)=@generic={0x0, "a265614946a7359b1916384c320e72f5652c316d6dfdc93e83c72f91eb80bc2c34c4963f97e0165586e0956ce595f79cdfcf09624e8af58a23b983c2bf15246cb2362b011aa063371e0ef53024b448efdf932ceb011f268156346eebc90a8e90f425c6a5e5d6e74136a1fb835809cb825ad1b57d280694cd598b75c64d12"}, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="4dc069e5434e5062a6b585f3ca96bb222318d0d3df1dcf10479ea2fd88f8f1d1ff01d7badc7a1a1fa796af21c93e6514b071aa75a255af2f722d4869ca59db559e6a60bb9716cee1c723b9f020b399c7b1d5c1c2478ec461c02aa1e1063e70d2106ace22548c96ba7b8b90efe7b4b0381c5391f23398062ccac5d6da76ea2dcce2bd6d661ebb77eb212434af5e136323c087072463138ee881603a"}], 0x0, &(0x7f0000000200)}}], 0x6cb, 0x0) 03:15:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) io_destroy(0x0) io_submit(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 03:15:07 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) 03:15:07 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006600)=[{{0x0, 0x0, &(0x7f0000001a80)=[{0x0}, {&(0x7f0000001900)=""/223, 0xdf}], 0x2}}, {{0x0, 0x0, &(0x7f00000024c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000002080)=""/40, 0x28}, {0x0}, {&(0x7f0000002180)=""/211, 0xd3}, {0x0}, {0x0}], 0x8}}, {{0x0, 0x0, &(0x7f0000005340)=[{&(0x7f0000003080)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {&(0x7f0000004240)=""/4096, 0x1000}], 0x5}}], 0x3, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000540)=[{{&(0x7f0000000080)=@generic={0x0, "a265614946a7359b1916384c320e72f5652c316d6dfdc93e83c72f91eb80bc2c34c4963f97e0165586e0956ce595f79cdfcf09624e8af58a23b983c2bf15246cb2362b011aa063371e0ef53024b448efdf932ceb011f268156346eebc90a8e90f425c6a5e5d6e74136a1fb835809cb825ad1b57d280694cd598b75c64d12"}, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="4dc069e5434e5062a6b585f3ca96bb222318d0d3df1dcf10479ea2fd88f8f1d1ff01d7badc7a1a1fa796af21c93e6514b071aa75a255af2f722d4869ca59db559e6a60bb9716cee1c723b9f020b399c7b1d5c1c2478ec461c02aa1e1063e70d2106ace22548c96ba7b8b90efe7b4b0381c5391f23398062ccac5d6da76ea2dcce2bd6d661ebb77eb212434af5e136323c087072463138ee881603a"}], 0x0, &(0x7f0000000200)}}], 0x6cb, 0x0) 03:15:07 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) 03:15:07 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) 03:15:07 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006600)=[{{0x0, 0x0, &(0x7f0000001a80)=[{0x0}, {&(0x7f0000001900)=""/223, 0xdf}], 0x2}}, {{0x0, 0x0, &(0x7f00000024c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000002080)=""/40, 0x28}, {0x0}, {&(0x7f0000002180)=""/211, 0xd3}, {0x0}, {0x0}], 0x8}}, {{0x0, 0x0, &(0x7f0000005340)=[{&(0x7f0000003080)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {&(0x7f0000004240)=""/4096, 0x1000}], 0x5}}], 0x3, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000540)=[{{&(0x7f0000000080)=@generic={0x0, "a265614946a7359b1916384c320e72f5652c316d6dfdc93e83c72f91eb80bc2c34c4963f97e0165586e0956ce595f79cdfcf09624e8af58a23b983c2bf15246cb2362b011aa063371e0ef53024b448efdf932ceb011f268156346eebc90a8e90f425c6a5e5d6e74136a1fb835809cb825ad1b57d280694cd598b75c64d12"}, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="4dc069e5434e5062a6b585f3ca96bb222318d0d3df1dcf10479ea2fd88f8f1d1ff01d7badc7a1a1fa796af21c93e6514b071aa75a255af2f722d4869ca59db559e6a60bb9716cee1c723b9f020b399c7b1d5c1c2478ec461c02aa1e1063e70d2106ace22548c96ba7b8b90efe7b4b0381c5391f23398062ccac5d6da76ea2dcce2bd6d661ebb77eb212434af5e136323c087072463138ee881603a"}], 0x0, &(0x7f0000000200)}}], 0x6cb, 0x0) 03:15:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/115) 03:15:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x0, 0xffffffff, 0x0, 0xb3550aa4ba878254}, 0x9c) 03:15:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/115) 03:15:07 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006600)=[{{0x0, 0x0, &(0x7f0000001a80)=[{0x0}, {&(0x7f0000001900)=""/223, 0xdf}], 0x2}}, {{0x0, 0x0, &(0x7f00000024c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000002080)=""/40, 0x28}, {0x0}, {&(0x7f0000002180)=""/211, 0xd3}, {0x0}, {0x0}], 0x8}}, {{0x0, 0x0, &(0x7f0000005340)=[{&(0x7f0000003080)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {&(0x7f0000004240)=""/4096, 0x1000}], 0x5}}], 