[ OK ] Started Getty on tty1. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.254' (ECDSA) to the list of known hosts. 2020/10/16 04:16:28 fuzzer started 2020/10/16 04:16:28 dialing manager at 10.128.0.105:40317 2020/10/16 04:16:29 syscalls: 3308 2020/10/16 04:16:29 code coverage: enabled 2020/10/16 04:16:29 comparison tracing: enabled 2020/10/16 04:16:29 extra coverage: extra coverage is not supported by the kernel 2020/10/16 04:16:29 setuid sandbox: enabled 2020/10/16 04:16:29 namespace sandbox: enabled 2020/10/16 04:16:29 Android sandbox: enabled 2020/10/16 04:16:29 fault injection: enabled 2020/10/16 04:16:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/16 04:16:29 net packet injection: enabled 2020/10/16 04:16:29 net device setup: enabled 2020/10/16 04:16:29 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/16 04:16:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/16 04:16:29 USB emulation: /dev/raw-gadget does not exist 2020/10/16 04:16:29 hci packet injection: enabled 2020/10/16 04:16:29 wifi device emulation: enabled 04:18:29 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x20000181}], 0x1) syzkaller login: [ 162.151553] audit: type=1400 audit(1602821909.950:8): avc: denied { execmem } for pid=6513 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 04:18:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@sack_perm={0x4, 0x2}]}}}}}}}}, 0x0) 04:18:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 04:18:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000380)=[@in6={0xa, 0x4e20, 0x0, @local, 0x2}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x326}, 0x9c) 04:18:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 04:18:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1, 0x0, 0x2, 0x1}}, 0x20) [ 163.402155] IPVS: ftp: loaded support on port[0] = 21 [ 163.485513] IPVS: ftp: loaded support on port[0] = 21 [ 163.637325] chnl_net:caif_netlink_parms(): no params data found [ 163.793268] IPVS: ftp: loaded support on port[0] = 21 [ 163.801062] chnl_net:caif_netlink_parms(): no params data found [ 163.918438] IPVS: ftp: loaded support on port[0] = 21 [ 164.058453] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.062330] IPVS: ftp: loaded support on port[0] = 21 [ 164.064854] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.113732] device bridge_slave_0 entered promiscuous mode [ 164.211999] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.218447] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.225441] device bridge_slave_1 entered promiscuous mode [ 164.250191] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 164.270731] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.277113] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.285437] device bridge_slave_0 entered promiscuous mode [ 164.297320] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.316198] chnl_net:caif_netlink_parms(): no params data found [ 164.331487] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.333067] IPVS: ftp: loaded support on port[0] = 21 [ 164.338141] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.352353] device bridge_slave_1 entered promiscuous mode [ 164.419944] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 164.429868] team0: Port device team_slave_0 added [ 164.451986] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 164.464275] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.484644] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 164.492528] team0: Port device team_slave_1 added [ 164.541192] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 164.549568] team0: Port device team_slave_0 added [ 164.560965] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 164.567196] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.592862] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.613422] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 164.621573] team0: Port device team_slave_1 added [ 164.631437] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 164.641198] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.667482] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.681837] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 164.692398] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 164.761706] device hsr_slave_0 entered promiscuous mode [ 164.768433] device hsr_slave_1 entered promiscuous mode [ 164.813305] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 164.821013] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 164.837964] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 164.844256] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.870361] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.885210] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 164.892357] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.917617] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.932527] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 164.954595] chnl_net:caif_netlink_parms(): no params data found [ 164.964284] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 164.990048] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.996456] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.006258] device bridge_slave_0 entered promiscuous mode [ 165.017041] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.024592] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.032815] device bridge_slave_1 entered promiscuous mode [ 165.073821] device hsr_slave_0 entered promiscuous mode [ 165.080469] device hsr_slave_1 entered promiscuous mode [ 165.129089] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 165.143122] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.158573] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.213519] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 165.332884] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 165.343138] team0: Port device team_slave_0 added [ 165.349475] chnl_net:caif_netlink_parms(): no params data found [ 165.373063] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 165.382616] team0: Port device team_slave_1 added [ 165.401139] chnl_net:caif_netlink_parms(): no params data found [ 165.418352] Bluetooth: hci0: command 0x0409 tx timeout [ 165.446970] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.453858] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.480348] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.497852] Bluetooth: hci1: command 0x0409 tx timeout [ 165.546492] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.553003] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.579679] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.596795] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 165.608418] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.614795] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.623751] device bridge_slave_0 entered promiscuous mode [ 165.633630] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.641142] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.649958] device bridge_slave_1 entered promiscuous mode [ 165.670691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 165.737728] Bluetooth: hci2: command 0x0409 tx timeout [ 165.745843] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.777152] device hsr_slave_0 entered promiscuous mode [ 165.783403] device hsr_slave_1 entered promiscuous mode [ 165.792513] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.834657] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 165.854307] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 165.861666] team0: Port device team_slave_0 added [ 165.866803] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.876961] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.884884] device bridge_slave_0 entered promiscuous mode [ 165.893571] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.900177] Bluetooth: hci3: command 0x0409 tx timeout [ 165.905591] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.913668] device bridge_slave_1 entered promiscuous mode [ 165.920399] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 165.943240] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 165.950328] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 165.958167] team0: Port device team_slave_1 added [ 165.964710] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 165.981842] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 166.026822] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 166.033272] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.060781] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 166.068346] Bluetooth: hci4: command 0x0409 tx timeout [ 166.077556] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 166.102978] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.111411] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.138292] Bluetooth: hci5: command 0x0409 tx timeout [ 166.142580] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.156236] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 166.173784] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 166.181779] team0: Port device team_slave_0 added [ 166.186928] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.195008] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.202689] device bridge_slave_0 entered promiscuous mode [ 166.210388] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 166.226114] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 166.234951] team0: Port device team_slave_1 added [ 166.253121] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.260164] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.269992] device bridge_slave_1 entered promiscuous mode [ 166.301843] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 166.308241] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.333946] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 166.376817] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.383806] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.409788] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.424543] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 166.453854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 166.470508] device hsr_slave_0 entered promiscuous mode [ 166.477653] device hsr_slave_1 entered promiscuous mode [ 166.483614] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 166.517905] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 166.531548] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 166.565408] device hsr_slave_0 entered promiscuous mode [ 166.572286] device hsr_slave_1 entered promiscuous mode [ 166.582229] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 166.599166] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 166.607208] team0: Port device team_slave_0 added [ 166.614181] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 166.636674] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 166.649547] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 166.661493] team0: Port device team_slave_1 added [ 166.693696] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.720851] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 166.764354] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 166.771263] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.796753] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 166.818611] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 166.825732] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.832133] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.858113] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.875830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.892586] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 166.902172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 166.910910] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 166.921577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.930709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.962362] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 166.969510] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.990452] device hsr_slave_0 entered promiscuous mode [ 166.996212] device hsr_slave_1 entered promiscuous mode [ 167.015274] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 167.026929] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 167.068441] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 167.076700] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 167.100288] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 167.115373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.123833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.133368] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.140233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.147375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.155806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.163148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.184234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 167.194739] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 167.202774] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.234187] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.240898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.254048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.262028] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.268455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.279219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 167.293925] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 167.315518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.327667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.335458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.344094] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.350512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.361165] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 