0x3, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000540)=[{{&(0x7f0000000080)=@generic={0x0, "a265614946a7359b1916384c320e72f5652c316d6dfdc93e83c72f91eb80bc2c34c4963f97e0165586e0956ce595f79cdfcf09624e8af58a23b983c2bf15246cb2362b011aa063371e0ef53024b448efdf932ceb011f268156346eebc90a8e90f425c6a5e5d6e74136a1fb835809cb825ad1b57d280694cd598b75c64d12"}, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="4dc069e5434e5062a6b585f3ca96bb222318d0d3df1dcf10479ea2fd88f8f1d1ff01d7badc7a1a1fa796af21c93e6514b071aa75a255af2f722d4869ca59db559e6a60bb9716cee1c723b9f020b399c7b1d5c1c2478ec461c02aa1e1063e70d2106ace22548c96ba7b8b90efe7b4b0381c5391f23398062ccac5d6da76ea2dcce2bd6d661ebb77eb212434af5e136323c087072463138ee881603a"}], 0x0, &(0x7f0000000200)}}], 0x6cb, 0x0) 03:15:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x24, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x6, 0xffff}}}, 0x24}}, 0x0) 03:15:08 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/115) [ 146.154812][T10788] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 03:15:08 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) 03:15:08 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) 03:15:08 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/115) 03:15:08 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) [ 146.280352][T10791] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 03:15:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x24, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x6, 0xffff}}}, 0x24}}, 0x0) 03:15:08 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0x9, 0x20000000001, "11"}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:15:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x0, 0xffffffff, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 146.659079][T10811] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 03:15:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x24, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x6, 0xffff}}}, 0x24}}, 0x0) [ 147.048097][T10825] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 03:15:09 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0x9, 0x20000000001, "11"}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:15:09 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) 03:15:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x24, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x6, 0xffff}}}, 0x24}}, 0x0) 03:15:09 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) 03:15:09 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4b}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) read(r0, &(0x7f0000000000)=""/18, 0x12) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/107, 0x6b}], 0x1, 0x0, 0x7ff, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200030c00000000000000000000000100090000000000030006000000000002000000000000000000200000000200020001000000ff010000000b00000000030005000000000002000000ac1e000100000022efff0000010014"], 0x60}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x1c15e33101f29d, 0x0) 03:15:09 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0x9, 0x20000000001, "11"}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 147.549225][T10839] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 03:15:09 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0x9, 0x20000000001, "11"}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:15:09 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) io_setup(0xf7, &(0x7f0000003940)=0x0) io_submit(r1, 0x1, &(0x7f00000038c0)=[&(0x7f0000001180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x3d}]) 03:15:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x0, 0xffffffff, 0x0, 0xb3550aa4ba878254}, 0x9c) 03:15:10 executing program 0: perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xeb}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475fc22da2be3e05004fad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8", 0x89, 0x5fe}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000240)={[{@fat=@dmask={'dmask', 0x3d, 0x8}}, {@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}, {@uni_xlate='uni_xlate=1'}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, 0x0, &(0x7f0000000540)={'L+'}, 0x16, 0x1) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68401) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000580)={0x0, "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"}) socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f00000001c0)={0xa1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:15:10 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) io_setup(0xf7, &(0x7f0000003940)=0x0) io_submit(r1, 0x1, &(0x7f00000038c0)=[&(0x7f0000001180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x3d}]) [ 148.212435][T10865] loop0: detected capacity change from 270 to 0 03:15:10 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) io_setup(0xf7, &(0x7f0000003940)=0x0) io_submit(r1, 0x1, &(0x7f00000038c0)=[&(0x7f0000001180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x3d}]) 03:15:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 03:15:10 executing program 1: setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) [ 148.560498][T10865] usb usb7: usbfs: process 10865 (syz-executor.0) did not claim interface 3 before use 03:15:10 executing program 5: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000440)={{0x12, 0x1, 0x0, 0xb9, 0x72, 0x70, 0x10, 0x403, 0xe808, 0x890f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x16, 0x5c, 0x89, 0x0, [], [{}]}}]}}]}}, 0x0) syz_usb_ep_write(r0, 0x0, 0x0, 0x0) [ 148.661123][T10875] usb usb7: usbfs: process 10875 (syz-executor.0) did not claim interface 3 before use [ 148.720501][T10877] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 148.720548][T10877] team0: Cannot enslave team device to itself [ 148.728761][T10877] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 148.728872][T10877] bridge0: port 3(team0) entered blocking state [ 148.729804][T10877] bridge0: port 3(team0) entered disabled state [ 148.742084][T10877] device team0 entered promiscuous mode 03:15:11 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) io_setup(0xf7, &(0x7f0000003940)=0x0) io_submit(r1, 0x1, &(0x7f00000038c0)=[&(0x7f0000001180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x3d}]) 03:15:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xeb}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475fc22da2be3e05004fad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8", 0x89, 0x5fe}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000240)={[{@fat=@dmask={'dmask', 0x3d, 0x8}}, {@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}, {@uni_xlate='uni_xlate=1'}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, 0x0, &(0x7f0000000540)={'L+'}, 0x16, 0x1) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68401) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000580)={0x0, "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"}) socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f00000001c0)={0xa1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 149.026843][T10877] device team_slave_0 entered promiscuous mode 03:15:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x0, 0xffffffff, 0x0, 0xb3550aa4ba878254}, 0x9c) 03:15:11 executing program 1: setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) [ 149.070223][T10877] device team_slave_1 entered promiscuous mode [ 149.123261][T10877] bridge0: port 3(team0) entered blocking state [ 149.129866][T10877] bridge0: port 3(team0) entered forwarding state [ 149.186917][T10877] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 149.207996][T10877] device team0 left promiscuous mode [ 149.231453][ T56] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 149.251137][T10877] device team_slave_0 left promiscuous mode [ 149.276785][T10877] device team_slave_1 left promiscuous mode 03:15:11 executing program 4: perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xeb}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475fc22da2be3e05004fad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8", 0x89, 0x5fe}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000240)={[{@fat=@dmask={'dmask', 0x3d, 0x8}}, {@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}, {@uni_xlate='uni_xlate=1'}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, 0x0, &(0x7f0000000540)={'L+'}, 0x16, 0x1) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68401) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000580)={0x0, "5203d9d3e1c38fbb421a525543dc1733f66f7153eba7b54cbccdb3573c59d7b8085d293e3e497fef8e97c7d97c21b5d5d25459ecaa8f8d214f6cae824cb7463f06fa30f714364f01438f00641c29ada2af3c11ca36b4916713c10fcab4ae81c05b2d695724eefb189a44b941ba384f640ef1bebf990d48dfa792aca21d035dcb5fc751952c40911c71062fc354a1dbff2c52ba6feab2ab931d9adf236fc096ca6d6b93c32958672965c967c471780fc13596e651cf68e3951bb77a6621d2716844e56dc89bfba8620a84b618b8d3e066c24e88617c6eb5590fefb2426ce4de2124a0904e0f3b184e078d917fd5130c223ea8332c587f17f2607792b7d313ca8fbaf4d7cbe43a643e8d471efc4d66443bb5372cc7ac7a90b309225f1abbf7bbe3dfc8a3ef195ac807be5ee5c75d0474e477eb7902a33236ae9a141809f9aefa5a1c441fab3ecdd93ec5ea8cec97ce19a9e09c7c9ab94f4c52148cbe21c6f7d7342b72a793b32acf8881ed0fd870e156b1bfcedf5fcb62091be5797b7d051162246bd6f47c7de5de2c905618a3e23b8509a0ae07ebdf2d91f2da8135e964d75b1928f679af8d47d9c21860737babf657e3093454e674881838edcb40cb16cbdbfb205cb2cb6f76340eefc6f1eeee4e4e97cedb8abfd4385fe8b7eb14b999b13ab519250472f7abb70fcf6282f4aa581e6f4f0b0c82f1391ae1a16b1257532910e2"}) socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f00000001c0)={0xa1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 