167.380522] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 167.389615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.396749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.408655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 167.420364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 167.451018] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 167.461339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.469355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.477031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.485969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.494098] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.500522] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.507361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.507593] Bluetooth: hci0: command 0x041b tx timeout [ 167.514565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.536678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 167.548306] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 167.556736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 167.568995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 167.578481] Bluetooth: hci1: command 0x041b tx timeout [ 167.580489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.591970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.600185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.608426] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.616042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.624031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.635067] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 167.646986] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 167.654276] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.664823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 167.688962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.700340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 167.711215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 167.731563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.742127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.750268] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.756613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.763816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.771705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.781407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.791275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 167.803253] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 167.814025] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 167.822943] Bluetooth: hci2: command 0x041b tx timeout [ 167.825107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.845148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.853646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.861701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.870443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.878636] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.884988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.895227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 167.907014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 167.924819] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.932587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.941604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.949898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.960819] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 167.975987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 167.984573] Bluetooth: hci3: command 0x041b tx timeout [ 167.991425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.000706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.009161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.021200] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 168.034658] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.046518] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 168.053426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.068194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.076051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.099729] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 168.110479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 168.126901] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 168.137952] Bluetooth: hci4: command 0x041b tx timeout [ 168.147174] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 168.156419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.166001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.174074] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 168.181050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 168.188960] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 168.200018] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 168.219940] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 168.227774] Bluetooth: hci5: command 0x041b tx timeout [ 168.239929] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.246032] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.254467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 168.261687] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 168.268705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.276536] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.288370] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.307268] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.316409] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 168.336927] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 168.344438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.352675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.361562] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 168.379549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.390507] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 168.406382] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 168.418297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.425459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.436882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.445195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.456122] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 168.463737] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.475053] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 168.492204] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 168.500427] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 168.509858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.523209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.533726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 168.545915] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 168.552850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.562579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.571274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.579520] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.585890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.595855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 168.610682] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 168.625406] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 168.640286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.653107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.661472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.670103] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.676445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.683496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.691720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.701395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.708634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.722467] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 168.732423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 168.743179] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 168.754750] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.770008] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 168.783875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.792690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 168.803780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 168.821552] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 168.836972] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.849595] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 168.857022] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 168.865956] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 168.875468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.887853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 168.904015] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.916522] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 168.924714] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 168.933549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.942246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.950173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.958926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.966529] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.972947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.980382] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.987607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.002161] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 169.016630] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 169.027180] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 169.037384] device veth0_vlan entered promiscuous mode [ 169.045231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.053980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.062513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 169.070779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.081788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 169.091988] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 169.101677] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 169.112059] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 169.138607] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 169.145702] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 169.159245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 169.167183] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.176938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.193397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.201623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.209594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 169.217688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 169.225445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.232901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.240421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.248346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.255911] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.262317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.283142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 169.293706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 169.312888] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 169.320243] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.326469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.335939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.343877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.354015] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 169.361487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.371215] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 169.380986] device veth0_vlan entered promiscuous mode [ 169.396688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 169.405152] device veth1_vlan entered promiscuous mode [ 169.411809] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 169.420307] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 169.429418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 169.436951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.445177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.453151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.460944] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.467309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.475234] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.482440] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.492832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.501529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 169.514638] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 169.522334] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 169.532134] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 169.543097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 169.554511] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 169.564030] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 169.572292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.581313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.590538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.599001] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.605347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.613227] Bluetooth: hci0: command 0x040f tx timeout [ 169.622528] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 169.633858] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 169.646697] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 169.654133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.662632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.668151] Bluetooth: hci1: command 0x040f tx timeout [ 169.671123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.683875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 169.691730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.700731] device