149.318119][T10877] bridge0: port 3(team0) entered disabled state [ 149.354267][T10895] loop0: detected capacity change from 270 to 0 [ 149.471378][ T56] usb 6-1: Using ep0 maxpacket: 16 [ 149.529897][T10895] usb usb7: usbfs: process 10895 (syz-executor.0) did not claim interface 3 before use [ 149.539618][T10877] team0: Cannot enslave team device to itself [ 149.550554][T10889] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 149.568600][T10889] bridge0: port 3(team0) entered blocking state 03:15:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xeb}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475fc22da2be3e05004fad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8", 0x89, 0x5fe}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000240)={[{@fat=@dmask={'dmask', 0x3d, 0x8}}, {@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}, {@uni_xlate='uni_xlate=1'}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, 0x0, &(0x7f0000000540)={'L+'}, 0x16, 0x1) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68401) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000580)={0x0, "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"}) socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f00000001c0)={0xa1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 149.596980][T10889] bridge0: port 3(team0) entered disabled state [ 149.611490][ T56] usb 6-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 149.617101][T10904] loop4: detected capacity change from 270 to 0 [ 149.681670][T10889] device team0 entered promiscuous mode [ 149.770912][T10889] device team_slave_0 entered promiscuous mode [ 149.777285][T10889] device team_slave_1 entered promiscuous mode [ 149.799532][T10889] bridge0: port 3(team0) entered blocking state [ 149.805930][T10889] bridge0: port 3(team0) entered forwarding state [ 149.844124][T10907] usb usb7: usbfs: process 10907 (syz-executor.4) did not claim interface 3 before use [ 149.901494][ T56] usb 6-1: New USB device found, idVendor=0403, idProduct=e808, bcdDevice=89.0f 03:15:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 149.946662][ T56] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 03:15:12 executing program 1: setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) [ 150.016890][T10912] loop0: detected capacity change from 270 to 0 [ 150.162914][ T56] usb 6-1: Product: syz [ 150.206588][ T56] usb 6-1: Manufacturer: syz [ 150.217902][T10915] usb usb7: usbfs: process 10915 (syz-executor.0) did not claim interface 3 before use [ 150.245961][ T56] usb 6-1: SerialNumber: syz [ 150.321529][ T56] usb 6-1: config 0 descriptor?? [ 150.419850][ T56] ftdi_sio 6-1:0.0: FTDI USB Serial Device converter detected [ 150.456052][T10922] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 03:15:12 executing program 4: perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xeb}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475fc22da2be3e05004fad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8", 0x89, 0x5fe}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000240)={[{@fat=@dmask={'dmask', 0x3d, 0x8}}, {@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}, {@uni_xlate='uni_xlate=1'}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, 0x0, &(0x7f0000000540)={'L+'}, 0x16, 0x1) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68401) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000580)={0x0, "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"}) socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f00000001c0)={0xa1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:15:12 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x10202b, 0x0) [ 150.505289][ T56] usb 6-1: Detected FT-X [ 150.506362][T10922] device team0 left promiscuous mode [ 150.565447][T10922] device team_slave_0 left promiscuous mode [ 150.601646][ T56] ftdi_sio ttyUSB0: Unable to read latency timer: -71 03:15:12 executing program 0: perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xeb}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475fc22da2be3e05004fad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8", 0x89, 0x5fe}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000240)={[{@fat=@dmask={'dmask', 0x3d, 0x8}}, {@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}, {@uni_xlate='uni_xlate=1'}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, 0x0, &(0x7f0000000540)={'L+'}, 0x16, 0x1) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68401) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000580)={0x0, "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"}) socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f00000001c0)={0xa1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 150.633569][ T56] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 150.653056][T10922] device team_slave_1 left promiscuous mode [ 150.711154][T10922] bridge0: port 3(team0) entered disabled state [ 150.721940][ T56] ftdi_sio 6-1:0.0: GPIO initialisation failed: -71 [ 150.738996][T10922] team0: Cannot enslave team device to itself [ 150.772620][T10924] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 150.800601][T10924] bridge0: port 3(team0) entered blocking state [ 150.815379][ T56] usb 6-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 150.841977][T10924] bridge0: port 3(team0) entered disabled state [ 150.870367][ T56] usb 6-1: USB disconnect, device number 2 [ 150.883315][T10924] device team0 entered promiscuous mode [ 150.911055][T10924] device team_slave_0 entered promiscuous mode [ 150.943633][T10940] loop4: detected capacity change from 270 to 0 [ 150.951916][T10932] overlayfs: filesystem on './bus' not supported as upperdir [ 150.962707][T10924] device team_slave_1 entered promiscuous mode [ 150.966708][ T56] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 150.969375][T10924] bridge0: port 3(team0) entered blocking state [ 150.984616][T10924] bridge0: port 3(team0) entered forwarding state [ 151.082714][ T56] ftdi_sio 6-1:0.0: device disconnected [ 151.195345][T10944] usb usb7: usbfs: process 10944 (syz-executor.4) did not claim interface 3 before use [ 151.328895][T10955] loop0: detected capacity change from 270 to 0 [ 151.508375][T10959] usb usb7: usbfs: process 10959 (syz-executor.0) did not claim interface 3 before use [ 151.620898][ T56] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 151.880717][ T56] usb 6-1: Using ep0 maxpacket: 16 03:15:14 executing program 5: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000440)={{0x12, 0x1, 0x0, 0xb9, 0x72, 0x70, 0x10, 0x403, 0xe808, 0x890f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x16, 0x5c, 0x89, 0x0, [], [{}]}}]}}]}}, 0x0) syz_usb_ep_write(r0, 0x0, 0x0, 0x0) 03:15:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 03:15:14 executing program 1: setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 03:15:14 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x10202b, 0x0) 03:15:14 executing program 4: perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xeb}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475fc22da2be3e05004fad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8", 0x89, 0x5fe}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000240)={[{@fat=@dmask={'dmask', 0x3d, 0x8}}, {@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}, {@uni_xlate='uni_xlate=1'}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, 0x0, &(0x7f0000000540)={'L+'}, 0x16, 0x1) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68401) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000580)={0x0, "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"}) socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f00000001c0)={0xa1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:15:14 executing program 0: mkdir(0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) clone(0x883000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 152.020873][ T56] usb 6-1: unable to read config index 0 descriptor/start: -71 [ 152.028502][ T56] usb 6-1: can't read configurations, error -71 [ 152.058410][T10971] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 152.079804][ T36] audit: type=1804 audit(1612322114.128:2): pid=10973 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir180631718/syzkaller.c6xH74/50/bus" dev="sda1" ino=14242 res=1 errno=0 [ 152.084020][T10975] loop4: detected capacity change from 270 to 0 [ 152.121544][T10971] device team0 left promiscuous mode [ 152.126865][T10971] device team_slave_0 left promiscuous