veth1_vlan entered promiscuous mode [ 169.708083] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 169.720708] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 169.729828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 169.739513] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 169.746943] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.754709] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.761997] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.769275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.777089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.785553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.800835] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 169.808782] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 169.816625] device veth0_vlan entered promiscuous mode [ 169.841017] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 169.849445] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 169.864214] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 169.872899] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 169.883618] device veth0_macvtap entered promiscuous mode [ 169.890579] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 169.897678] Bluetooth: hci2: command 0x040f tx timeout [ 169.903116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 169.911528] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 169.920705] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 169.928056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 169.934746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.943045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.952483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.960520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.968571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.976164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.984510] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.991940] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 170.005018] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 170.016600] device veth1_macvtap entered promiscuous mode [ 170.029802] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.036892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.045606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.060761] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 170.067793] Bluetooth: hci3: command 0x040f tx timeout [ 170.075439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.083249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.092984] device veth1_vlan entered promiscuous mode [ 170.114608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 170.123328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 170.134733] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.151995] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 170.163005] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 170.172881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.182937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.191341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.199789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.211078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 170.226234] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 170.227867] Bluetooth: hci4: command 0x040f tx timeout [ 170.237304] device veth0_macvtap entered promiscuous mode [ 170.245455] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 170.255426] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 170.263533] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 170.272293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.280762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.295552] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 170.305397] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 170.311987] Bluetooth: hci5: command 0x040f tx timeout [ 170.318053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.331535] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 170.340093] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.352288] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 170.365419] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 170.374297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.383899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.392456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.400830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.412574] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 170.420384] device veth1_macvtap entered promiscuous mode [ 170.426883] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 170.437181] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 170.445139] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.458759] device veth0_macvtap entered promiscuous mode [ 170.465009] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 170.477826] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 170.484077] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.491999] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 170.500522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.508819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.516613] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.524894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.533029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.540621] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.558686] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 170.571416] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 170.581024] device veth1_macvtap entered promiscuous mode [ 170.590258] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 170.604497] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 170.616452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 170.679302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 170.686528] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.703431] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.715344] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 170.723137] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.730877] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 170.745821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.758016] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.765365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.774068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.783026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.792357] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.801488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.812741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.823543] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 170.831280] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.844369] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 170.852343] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 170.860095] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 170.869869] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.878120] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.888324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.897693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.908446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.918740] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 170.925708] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.933817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.943260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.951345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.959459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.981647] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 171.004060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.015422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.025843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.035982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.046658] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 171.054638] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 171.063205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.071243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.079537] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.089892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 171.098667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.106196] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.119197] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 171.133194] device veth0_vlan entered promiscuous mode [ 171.145404] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 171.172459] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 171.191027] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 171.200945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.218181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.230296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.244503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.309577] device veth1_vlan entered promiscuous mode [ 171.377370] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 171.394417] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 171.402237] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 171.420485] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 171.428601] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 171.435349] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 171.449413] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 171.465718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.474472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.492800] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 171.511487] device veth0_vlan entered promiscuous mode [ 171.519663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.526869] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.535865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.543735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.552298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.559819] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.569366] device veth0_vlan entered promiscuous mode [ 171.587924] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 171.615734] device veth1_vlan entered promiscuous mode [ 171.622789] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 171.636809] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 171.653188] device veth0_macvtap entered promiscuous mode [ 171.659445] Bluetooth: hci0: command 0x0419 tx timeout [ 171.674729] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 171.689525] device veth1_vlan entered promiscuous mode [ 171.696822] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 171.705138] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 171.713142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 171.721307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.729335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.739495] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 171.747794] Bluetooth: hci1: command 0x0419 tx timeout [ 171.759381] device veth1_macvtap entered promiscuous mode [ 171.765850] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 171.782205] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 171.799673] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 171.849208] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 171.859279] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 171.890912] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 171.916031] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 171.936057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 171.953616] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 171.965497] device veth0_macvtap entered promiscuous mode [ 171.972802] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 171.981680] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 171.992328] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 172.000654] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.008310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.017055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.025310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.033536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.046082] device veth0_macvtap entered promiscuous mode [ 172.052440] Bluetooth: hci2: command 0x0419 tx timeout [ 172.061465] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 172.074616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.085355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.095183] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.105301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.115197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.125484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.135697] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 172.143693] Bluetooth: hci3: command 0x0419 tx timeout [ 172.149730] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.158399] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 172.167181] device veth1_macvtap entered promiscuous mode [ 172.178322] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 172.184726] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 172.199236] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 172.207124] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.214982] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.224022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.235653] device veth1_macvtap entered promiscuous mode [ 172.260266] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 172.281121] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 172.289345] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 172.296877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.308280] Bluetooth: hci4: command 0x0419 tx timeout [ 172.314740] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.318987] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 172.324017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.340588] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.349825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.359624] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.370660] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 172.378568] Bluetooth: hci5: command 0x0419 tx timeout [ 172.380118] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.393523] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 172.407040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 172.415322] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 172.422371] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 172.429190] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 172.442517] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.451496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.462201] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 172.482554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 172.539558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.560090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.571165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.581905] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.592059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.601956] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.611496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.622246] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.632686] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 172.640480] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.648412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.659678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.669529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.679914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.689567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.700678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.710654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.721128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.731107] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.741314] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.751867] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 172.759367] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.788832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.805439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.819039] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.827340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.837973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.848479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.859279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.869184] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.878423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.888390] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.897591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.907328] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.918561] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 172.925913] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.941068] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 172.954104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.970870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.980955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.992111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.001579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.013527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.023629] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.033527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.043325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.053172] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.063586] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 173.070729] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 173.077406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.090568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.099831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.109586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.125944] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 173.133776] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 173.147721] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 173.154869] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 173.169892] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 173.183994] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 173.196562] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 173.204916] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 173.243926] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 173.255058] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 173.269431] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 173.276585] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 173.314371] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 173.328675] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 173.379305] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 04:18:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000019c0)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) 04:18:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000140)=0x80000000, 0x4) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "ab3fdd", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 173.495312] syz-executor.1 (7922) used greatest stack depth: 23000 bytes left [ 173.583561] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 173.615835] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:18:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8000}, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x4) sendto$inet(r1, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x33) [ 173.637089] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 173.647929] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 173.663179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)={0x34, 0x20, 0x1, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="880200090010"]}, @nested={0x18, 0xd, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast2}]}]}, 0x34}], 0x1}, 0x0) [ 173.690612] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:18:41 executing program 2: sendmsg$rds(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1}, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) [ 173.751450] IPv4: Oversized IP packet from 127.0.0.1 [ 173.757207] IPv4: Oversized IP packet from 127.0.0.1 [ 173.776804] IPv4: Oversized IP packet from 127.0.0.1 [ 173.782646] IPv4: Oversized IP packet from 127.0.0.1 [ 173.794249] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 04:18:41 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x235) 04:18:41 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000003480)={0x0, 0x13}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000004500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0x0, r2, {0x7}}, 0x18) read$FUSE(r1, &(0x7f0000000340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, r3}, 0x20) 04:18:41 executing program 2: mmap(&(0x7f0000600000/0x3000)=nil, 0x3000, 0x0, 0x400000000005e831, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) [ 173.932588] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 173.982083] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz›] on sz1è( [ 173.995459] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 174.008415] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 174.045373] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 174.064182] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz›] on sz1è( [ 174.088100] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 174.113000] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready 04:18:41 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x1e, 0x0, 0x0, 0x0}, 0x20) [ 174.194313] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 174.224547] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 174.240248] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 174.253917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 174.264173] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 174.302445] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 174.342948] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 174.411587] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 174.434249] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 174.447600] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 174.455841] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 174.477624] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 174.507328] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 174.511312] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 174.523831] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 174.530219] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 174.549426] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 174.550180] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 174.584786] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 04:18:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e000a0204fcff", 0x58}], 0x1) 04:18:42 executing program 4: setgroups(0xfffffffffffffcaf, 0x0) 04:18:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r1 = memfd_create(&(0x7f0000000240)='sysr\x01\xdf;HX%\x8f\xdd\xff\xff\xffam\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8f{\x85\x19\xe4\xf6n{B\x88\xd6\xacQ\xa9\a\xc9J\x1b\xefT\x9b\xd3\x8e\xe6YX\xb7<@\xdd\xab\x8c\xe5\x82o\xd1lyk\x11\x11\xa4\xff\x92\x04\x15R!\xa0\x17g\xb1\x91\xb6/\x8a\xb18\xa0\xbe\'\xa8$\x03\x9d\x93\xf9\x1a\\\xe2\xa1,\xbe\x01\x8a\xfe4\xa7\xc8\x9eP\xc2\x01\x10\"\x00\x00\xc8\xc7\xden\xab\xdb*\xa6(^\t\xd5\xf0\xfe\xc2l\xb1\x8c\xa6\xccu\x18\xd3SW\xa2]y!\xd7\xcb\xdd\x14:E\x7f', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000004, 0x4000051, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="dc7afea0818495973075945f3eee366edcf10978696c0d06770926029b0bc775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93fc6bccc58a459830a1e94788cdaef5ddecbc6e40e06d94342c64dd8165ebea25878b8a8da2560890b8f323579e28943ebc6c05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc73180e3c56001709c67e7c80fcf3b82e1dfa749728c713898db5da6d6bb7bd6f824613051b013d3707a8ea9a0d0933014c4b1da892ba9f61091b240d8a737d121842da09ed8b2ee6da702ffb0a739eb81f18aa4428f160d32c474582611bde299dfcd0e376c41d798f1858c2917630101445645ce"], 0x100) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 04:18:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x37}) 04:18:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x32c, 0xffffffff, 0x1c8, 0x1c8, 0x0, 0xffffffff, 0xffffffff, 0x358, 0x358, 0x358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xb8, 0xf8, 0x0, {}, [@common=@ttl={{0x24, 'ttl\x00'}}, @common=@ttl={{0x24, 'ttl\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x22, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 'lo\x00', 'wlan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x388) 04:18:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x3}, 0x20) 04:18:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x6c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_DPORT={0x6}]}, 0x6c}}, 0x0) 04:18:42 executing program 2: r0 = eventfd(0x0) mmap(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x0, 0x400a093, r0, 0x0) 04:18:42 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000003400)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009", 0x15, 0x400}, {0x0, 0x0, 0xc82}], 0x0, &(0x7f00000000c0)) 04:18:42 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x9}}}]}, 0x78}}, 0x0) 04:18:42 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xffffffffffffff3e, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 04:18:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x20000021, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 04:18:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) 04:18:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000080)='wg0\x00', 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='nv\x00', 0x3) connect$inet(r0, &(0x7f0000000c40)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) 04:18:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) unshare(0x2040400) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x3b904e855ebd73d, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 175.033289] F2FS-fs (loop0): Invalid segment count (0) [ 175.046488] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 175.056598] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 04:18:42 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6000, 0x1) creat(&(0x7f0000000300)='./file0\x00', 0x0) 04:18:42 executing program 4: unshare(0x400) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) 04:18:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006580)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x5, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0xb154d8cf1b508ef]}}, &(0x7f0000006480)=""/213, 0x37, 0xd5, 0x1}, 0x20) [ 175.094107] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 175.104338] F2FS-fs (loop0): Unable to read 2th superblock 04:18:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r4 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4cc834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfffffffffffffdbe, 0x44070, 0x0, 0x657) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) [ 175.147163] F2FS-fs (loop0): Invalid segment count (0) 04:18:43 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r1, 0x201c, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffd25}]) [ 175.171835] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 175.205519] F2FS-fs (loop0): Unable to read 2th superblock [ 175.294231] F2FS-fs (loop0): Invalid segment count (0) [ 175.308850] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 175.327478] hrtimer: interrupt took 48398 ns [ 175.336594] F2FS-fs (loop0): Unable to read 2th superblock [ 175.362957] F2FS-fs (loop0): Invalid segment count (0) 04:18:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x6, 0xb9, &(0x7f0000000080)=""/185, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:18:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000006c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000780)={0x2c, r1, 0x1, 0x0, 0x0, {0x15}, [@ETHTOOL_A_EEE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}]}]}, 0x2c}}, 0x0) 04:18:43 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc", 0x40}, {&(0x7f00000011c0), 0x24}], 0x2, 0x0, 0x0, 0xffffffe0}}], 0x400002c, 0x4000000) shutdown(r0, 0x1) 04:18:43 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f00000000c0)=0x8) 04:18:43 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_RMFB(r0, 0xc00464af, &(0x7f0000000040)) 04:18:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0x105) 04:18:43 executing program 5: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x68, r0, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}}, 0x68}}, 0x0) 04:18:43 executing program 3: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2710, &(0x7f0000019580)=""/102393, &(0x7f0000000000)=0x18ff9) [ 175.710175] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.1'. 