mode [ 152.133071][T10971] device team_slave_1 left promiscuous mode [ 152.139251][T10971] bridge0: port 3(team0) entered disabled state [ 152.193747][T10973] ================================================================== [ 152.202230][T10973] BUG: KASAN: use-after-free in __uprobe_register+0x70f/0x850 [ 152.209725][T10973] Read of size 8 at addr ffff888030f72168 by task syz-executor.0/10973 [ 152.217971][T10973] [ 152.220300][T10973] CPU: 0 PID: 10973 Comm: syz-executor.0 Not tainted 5.11.0-rc6-next-20210202-syzkaller #0 [ 152.221326][ T36] audit: type=1804 audit(1612322114.278:3): pid=10983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir180631718/syzkaller.c6xH74/50/bus" dev="sda1" ino=14242 res=1 errno=0 [ 152.230277][T10973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.265291][T10973] Call Trace: [ 152.268565][T10973] dump_stack+0x107/0x163 [ 152.272940][T10973] ? __uprobe_register+0x70f/0x850 [ 152.278052][T10973] ? __uprobe_register+0x70f/0x850 [ 152.283169][T10973] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 152.290191][T10973] ? __uprobe_register+0x70f/0x850 [ 152.295300][T10973] ? __uprobe_register+0x70f/0x850 [ 152.300405][T10973] kasan_report.cold+0x7c/0xd8 [ 152.305165][T10973] ? __uprobe_register+0x70f/0x850 [ 152.310304][T10973] __uprobe_register+0x70f/0x850 [ 152.315259][T10973] probe_event_enable+0x357/0xa00 [ 152.320281][T10973] ? probes_write+0x40/0x40 [ 152.324786][T10973] trace_uprobe_register+0x443/0x880 [ 152.330066][T10973] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 152.335794][T10973] ? _find_next_bit.constprop.0+0x1a0/0x200 [ 152.341705][T10973] perf_trace_event_init+0x549/0xa20 [ 152.347125][T10973] perf_uprobe_init+0x16f/0x210 [ 152.351972][T10973] perf_uprobe_event_init+0xff/0x1c0 [ 152.357253][T10973] perf_try_init_event+0x12a/0x560 [ 152.362369][T10973] ? perf_event_alloc.part.0+0xe8c/0x3960 [ 152.368084][T10973] perf_event_alloc.part.0+0xe3b/0x3960 [ 152.373628][T10973] ? lock_downgrade+0x6d0/0x6d0 [ 152.378486][T10973] __do_sys_perf_event_open+0x647/0x2e60 [ 152.384122][T10973] ? build_open_flags+0x6f0/0x6f0 [ 152.389143][T10973] ? perf_event_set_output+0x4c0/0x4c0 [ 152.394613][T10973] ? syscall_enter_from_user_mode+0x1d/0x50 [ 152.400523][T10973] do_syscall_64+0x2d/0x70 [ 152.404958][T10973] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 152.410855][T10973] RIP: 0033:0x465b09 [ 152.414769][T10973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 152.434369][T10973] RSP: 002b:00007fde56348188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 152.442791][T10973] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 [ 152.450756][T10973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 152.458820][T10973] RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 [ 152.466791][T10973] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000056bf60 [ 152.474749][T10973] R13: 00007ffdfcd7cf2f R14: 00007fde56348300 R15: 0000000000022000 [ 152.482725][T10973] [ 152.485036][T10973] Allocated by task 10980: [ 152.489433][T10973] kasan_save_stack+0x1b/0x40 [ 152.494103][T10973] __kasan_kmalloc+0x99/0xc0 [ 152.498681][T10973] __uprobe_register+0x19c/0x850 [ 152.503700][T10973] probe_event_enable+0x357/0xa00 [ 152.508716][T10973] trace_uprobe_register+0x443/0x880 [ 152.513994][T10973] perf_trace_event_init+0x549/0xa20 [ 152.519281][T10973] perf_uprobe_init+0x16f/0x210 [ 152.524130][T10973] perf_uprobe_event_init+0xff/0x1c0 [ 152.529403][T10973] perf_try_init_event+0x12a/0x560 [ 152.534502][T10973] perf_event_alloc.part.0+0xe3b/0x3960 [ 152.540051][T10973] __do_sys_perf_event_open+0x647/0x2e60 [ 152.545672][T10973] do_syscall_64+0x2d/0x70 [ 152.550083][T10973] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 152.555971][T10973] [ 152.558301][T10973] Freed by task 10980: [ 152.562350][T10973] kasan_save_stack+0x1b/0x40 [ 152.567017][T10973] kasan_set_track+0x1c/0x30 [ 152.571593][T10973] kasan_set_free_info+0x20/0x30 [ 152.576521][T10973] __kasan_slab_free+0xf5/0x130 [ 152.581372][T10973] slab_free_freelist_hook+0x82/0x1d0 [ 152.586737][T10973] kfree+0xe5/0x7b0 [ 152.590539][T10973] put_uprobe+0x13b/0x190 [ 152.594862][T10973] uprobe_apply+0xfc/0x130 [ 152.599271][T10973] trace_uprobe_register+0x5c9/0x880 [ 152.604549][T10973] perf_trace_event_init+0x17a/0xa20 [ 152.609824][T10973] perf_uprobe_init+0x16f/0x210 [ 152.614663][T10973] perf_uprobe_event_init+0xff/0x1c0 [ 152.619936][T10973] perf_try_init_event+0x12a/0x560 [ 