04:18:43 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.cpus\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000003c0)='7', 0x1}], 0x1) 04:18:43 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(r0, 0x0, 0x0, 0x40000040, 0x0, 0x0) [ 176.000904] new mount options do not match the existing superblock, will be ignored [ 176.030978] new mount options do not match the existing superblock, will be ignored 04:18:43 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/4082, 0xff2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x0, 0x0) 04:18:43 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x40000000000004, 0x2) ioctl$VIDIOC_S_CROP(r0, 0xc0d05640, &(0x7f0000000100)={0x2}) 04:18:43 executing program 3: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000080)="020000ee0600000008f9bcccad81bd9242a12ec8116d2a23e6347e776b0c106bac", 0x21, 0x200}], 0x0, &(0x7f0000010300)) 04:18:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x78, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x48, 0x2, {{}, [@TCA_NETEM_SLOT={0x2c, 0xc, {0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffb}}]}}}]}, 0x78}}, 0x0) 04:18:43 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4003, &(0x7f0000000000)=0x9, 0x7, 0x0) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4003, &(0x7f0000000040)=0x7fffffff, 0x7, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 04:18:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 04:18:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='devices.list\x00', 0x275a, 0x0) pwritev2(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="dd", 0x1}], 0x1, 0x0, 0x0, 0x18) 04:18:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x19, 0x0, 0x0) [ 176.194013] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 176.227954] BFS-fs: bfs_fill_super(): Last block not available: 63 [ 176.231105] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 04:18:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x64}, {0x6, 0x0, 0x0, 0x7ffc0000}]}) 04:18:44 executing program 1: unshare(0x20000400) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) preadv(r0, 0x0, 0x10, 0x0, 0x0) 04:18:44 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)={0x10, r0, 0x401, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_CSA_C_OFFSETS_TX={0x8, 0xcd, [0x0, 0x0]}]}, 0x1c}}, 0x0) [ 176.300736] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 176.328245] BFS-fs: bfs_fill_super(): Last block not available: 63 04:18:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newtaction={0x6c, 0x30, 0x1, 0x0, 0x0, {}, [{0x58, 0x1, [@m_mpls={0x54, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_MPLS_PROTO={0x6, 0x4, 0xfbfb}, @TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x6c}}, 0x0) 04:18:44 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x1f, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) 04:18:44 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x53) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000200000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff2}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x338a}}, @TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{}, '^'}}]}]}]}}]}, 0x54}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 176.463641] audit: type=1326 audit(1602821924.260:9): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8223 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x7ffc0000 [ 176.501911] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 04:18:44 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x82, 0x0) write$rfkill(r0, 0x0, 0x0) 04:18:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a80)=ANY=[@ANYBLOB="5001000010000307ebfff40606c6000040041200", @ANYRES32=0x0, @ANYBLOB="00fffbffff00000008000a000d000000250012000800010076657468"], 0x200}}, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000040)) r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6815, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492a3e, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)={0x20, 0x6a, 0x11, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x6, 0x7, 0x0, 0x0, @binary="8464"}]}, 0x20}], 0x1}, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x35) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0185648, &(0x7f0000000300)={0x9b0000, 0x4000ffff, 0x1, r0, 0x0, &(0x7f0000000280)={0x9b0906, 0x0, [], @value=0x10000}}) 04:18:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={r2}, 0x8) 04:18:44 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x5c, 0x13, 0x63b, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x10, 0x1, "08f8770468efd30c876ad0b1"}]}, 0x5c}}, 0x0) 04:18:44 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setreuid(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x40) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x2001040, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "1a5bbf0e8e52e4b25ef4486ab600005a"}, 0x15, 0x0) mount(0x0, &(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f000000c000)='ramfs\x00', 0x39, 0x0) [ 176.613590] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 176.623346] audit: type=1326 audit(1602821924.260:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8223 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45de59 code=0x7ffc0000 04:18:44 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f", 0x7) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 176.671115] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.5'. [ 176.700673] audit: type=1326 audit(1602821924.260:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8223 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45de59 code=0x7ffc0000 [ 176.732088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=106 sclass=netlink_route_socket pid=8263 comm=syz-executor.5 04:18:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x9) socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x400000010, 0x0, 0xffffffff, 0x400}, 0xc) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) 04:18:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x6000, &(0x7f0000000140)=ANY=[]) [ 176.765608] audit: type=1326 audit(1602821924.290:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8223 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x7ffc0000 [ 176.788595] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 176.895796] bridge0: port 3(veth3) entered blocking state [ 176.915201] bridge0: port 3(veth3) entered disabled state [ 176.935362] device veth3 entered promiscuous mode 04:18:44 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setreuid(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x40) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x2001040, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "1a5bbf0e8e52e4b25ef4486ab600005a"}, 0x15, 0x0) mount(0x0, &(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f000000c000)='ramfs\x00', 0x39, 0x0) [ 176.941817] audit: type=1326 audit(1602821924.290:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8223 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=317 compat=0 ip=0x45de59 code=0x7ffc0000 [ 176.985164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=106 sclass=netlink_route_socket pid=8263 comm=syz-executor.5 [ 177.009938] syz-executor.5 (8256) used greatest stack depth: 22480 bytes left [ 177.021355] audit: type=1326 audit(1602821924.290:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8223 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x7ffc0000 04:18:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x32, 0xffffff03, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 177.046089] audit: type=1326 audit(1602821924.290:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8223 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45de59 code=0x7ffc0000 [ 177.119193] audit: type=1326 audit(1602821924.290:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8223 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45de59 code=0x7ffc0000 04:18:45 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$hwrng(0xffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) write(r3, &(0x7f0000000100)="e5e0680cb6ea5e20edeec5bb091e3bfc7878f5535f581a299e5191c65e45e0546125a418aa0185ef38208a67093c0c2e7c2596cdcd349d35d59f5acbad95da051b301a4447f40b457159ad451ea6f71fa1c544828ace32ea50bd2d8cba30d8d31b175324b5792a55cf347daa67b4258bf710f0f8ebde5895d27dd7e884c2432988fdbb546edce18ecde6535aa212f4ad", 0x90) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f00000000c0)={0xf9, 0xc, 0x0, 0x1000, "4c870ce0eaf16d47aa3b0f135cb1baf433c919c66f5f9d1db15d43eeb318c3e2"}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) syz_mount_image$ocfs2(&(0x7f00000001c0)='ocfs2\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x8, &(0x7f0000000840)=[{&(0x7f00000002c0)="3a5eb231998788af6e3b0a8d7ada", 0xe, 0x9c0d}, {&(0x7f00000003c0)="6694994754ed813be22ba83f92d5445d246280d6617e1650f3ebc452f0e4fa023add5421562fade58ed9198a8129ea8a744066dd3e1ff55b98fd154d467881a54dc141f02a86780146ee0893a6456a5156855c66f08ecdba6b57b8b853af14", 0x5f, 0x5}, {&(0x7f0000000440)="58649f33fd17d4dc97ca84541ddd3e78257ced1eac583cd5888c9fe68f5f8af37714efa54f6801d60ae8b4bfbdd47f87185176219fc82309c738b23071e625f9e322c14c57962efd1846c06deccd5d3711543381454c46f0824c074429b07e8ca0e89a73a894be74e7187ffbee55625b4a9f3b44897a0a7a39105d5ac6542af7771fab738293c9a5c71eabf832495add2b4a506021169814159b3881f6a06682a65f2f2b11fa37c472193d9189de4583e5646d94b82fb2da", 0xb8, 0x4d23}, {&(0x7f0000000500)="5c66a2decda1fa8d3ee3b6fdab486965f1f8f1039c7dfaac38ee02f2548b8dc0b1d2a1046dc41a761dfef3306ee16581a9cdb1fb1490a8c690008b53aa4a1d45402f1000be07902e6b548df9b300039faf4759c88ed1ca", 0x57, 0x5aa}, {&(0x7f0000000300)="0d5f7100b7c4d71df1f023e7215324b68ef6b391bbeb51c076a733a0740717322bbd042081402d058fca014f9835b388ab", 0x31, 0x7}, {&(0x7f0000000580)="17ee534d6f31de9b8a8159756ca7e3d4115e4db461404266213e6fc38f1733c443e361a7cca44c80623071291cfe55dfe594871547344c372eb36c9cc1df72cfadac74afac5fc8fac7d53b240b258c306dd4f8fc54243718b0d33d614d70d592ff66bfd351cbb7c837cb2460b079ed0b169ef599f088f7515e987a76302ba2884d1d14b0dce2f0eda0672c0e29f7d5d4d13a90aca9d8b5fd92350898060b6f649e39d65b1620f757ee2bd65d95660945a6507f3e6f9d0d2a3a314add1328e65e193a1bd2cc8b84c999d2ce09f5af09b39376253af2e41d51", 0xd8, 0xfff}, {&(0x7f0000000680)="f33611efb5fa6921df4c38ee22dbdf8d31128b592d5ac64677f647c7e0b4d00dd58359b43769b09f7f790e4de39207b6566778c95d508bf4c656e2010b8e72349b51c5c951e591ce23157aac44d6f099c36b79f842c5eb4986393961cf2fc6c60b8e6b370981a4cd5cb084e2814c5e9d0be38604dfe00d470ec6be70126ab6e1ec6199e4ef97e0ad6e47257acc6bc4e861c109728c", 0x95, 0x81}, {&(0x7f0000000740)="b46041956cb99cfc79e5273e4295db23d4d2a7fb3ffa2d421203387b41a96178cc7438bc360bd904c6f8caf97bb2449df943e3bdbbbf84b4b086a006753ec602c2cb2f8cda69c6f973cc18feebd8a067ca1416e5643b327c7dbb9d6f4b04a2e7f7b585cab0c8b295eff3b720724eb8c5ec51c5611776715fc71b1cf4dde1b5b2db6be1dc5da89e6d89d64735fed8f64b085d0789845c53e6b10a680e4ad9e181ad94f332fd4fa28e5dea65c70ea6d829806257837219ed07748881b5d165fd044c98cc63e0810f75f1a94ea7bb798fd4be91c75a", 0xd4, 0x1}], 0x1802028, &(0x7f00000008c0)={[{'/dev/hwrng\x00'}, {}, {'/dev/hwrng\x00'}, {'/dev/kvm\x00'}], [{@audit='audit'}]}) 04:18:45 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x4}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x40000041}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2}, 0x10, 0x0}, 0x0) 04:18:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGPGRP(r0, 0x545d, 0x0) 04:18:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000002cc0)={0x5c8, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x5a0, 0x8, 0x0, 0x1, [{0x438, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "52143b57f260558614d91f6a02e5478d54aae1601629be439cf6a90456896e4c"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ALLOWEDIPS={0x39c, 0x9, 0x0, 0x1, [{0x3, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @empty}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @private}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @dev}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast2}}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @broadcast}}]}, {0xa8, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @empty}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}, @WGPEER_A_PUBLIC_KEY={0x33, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @loopback}}, @WGPEER_A_ENDPOINT4={0x14}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x24, 0x9, 0x0, 0x1, [{0x4}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c0000000001ff050000000000000000000000003c0001002c000100140003000000000000000000000000000000000114000200fe800000000000000059df00000000bb070002"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 177.733236] EXT4-fs (loop0): Test dummy encryption mount option ignored 04:18:45 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000280), 0x0) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:18:45 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800500180000000000050017"], 0x44}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00'}) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924924924923aa, 0x0) [ 177.819333] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 177.897044] EXT4-fs (loop0): bad geometry: block count 256 exceeds size of device (2 blocks) [ 177.963933] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 178.083256] EXT4-fs (loop0): Test dummy encryption mount option ignored [ 178.150354] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 178.177795] EXT4-fs (loop0): bad geometry: block count 256 exceeds size of device (2 blocks) 04:18:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x2}, 0x20) 04:18:46 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvme-fabrics\x00', 0xa0802, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) 04:18:46 executing program 3: unshare(0x400) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$tun(r0, 0x0, 0x0) 04:18:46 executing program 2: unshare(0x2000400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) syz_open_procfs(0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x372) listen(r0, 0x2) accept4(r0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x6d) 04:18:46 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000006400)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f0000006440)) 04:18:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:18:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x4, 0x4, 0x3}, 0x40) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'veth1\x00', &(0x7f0000000100)=ANY=[]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_PORT_SELF={0x28, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xe, 0x2, '/dev/full\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a85b78a9cd782f2ceb5eb173cf7deae5"}]}]}, 0x48}}, 0x0) bpf$BPF_GET_MAP_INFO(0x2, &(0x7f00000000c0)={r0, 0x28, &(0x7f00000003c0)}, 0x30) 04:18:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x60, 0x0, @l2={'eth', 0xa, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 04:18:46 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) fcntl$lock(r0, 0x11, &(0x7f0000000080)) [ 178.773407] nvme_fabrics: missing parameter 'transport=%s' [ 178.781629] nvme_fabrics: missing parameter 'nqn=%s' 04:18:46 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000440)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "42bf00", 0x18, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}}}}, 0x0) [ 178.850152] nvme_fabrics: missing parameter 'transport=%s' [ 178.856278] nvme_fabrics: missing parameter 'nqn=%s' [ 178.889504] Enabling of bearer rejected, illegal name 04:18:46 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000140)={{0x2, 0x0, 0x7f}}) 04:18:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pselect6(0x40, &(0x7f0000000280)={0x8}, 0x0, 0x0, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x7, 0x5}, 0x14}}, 0x0) 04:18:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x0, 0x0, 0x0, 0x207}}) [ 178.946065] nvme_fabrics: missing parameter 'transport=%s' [ 178.956211] nvme_fabrics: missing parameter 'nqn=%s' [ 178.971407] Enabling of bearer rejected, illegal name [ 178.999958] nvme_fabrics: missing parameter 'transport=%s' [ 179.009158] nvme_fabrics: missing parameter 'nqn=%s' 04:18:46 executing program 4: r0 = socket(0xf, 0x3, 0x2) recvfrom$l2tp(r0, 0x0, 0x0, 0x10040, 0x0, 0x0) 04:18:46 executing program 3: sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) set_mempolicy(0x2, &(0x7f0000000200)=0x1, 0x3) ftruncate(0xffffffffffffffff, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 04:18:46 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x5000, 0x0) 04:18:46 executing program 0: r0 = socket(0x1e, 0x1, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000002640)={&(0x7f0000002580), 0xc, &(0x7f0000002600)={0x0, 0xf0ff7f}}, 0x0) 04:18:46 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000380)='cpu&3\n\n\n\n\x00\x00\xc8 \xf4\xb3\xca\f\x1ff\xf0\xed\xe2\xdaX\x96\xe8\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-S\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x02\x00\x80T\"\x00\x80\xff\xff\x03\x00') 04:18:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xfc000000}]}]}, 0x58}}, 0x0) [ 179.202562] IPVS: ftp: loaded support on port[0] = 21 [ 179.212473] ================================================================================ [ 179.221240] UBSAN: Undefined behaviour in net/netfilter/ipset/ip_set_hash_gen.h:125:6 [ 179.229994] shift exponent 32 is too large for 32-bit type 'unsigned int' [ 179.236936] CPU: 0 PID: 8429 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 04:18:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @empty}]}}}]}, 0x4c}}, 0x0) 04:18:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f00000000c0)={0x0, 0x4, 0x76f}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) openat$dlm_plock(0xffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$mice(0xffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x0) r3 = ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) pwritev(r3, &(0x7f0000000000)=[{&(0x7f0000000180)="ce3fbaf0dcdcf544378a8c975407001c087dfe1d1ee456cb52b5859c9aa0c945438dde36b42f2aac5c71e0fb8a13ecb17f1a869cf00b5dcf4b380884844b3045ebe908cfddb177da07b2793f45eb37f5f5c3407d7315cd54d9722f3a103da48eab49ec26d66899a27f0f506b73488d43e1add72a068ba7e363f95761cf83cbed9daf06e4c480590c61981b9905dd5e96fa297304f3695b8ae1522635e7ea2967d2579340e3f27957b0f1ec85f4999f72c9e4f3b6afb6a39f2c51f7f4ab7eb5b975b625c45791b19db1079f0c789cbabacf0058b8906a6e8a1552103838f23ef2b396f0b0d435473920b9", 0xea}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) ftruncate(r2, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 179.244731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.254082] Call Trace: [ 179.256701] dump_stack+0x22c/0x33e [ 179.260345] ubsan_epilogue+0xe/0x3a [ 179.264070] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 179.270249] ? hash_netnet_create+0x366/0xa4d [ 179.274781] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 179.279808] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 179.284660] hash_netnet_create.cold+0x1a/0x22 [ 179.289253] ? hash_netnet4_add+0x2690/0x2690 [ 179.294025] ip_set_create+0x70e/0x1380 [ 179.298047] ? __find_set_type_get+0x450/0x450 [ 179.302665] ? lock_downgrade+0x750/0x750 [ 179.306834] ? __find_set_type_get+0x450/0x450 [ 179.311435] nfnetlink_rcv_msg+0xeff/0x1210 [ 179.315784] ? nfnetlink_net_init+0x170/0x170 [ 179.320301] ? avc_has_extended_perms+0x1020/0x1020 [ 179.325325] ? avc_has_extended_perms+0x1020/0x1020 [ 179.330354] ? __dev_queue_xmit+0x16e9/0x2ec0 [ 179.334951] ? lock_downgrade+0x750/0x750 [ 179.339107] ? __local_bh_enable_ip+0x159/0x2a0 [ 179.343812] ? cred_has_capability+0x162/0x2e0 [ 179.348400] ? cred_has_capability+0x1d9/0x2e0 [ 179.352989] ? selinux_inode_copy_up+0x180/0x180 [ 179.357759] ? selinux_inode_copy_up+0x180/0x180 [ 179.362525] netlink_rcv_skb+0x160/0x440 [ 179.366602] ? nfnetlink_net_init+0x170/0x170 [ 179.371121] ? netlink_ack+0xae0/0xae0 [ 179.375027] ? ns_capable_common+0x117/0x140 [ 179.379448] nfnetlink_rcv+0x1b2/0x41b [ 179.383343] ? nfnetlink_rcv_batch+0x1710/0x1710 [ 179.388142] netlink_unicast+0x4d5/0x690 [ 179.392224] ? netlink_sendskb+0x110/0x110 [ 179.396480] netlink_sendmsg+0x717/0xcc0 [ 179.400600] ? nlmsg_notify+0x1a0/0x1a0 [ 179.404579] ? __sock_recv_ts_and_drops+0x540/0x540 [ 179.409612] ? nlmsg_notify+0x1a0/0x1a0 [ 179.413593] sock_sendmsg+0xc7/0x130 [ 179.417310] ___sys_sendmsg+0x7bb/0x8f0 [ 179.421295] ? copy_msghdr_from_user+0x440/0x440 [ 179.426058] ? find_held_lock+0x2d/0x110 [ 179.430151] ? __fget+0x386/0x570 [ 179.433651] ? lock_downgrade+0x750/0x750 [ 179.437814] ? check_preemption_disabled+0x41/0x2b0 [ 179.442877] ? __fget+0x3ad/0x570 [ 179.446346] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 179.450589] ? lock_acquire+0x170/0x3f0 [ 179.454590] ? __might_fault+0xef/0x1d0 [ 179.458604] ? __fget_light+0x1d1/0x230 [ 179.462593] __x64_sys_sendmsg+0x132/0x220 [ 179.466832] ? __sys_sendmsg+0x1b0/0x1b0 [ 179.470921] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 179.476295] ? trace_hardirqs_off_caller+0x6e/0x210 [ 179.481328] ? do_syscall_64+0x21/0x670 [ 179.485316] do_syscall_64+0xf9/0x670 [ 179.489140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.494339] RIP: 0033:0x45de59 [ 179.497567] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.516504] RSP: 002b:00007efd4dff3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 179.524220] RAX: ffffffffffffffda RBX: 0000000000029b40 RCX: 000000000045de59 [ 179.531495] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 179.538774] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 179.546045] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c 04:18:47 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000003400)=[{0x0, 0x0, 0xfffffffffffffffa}, {&(0x7f0000004500)="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", 0x1e0, 0x2}]) [ 179.553319] R13: 00007ffe593bccaf R14: 00007efd4dff49c0 R15: 000000000118bf2c [ 179.560603] ================================================================================ 04:18:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x20}}, 0x0) 04:18:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0xe3af, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 179.675363] audit: type=1800 audit(1602821927.470:17): pid=8436 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=15795 res=0 04:18:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000200)="e1", 0xfea8, 0x0, 0x0, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) [ 179.739911] loop0: AHDI p1 p3 04:18:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="9500000000001000000000000000400002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'netpci0\x00'}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) [ 179.764840] loop0: p1 start 71387782 is beyond EOD, truncated 04:18:47 executing program 3: prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffa000/0x3000)=nil) 04:18:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x400445a0, &(0x7f00000000c0)=0x7) ioctl$EVIOCREVOKE(r0, 0x400445a0, &(0x7f0000001140)=0x7) 04:18:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:47 executing program 2: setresuid(0xee01, 0x0, 0x0) r0 = gettid() socket$inet6(0xa, 0x0, 0x0) prlimit64(r0, 0x0, 0x0, 0x0) [ 179.878992] loop0: AHDI p1 p3 [ 179.882649] loop0: p1 start 71387782 is beyond EOD, truncated [ 179.943359] IPVS: ftp: loaded support on port[0] = 21 04:18:47 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f0000000180)='./bus/file1\x00', 0x0, 0x1) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) lsetxattr$security_ima(&(0x7f0000000340)='./bus/file1\x00', &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@ng, 0x2, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) 04:18:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d4", 0x1) 04:18:47 executing program 3: unshare(0x2a000400) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_attach_bpf(r0, 0x1, 0x19, &(0x7f0000000000), 0x4) [ 180.090608] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:18:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000001c0)={0x6, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x104) 04:18:48 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000000)=0x24404e) write(0xffffffffffffffff, &(0x7f0000000140)="6d527cd538", 0x5) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="80fd02", 0xfffffffffffffd7c}], 0x1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 180.156692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 180.176068] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:48 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000040)=[{&(0x7f0000000280)="ebcdf3a3ac19aae0fd3121", 0xb, 0x6}], 0x0, &(0x7f0000000240)) 04:18:48 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000500)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x24b6422, &(0x7f0000000180)={[{@nr_inodes={'nr_inodes', 0x3d, [0x30]}}]}) [ 180.325383] FAT-fs (loop3): invalid media value (0x00) [ 180.339764] FAT-fs (loop3): Can't find a valid FAT filesystem [ 180.403029] FAT-fs (loop3): invalid media value (0x00) 04:18:48 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000400)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r2, 0x0) getsockopt$inet6_int(r2, 0x29, 0x24, 0x0, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) 04:18:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x18, 0x2, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4, 0xb}]}, 0x18}}, 0x0) 04:18:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000003c0)='7', 0x1}], 0x1) [ 180.425457] FAT-fs (loop3): Can't find a valid FAT filesystem [ 180.492246] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 180.525341] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 180.545132] new mount options do not match the existing superblock, will be ignored [ 180.555120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 180.569596] new mount options do not match the existing superblock, will be ignored 04:18:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'erspan0\x00', &(0x7f00000000c0)=@ethtool_modinfo}) 04:18:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000280)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a880)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x30}}, 0x0) 04:18:48 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@\x00', 0x14, 0x2c, 0x0, @remote, @local, {[], {{0x0, 0x5, 0x41424344, 