152.625038][T10973] perf_event_alloc.part.0+0xe3b/0x3960 [ 152.630573][T10973] __do_sys_perf_event_open+0x647/0x2e60 [ 152.636198][T10973] do_syscall_64+0x2d/0x70 [ 152.640608][T10973] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 152.646506][T10973] [ 152.648814][T10973] The buggy address belongs to the object at ffff888030f72000 [ 152.648814][T10973] which belongs to the cache kmalloc-512 of size 512 [ 152.662851][T10973] The buggy address is located 360 bytes inside of [ 152.662851][T10973] 512-byte region [ffff888030f72000, ffff888030f72200) [ 152.676381][T10973] The buggy address belongs to the page: [ 152.681993][T10973] page:00000000c5bf829a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x30f72 [ 152.692134][T10973] head:00000000c5bf829a order:1 compound_mapcount:0 [ 152.698717][T10973] flags: 0xfff00000010200(slab|head) [ 152.703999][T10973] raw: 00fff00000010200 ffffea0000944d80 0000000500000005 ffff888010841c80 [ 152.712572][T10973] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 152.722176][T10973] page dumped because: kasan: bad access detected [ 152.728567][T10973] [ 152.730875][T10973] Memory state around the buggy address: [ 152.736487][T10973] ffff888030f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 152.744553][T10973] ffff888030f72080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 152.752601][T10973] >ffff888030f72100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 152.760643][T10973] ^ [ 152.768080][T10973] ffff888030f72180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 152.776127][T10973] ffff888030f72200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 152.784171][T10973] ================================================================== [ 152.792316][T10973] Disabling lock debugging due to kernel taint [ 152.800576][T10973] Kernel panic - not syncing: panic_on_warn set ... [ 152.807174][T10973] CPU: 0 PID: 10973 Comm: syz-executor.0 Tainted: G B 5.11.0-rc6-next-20210202-syzkaller #0 [ 152.818549][T10973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.828609][T10973] Call Trace: [ 152.831891][T10973] dump_stack+0x107/0x163 [ 152.836234][T10973] ? __uprobe_register+0x670/0x850 [ 152.841360][T10973] panic+0x306/0x73d [ 152.845275][T10973] ? __warn_printk+0xf3/0xf3 [ 152.849888][T10973] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 152.856065][T10973] ? trace_hardirqs_on+0x38/0x1c0 [ 152.861106][T10973] ? trace_hardirqs_on+0x51/0x1c0 [ 152.866145][T10973] ? __uprobe_register+0x70f/0x850 [ 152.871271][T10973] ? __uprobe_register+0x70f/0x850 [ 152.876399][T10973] end_report.cold+0x5a/0x5a [ 152.880999][T10973] kasan_report.cold+0x6a/0xd8 [ 152.885777][T10973] ? __uprobe_register+0x70f/0x850 [ 152.890903][T10973] __uprobe_register+0x70f/0x850 [ 152.895839][T10973] probe_event_enable+0x357/0xa00 [ 152.900856][T10973] ? probes_write+0x40/0x40 [ 152.905367][T10973] trace_uprobe_register+0x443/0x880 [ 152.910660][T10973] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 152.916371][T10973] ? _find_next_bit.constprop.0+0x1a0/0x200 [ 152.922256][T10973] perf_trace_event_init+0x549/0xa20 [ 152.927534][T10973] perf_uprobe_init+0x16f/0x210 [ 152.932371][T10973] perf_uprobe_event_init+0xff/0x1c0 [ 152.937641][T10973] perf_try_init_event+0x12a/0x560 [ 152.942736][T10973] ? perf_event_alloc.part.0+0xe8c/0x3960 [ 152.948441][T10973] perf_event_alloc.part.0+0xe3b/0x3960 [ 152.953977][T10973] ? lock_downgrade+0x6d0/0x6d0 [ 152.958825][T10973] __do_sys_perf_event_open+0x647/0x2e60 [ 152.964449][T10973] ? build_open_flags+0x6f0/0x6f0 [ 152.969465][T10973] ? perf_event_set_output+0x4c0/0x4c0 [ 152.974919][T10973] ? syscall_enter_from_user_mode+0x1d/0x50 [ 152.980803][T10973] do_syscall_64+0x2d/0x70 [ 152.985209][T10973] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 152.991090][T10973] RIP: 0033:0x465b09 [ 152.994971][T10973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.014574][T10973] RSP: 002b:00007fde56348188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 153.022973][T10973] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 [ 153.030938][T10973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 153.038909][T10973] RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 [ 153.046873][T10973] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000056bf60 [ 153.054828][T10973] R13: 00007ffdfcd7cf2f R14: 00007fde56348300 R15: 0000000000022000 [ 153.063557][T10973] Kernel Offset: disabled [ 153.067872][T10973] Rebooting in 86400 seconds..