0x41424344, 0x0, 0x5, 0x5}}}}}}}, 0x0) 04:18:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000040)={0x24, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}]}, 0x24}], 0x1}, 0x0) 04:18:48 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0}}, 0x1c) [ 180.835249] audit: type=1400 audit(1602821928.630:18): avc: denied { create } for pid=8593 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 180.848260] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 180.908556] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 180.924498] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x8, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2}, 0x14) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000200)=0xda, 0x4) sendto$inet6(r0, &(0x7f0000000080)="03032a01153060024003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801610002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4021, 0x0, 0x23f) 04:18:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x1, 0x1, 0x0, &(0x7f0000000340)=""/36, 0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x1, r1}) 04:18:49 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 04:18:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000200)='GPL\x00', 0x1, 0xfe7, &(0x7f0000000240)=""/4071, 0x0, 0x0, [0x48], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 04:18:49 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:49 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000100)=0x4) 04:18:49 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:49 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_PROTOCOL={0x5}]}, 0x24}}, 0x0) 04:18:49 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000100)=0x4) 04:18:49 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f00000002c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet6(r0, &(0x7f00000039c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@pktinfo={{0x20, 0x29, 0x32, {@private2, r2}}}], 0x20}}], 0x2, 0x0) 04:18:49 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000000c0)=0xf85d, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @mcast2, 0x2}, 0x72) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f00000000c0)=0xf85d, 0x4) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @mcast2, 0x2}, 0x72) [ 181.504959] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:18:49 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}], 0x0, &(0x7f0000012b00)) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000180)="a73cc586f87c4474420775ef1730a0addfe42d7c1b4d81c6e672a39c80cae9dac97dacd2bb2e97593b873ed3e5f1ee6c884b75c493873a7c56c0f731f96d1e7e7b7f40b51607f9a69ba508a10a4210bca145cf860bea50079a4b6abd7437cf783365d66c0624ce5fd1a4e11cf5136cd7cf78133c565fed04972dc8e99c249a885529113a08f32f66dd86c7471c5dea91c14719445d8ae1bf5892e11db4d23af92d53fdf4e6dd7b663f7c72842f48dff4d5e0f5d9988eb406ce4494b7d6ca004820a4babbbb469be7913ef5", 0xcb, 0x3}, {0x0}, {&(0x7f0000000280)="afc383", 0x3, 0x8}], 0x440, &(0x7f0000000300)={[{@mblk_io_submit='mblk_io_submit'}, {@auto_da_alloc='auto_da_alloc'}], [{@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}]}) [ 181.550860] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.582011] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:49 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x1405, 0xb03, 0x0, 0x0, "", [{{0x8}, {0x8}}]}, 0x20}}, 0x0) 04:18:49 executing program 0: r0 = epoll_create1(0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001900)) [ 181.732301] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (2 blocks) [ 181.891209] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:18:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:49 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f00000002c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001c00000050000180"], 0x64}}, 0x0) 04:18:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) [ 181.943575] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (2 blocks) 04:18:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) 04:18:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}], 0x0, &(0x7f0000012b00)) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000180)="a73cc586f87c4474420775ef1730a0addfe42d7c1b4d81c6e672a39c80cae9dac97dacd2bb2e97593b873ed3e5f1ee6c884b75c493873a7c56c0f731f96d1e7e7b7f40b51607f9a69ba508a10a4210bca145cf860bea50079a4b6abd7437cf783365d66c0624ce5fd1a4e11cf5136cd7cf78133c565fed04972dc8e99c249a885529113a08f32f66dd86c7471c5dea91c14719445d8ae1bf5892e11db4d23af92d53fdf4e6dd7b663f7c72842f48dff4d5e0f5d9988eb406ce4494b7d6ca004820a4babbbb469be7913ef5", 0xcb, 0x3}, {0x0}, {&(0x7f0000000280)="afc383", 0x3, 0x8}], 0x440, &(0x7f0000000300)={[{@mblk_io_submit='mblk_io_submit'}, {@auto_da_alloc='auto_da_alloc'}], [{@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}]}) 04:18:49 executing program 1: statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 182.035436] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop0 04:18:49 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) close(r0) syncfs(r0) 04:18:49 executing program 2: sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)={&(0x7f00000002c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYBLOB="000227bd"], 0x2c}}, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x300, 0x0) [ 182.136934] BTRFS info (device loop0): disk space caching is enabled [ 182.162301] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (2 blocks) [ 182.198610] BTRFS info (device loop0): has skinny extents [ 182.205902] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:18:50 executing program 1: statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)={0x18, 0x2, 0x1, 0x101, 0x0, 0x0, {0x0, 0x4}, [@CTA_TUPLE_REPLY={0x4, 0x19}]}, 0x18}}, 0x0) [ 182.244748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 182.258450] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 182.277433] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:50 executing program 2: chdir(0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000280)=0xfdfdffff) [ 182.483401] attempt to access beyond end of device [ 182.503792] loop0: rw=4096, want=2064, limit=267 [ 182.529851] BTRFS error (device loop0): failed to read chunk root [ 182.570948] BTRFS error (device loop0): open_ctree failed 04:18:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:50 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x6, 0x17, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x410, 0xe8, 0x1f8, 0xe8, 0x328, 0x328, 0x328, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@local, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'wg1\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "db1de92ba9fd235e4504f297c97f9a548af68f2cde4cddc05a53269cbc9aa75ad3680f46701e9e9ceaf92313bfc28c2b151612fd65212df8249a4db55aa5211e"}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x460) 04:18:50 executing program 1: statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 182.626328] BTRFS info (device loop0): disk space caching is enabled [ 182.635301] BTRFS info (device loop0): has skinny extents 04:18:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) 04:18:50 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x1409, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 04:18:50 executing program 1: r0 = syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) [ 182.758194] BTRFS error (device loop0): open_ctree failed 04:18:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='westwood\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 04:18:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x83}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0xdb, &(0x7f0000000080)=""/219, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:18:50 executing program 3: syz_emit_ethernet(0x52, &(0x7f00000003c0)={@link_local={0x3}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "bf6e00", 0x1c, 0x3a, 0x0, @remote={0xfe, 0x7e}, @mcast2, {[], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @empty}}}}}}, 0x0) syz_emit_ethernet(0x68, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @tipc={{0xc, 0x4, 0x1, 0x1, 0x5a, 0x64, 0x0, 0x7, 0x6, 0x0, @private=0xa010100, @multicast2, {[@timestamp_prespec={0x44, 0x14, 0x2d, 0x3, 0x7, [{@empty, 0xffffffff}, {@local, 0x3}]}, @ssrr={0x89, 0x7, 0x56, [@loopback]}]}}, @payload_named={{{{{0x2a, 0x0, 0x0, 0x1, 0x0, 0xa, 0x2, 0x2, 0x2, 0x0, 0x3, 0x2, 0x0, 0x2, 0x8, 0x1, 0x2, 0x4e21, 0x4e24}, 0x0, 0x4}, 0x1}}, [0x0, 0x0]}}}}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x64, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x38, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x34, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x24, 0x2, 'cpuset\\securityposix_acl_access\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}]}, 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x25dfdbfd, {0x2, 0x1f, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 04:18:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:50 executing program 1: r0 = syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 182.917297] BTRFS info (device loop0): disk space caching is enabled 04:18:50 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000006300)={0x2020}, 0x2020) [ 182.962481] BTRFS info (device loop0): has skinny extents 04:18:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) [ 183.119857] attempt to access beyond end of device [ 183.124840] loop0: rw=4096, want=2064, limit=267 [ 183.139765] BTRFS error (device loop0): failed to read chunk root [ 183.146797] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 183.156526] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.165006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.173571] BTRFS error (device loop0): open_ctree failed 04:18:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:51 executing program 2: clone(0x4000002206ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4205, r0, 0x0, 0x0) 04:18:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @local}}}, 0x104) 04:18:51 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @link_local, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote}}}}, 0x0) 04:18:51 executing program 1: r0 = syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:51 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') read$char_usb(r0, 0x0, 0x0) 04:18:51 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', 0x0, 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 183.327653] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 183.335807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.344760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@fat=@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 04:18:51 executing program 3: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) recvmmsg(r0, &(0x7f0000001640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x160, 0x0) 04:18:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) [ 183.401462] BTRFS info (device loop0): disk space caching is enabled [ 183.437887] BTRFS info (device loop0): has skinny extents [ 183.511104] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 183.537317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 04:18:51 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', 0x0, 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 183.555067] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.566448] attempt to access beyond end of device [ 183.574348] loop0: rw=4096, want=2064, limit=267 [ 183.582265] BTRFS error (device loop0): failed to read chunk root [ 183.634306] BTRFS error (device loop0): open_ctree failed 04:18:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) [ 183.865719] BTRFS info (device loop0): disk space caching is enabled [ 183.872739] BTRFS info (device loop0): has skinny extents [ 183.977227] attempt to access beyond end of device [ 184.002900] loop0: rw=4096, want=2064, limit=267 [ 184.016801] BTRFS error (device loop0): failed to read chunk root 04:18:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x90, 0x30, 0x871a15abc695ff09, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_tunnel_key={0x78, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x48, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @private1}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) 04:18:51 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0xe0003f01, &(0x7f0000000180)={&(0x7f0000001440)=ANY=[@ANYBLOB="020300030c0000e7000087fd46e9e8c1"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) writev(r0, &(0x7f0000000080), 0x10000000000000f8) 04:18:51 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000100002000c000200376798aff4"], 0x40}}, 0x0) 04:18:51 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:51 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', 0x0, 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 184.057391] BTRFS error (device loop0): open_ctree failed 04:18:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x4, 0x9, 0x288}, 0x40) [ 184.144802] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:18:52 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:52 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 184.193742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.209715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x420, 0x0, 0x17c, 0x17c, 0x0, 0x5, 0x358, 0x260, 0x260, 0x358, 0x260, 0x3, 0x0, {[{{@uncond, 0x0, 0x200, 0x228, 0x52020000, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}, @common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x8, 0x0, [@remote, @ipv4={[], [], @local}, @dev, @empty, @private1, @empty, @ipv4={[], [], @loopback}, @ipv4={[], [], @multicast2}, @private2, @remote, @private0, @empty, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @empty]}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@ipv6={@local, @ipv4={[], [], @multicast2}, [], [], 'batadv0\x00', 'rose0\x00'}, 0x0, 0xc8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x47c) 04:18:52 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:52 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000003f00)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x35, 0x1, 0x0, 0x0, "", [@typed={0x3}, @nested={0xc, 0x0, 0x0, 0x0, [@typed={0x8, 0x9, 0x0, 0x0, @pid}]}]}, 0x20}], 0x1}, 0x0) 04:18:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000240)) 04:18:52 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x3) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 04:18:52 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:52 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) [ 184.458518] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 184.467359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 04:18:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_GROUP={0x1c, 0x2, [{}, {0x1}, {}]}]}, 0x34}}, 0x0) 04:18:52 executing program 3: r0 = socket(0x11, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x107, 0x8, 0x0, 0x300) [ 184.515040] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:52 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:52 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x3) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) [ 184.575589] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=104 sclass=netlink_route_socket pid=8999 comm=syz-executor.2 04:18:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:52 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="900000000000000029000000020000000000000000000008"], 0x110) 04:18:52 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)={[{@mpol={'mpol', 0x3d, {'bind', '', @void}}}]}) [ 184.667301] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 184.691658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.698948] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.713168] isofs_fill_super: root inode is not a directory. Corrupted media? 04:18:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4000000}]}, 0x1c}}, 0x0) 04:18:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:52 executing program 5: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f0000000100)) rt_sigsuspend(&(0x7f0000000040), 0x8) [ 184.757290] tmpfs: Bad value 'bind' for mount option 'mpol' [ 184.767418] tmpfs: Bad value 'bind' for mount option 'mpol' 04:18:52 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xfffffffffffeffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="1400050900000a0e666174000404090a1000027400f801", 0x17}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='nfs']) 04:18:52 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:52 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000340)=[{0x0, 0x0, 0x770000000}, {&(0x7f0000001640)="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", 0x1d2, 0x5}]) [ 184.882311] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 184.935932] isofs_fill_super: root inode is not a directory. Corrupted media? 04:18:52 executing program 2: r0 = geteuid() syz_mount_image$tmpfs(&(0x7f0000001080)='tmpfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r0]) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x280030, &(0x7f0000000200)={[{@adaptive_mode='mode=adaptive'}]}) [ 184.981395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.994604] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:52 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)="82e7", 0x2}], 0x3f}}], 0x25, 0x2402e4e4) 04:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) [ 185.202101] isofs_fill_super: root inode is not a directory. Corrupted media? [ 185.231504] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 185.245877] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 04:18:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000440)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000180)={0x44, r1, 0x1, 0x0, 0x0, {0x6}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0xffffffffffffffec}}]}, 0x44}}, 0x0) 04:18:53 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 185.290632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.381468] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 185.401267] isofs_fill_super: root inode is not a directory. Corrupted media? [ 185.421304] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 04:18:53 executing program 5: unshare(0x6040400) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000001000), 0x4) 04:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:53 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0xffffffffffffffb2) 04:18:53 executing program 2: rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000780)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 04:18:53 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 185.772587] isofs_fill_super: root inode is not a directory. Corrupted media? [ 185.773662] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 185.801218] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.809429] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:53 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2cc, 0x13c, 0x1d, 0x0, 0x13c, 0x0, 0x204, 0x1fc, 0x1fc, 0x204, 0x1fc, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x118, 0x13c, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @common=@unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x41) 04:18:53 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x2}, 0x26) 04:18:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:53 executing program 3: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) write(r0, &(0x7f0000c34fff), 0xffffff0b) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 04:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) [ 185.965003] isofs_fill_super: root inode is not a directory. Corrupted media? 04:18:53 executing program 5: unshare(0x2a000400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, 0x0, 0x0) 04:18:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0x159, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x14000000}, 0x40) 04:18:53 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900), 0x0, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) ioctl$KDSKBSENT(r0, 0x8926, 0x0) [ 186.145401] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 186.184981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 04:18:54 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, 0x0, 0xfffffcaa) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x7f, 0x0) [ 186.193279] isofs_fill_super: root inode is not a directory. Corrupted media? [ 186.212792] BTRFS error (device loop0): superblock checksum mismatch [ 186.222500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:54 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900), 0x0, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) [ 186.281583] BTRFS error (device loop0): open_ctree failed [ 186.316528] mkiss: ax0: crc mode is auto. 04:18:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) [ 186.404127] mkiss: ax0: crc mode is auto. [ 186.419698] isofs_fill_super: root inode is not a directory. Corrupted media? [ 186.454219] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 186.473594] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.482994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:54 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900), 0x0, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 186.515511] BTRFS error (device loop0): superblock checksum mismatch [ 186.533819] BTRFS error (device loop0): open_ctree failed [ 186.669465] isofs_fill_super: root inode is not a directory. Corrupted media? 04:18:54 executing program 3: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) write(r0, &(0x7f0000c34fff), 0xffffff0b) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 04:18:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) ioctl$KDSKBSENT(r0, 0x8926, 0x0) 04:18:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:54 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a08", 0x19, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:54 executing program 5: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000000400)=0xffffffffffffffff, 0x8) [ 187.075405] isofs_fill_super: root inode is not a directory. Corrupted media? [ 187.099514] BTRFS error (device loop0): superblock checksum mismatch [ 187.100934] mkiss: ax0: crc mode is auto. [ 187.111224] BTRFS error (device loop0): open_ctree failed 04:18:55 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a08", 0x19, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 187.166748] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:18:55 executing program 5: sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="e0ff00000000000000000200000008000200000000000c000180060001"], 0x28}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0xff9a, 0x400}], 0x0, &(0x7f0000000240)={[{@data_journal='data=journal'}]}) 04:18:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {0x0, 0x0, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) [ 187.254694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.295718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.321089] isofs_fill_super: root inode is not a directory. Corrupted media? [ 187.338311] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 187.362195] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 187.385925] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended 04:18:55 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a08", 0x19, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 187.417951] BTRFS error (device loop0): superblock checksum mismatch [ 187.455324] BTRFS error (device loop0): open_ctree failed 04:18:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) [ 187.491676] EXT4-fs (loop5): invalid inodes per group: 242029655 [ 187.491676] 04:18:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) ioctl$KDSKBSENT(r0, 0x8926, 0x0) [ 187.658985] isofs_fill_super: root inode is not a directory. Corrupted media? 04:18:55 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000)=0x7fffffff, 0x4) 04:18:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {0x0, 0x0, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:55 executing program 5: sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="e0ff00000000000000000200000008000200000000000c000180060001"], 0x28}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0xff9a, 0x400}], 0x0, &(0x7f0000000240)={[{@data_journal='data=journal'}]}) 04:18:55 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:55 executing program 2: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) keyctl$chown(0x4, r0, 0xee00, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) setgroups(0x0, 0x0) keyctl$revoke(0x3, r0) 04:18:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) [ 188.211418] BTRFS error (device loop0): superblock checksum mismatch [ 188.222911] BTRFS error (device loop0): open_ctree failed 04:18:56 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321bb82930a"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:18:56 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 188.285904] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 188.310074] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode 04:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {0x0, 0x0, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) [ 188.366583] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 188.413565] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.443587] EXT4-fs (loop5): invalid inodes per group: 242029655 [ 188.443587] [ 188.464080] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:18:56 executing program 2: sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x4b6a, &(0x7f0000000000)) [ 188.508408] BTRFS error (device loop0): superblock checksum mismatch 04:18:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 04:18:56 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'vxcan1\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'vxcan1\x00'}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, 0x0, &(0x7f0000000000)=0x300) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x10, &(0x7f0000000080)={r3}, 0x8) [ 188.608349] BTRFS error (device loop0): open_ctree failed 04:18:56 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:56 executing program 5: syz_emit_ethernet(0x86, &(0x7f00000001c0)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x3, 0x0, 0x0, "000000010865390403030500000000010900000000000000000000005200", "938408b21b7700000d52901512bbc3de", {"695dfb1be5d2a0057a62022a156400", "a329d3a73b8268129e5fa4316a5d8c69"}}}}}}}, 0x0) 04:18:56 executing program 2: r0 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 04:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400), 0x0, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) [ 188.753180] sctp: [Deprecated]: syz-executor.3 (pid 9356) Use of struct sctp_assoc_value in delayed_ack socket option. [ 188.753180] Use struct sctp_sack_info instead 04:18:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="240000002e000100000000000000000700000000", @ANYRES32=r4, @ANYBLOB="0000f0ff000000000000f1"], 0x24}}, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x4924924924926d3, 0x0) 04:18:56 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252", 0x2b, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0x9, 0x2, "01"}, 0x0) [ 188.872104] BTRFS error (device loop0): superblock checksum mismatch [ 188.945741] BTRFS error (device loop0): open_ctree failed 04:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400), 0x0, 0x10b20}], 0x0, &(0x7f0000000180)={[{@space_cache_v1='space_cache=v1'}]}) 04:18:56 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef025252", 0x2b, 0xb800}], 0x0, &(0x7f0000000040)) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:18:57 executing program 2: syz_mount_image$ocfs2(&(0x7f0000000100)='ocfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000000)={[{'data=ordered'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}]})