Warning: Permanently added '10.128.1.12' (ECDSA) to the list of known hosts. 2021/03/22 03:44:19 fuzzer started 2021/03/22 03:44:20 dialing manager at 10.128.0.163:34997 2021/03/22 03:44:20 syscalls: 3557 2021/03/22 03:44:20 code coverage: enabled 2021/03/22 03:44:20 comparison tracing: enabled 2021/03/22 03:44:20 extra coverage: enabled 2021/03/22 03:44:20 setuid sandbox: enabled 2021/03/22 03:44:20 namespace sandbox: enabled 2021/03/22 03:44:20 Android sandbox: /sys/fs/selinux/policy does not exist 2021/03/22 03:44:20 fault injection: enabled 2021/03/22 03:44:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/22 03:44:20 net packet injection: enabled 2021/03/22 03:44:20 net device setup: enabled 2021/03/22 03:44:20 concurrency sanitizer: enabled 2021/03/22 03:44:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/22 03:44:20 USB emulation: enabled 2021/03/22 03:44:20 hci packet injection: enabled 2021/03/22 03:44:20 wifi device emulation: enabled 2021/03/22 03:44:20 802.15.4 emulation: enabled 2021/03/22 03:44:22 suppressing KCSAN reports in functions: '__mark_inode_dirty' 'add_input_randomness' 'blk_mq_sched_dispatch_requests' 'wbt_wait' 'xas_find_marked' 'do_signal_stop' '_prb_read_valid' 'lbmIODone' 'generic_write_end' 'do_nanosleep' '__xa_clear_mark' 'ext4_free_inode' 'expire_timers' 'blk_mq_dispatch_rq_list' 'ext4_free_inodes_count' 'ext4_writepages' 'complete_signal' 'lru_add_drain_all' 'blk_mq_rq_ctx_init' '__ext4_new_inode' 'n_tty_receive_buf_common' 'ext4_mb_good_group' 'ext4_ext_handle_unwritten_extents' 'do_sys_poll' 'alloc_pid' 'ext4_mb_regular_allocator' '__mod_timer' 2021/03/22 03:44:22 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/22 03:44:22 fetching corpus: 49, signal 21368/25112 (executing program) 2021/03/22 03:44:22 fetching corpus: 99, signal 37331/42684 (executing program) 2021/03/22 03:44:22 fetching corpus: 148, signal 45494/52428 (executing program) 2021/03/22 03:44:22 fetching corpus: 198, signal 50412/58949 (executing program) 2021/03/22 03:44:22 fetching corpus: 248, signal 60153/69983 (executing program) 2021/03/22 03:44:23 fetching corpus: 298, signal 66476/77646 (executing program) 2021/03/22 03:44:23 fetching corpus: 347, signal 70412/82971 (executing program) 2021/03/22 03:44:23 fetching corpus: 397, signal 75237/89122 (executing program) 2021/03/22 03:44:23 fetching corpus: 447, signal 79895/95081 (executing program) 2021/03/22 03:44:23 fetching corpus: 497, signal 84185/100644 (executing program) 2021/03/22 03:44:23 fetching corpus: 547, signal 89855/107380 (executing program) 2021/03/22 03:44:23 fetching corpus: 597, signal 96084/114610 (executing program) 2021/03/22 03:44:23 fetching corpus: 647, signal 99722/119405 (executing program) 2021/03/22 03:44:23 fetching corpus: 697, signal 103770/124536 (executing program) 2021/03/22 03:44:23 fetching corpus: 747, signal 106303/128228 (executing program) 2021/03/22 03:44:23 fetching corpus: 797, signal 111037/133808 (executing program) 2021/03/22 03:44:23 fetching corpus: 847, signal 113303/137194 (executing program) 2021/03/22 03:44:23 fetching corpus: 897, signal 116826/141656 (executing program) 2021/03/22 03:44:23 fetching corpus: 947, signal 119005/144882 (executing program) 2021/03/22 03:44:23 fetching corpus: 997, signal 121457/148321 (executing program) 2021/03/22 03:44:23 fetching corpus: 1047, signal 123545/151404 (executing program) 2021/03/22 03:44:24 fetching corpus: 1097, signal 126935/155563 (executing program) 2021/03/22 03:44:24 fetching corpus: 1147, signal 128709/158344 (executing program) 2021/03/22 03:44:24 fetching corpus: 1197, signal 131559/161979 (executing program) 2021/03/22 03:44:24 fetching corpus: 1247, signal 134637/165776 (executing program) 2021/03/22 03:44:24 fetching corpus: 1297, signal 137324/169223 (executing program) 2021/03/22 03:44:24 fetching corpus: 1347, signal 139427/172162 (executing program) 2021/03/22 03:44:24 fetching corpus: 1397, signal 141955/175411 (executing program) 2021/03/22 03:44:24 fetching corpus: 1447, signal 143449/177845 (executing program) 2021/03/22 03:44:24 fetching corpus: 1497, signal 145163/180333 (executing program) 2021/03/22 03:44:24 fetching corpus: 1547, signal 147596/183427 (executing program) 2021/03/22 03:44:24 fetching corpus: 1597, signal 149141/185805 (executing program) 2021/03/22 03:44:24 fetching corpus: 1647, signal 150856/188293 (executing program) 2021/03/22 03:44:24 fetching corpus: 1697, signal 154143/192050 (executing program) 2021/03/22 03:44:24 fetching corpus: 1747, signal 155339/194062 (executing program) 2021/03/22 03:44:24 fetching corpus: 1797, signal 157000/196449 (executing program) 2021/03/22 03:44:24 fetching corpus: 1846, signal 158591/198733 (executing program) 2021/03/22 03:44:24 fetching corpus: 1896, signal 160593/201353 (executing program) 2021/03/22 03:44:24 fetching corpus: 1946, signal 162314/203710 (executing program) 2021/03/22 03:44:25 fetching corpus: 1996, signal 164140/206152 (executing program) 2021/03/22 03:44:25 fetching corpus: 2046, signal 165999/208564 (executing program) 2021/03/22 03:44:25 fetching corpus: 2096, signal 167123/210443 (executing program) 2021/03/22 03:44:25 fetching corpus: 2146, signal 168279/212332 (executing program) 2021/03/22 03:44:25 fetching corpus: 2196, signal 170800/215160 (executing program) 2021/03/22 03:44:25 fetching corpus: 2246, signal 172743/217559 (executing program) 2021/03/22 03:44:25 fetching corpus: 2296, signal 173765/219322 (executing program) 2021/03/22 03:44:25 fetching corpus: 2346, signal 175324/221451 (executing program) 2021/03/22 03:44:25 fetching corpus: 2396, signal 176370/223145 (executing program) 2021/03/22 03:44:25 fetching corpus: 2446, signal 178754/225806 (executing program) 2021/03/22 03:44:25 fetching corpus: 2496, signal 179588/227368 (executing program) 2021/03/22 03:44:25 fetching corpus: 2546, signal 180583/229009 (executing program) 2021/03/22 03:44:25 fetching corpus: 2596, signal 181663/230671 (executing program) 2021/03/22 03:44:25 fetching corpus: 2646, signal 183932/233161 (executing program) 2021/03/22 03:44:26 fetching corpus: 2696, signal 185367/235032 (executing program) 2021/03/22 03:44:26 fetching corpus: 2746, signal 189108/238404 (executing program) 2021/03/22 03:44:26 fetching corpus: 2796, signal 191282/240702 (executing program) 2021/03/22 03:44:26 fetching corpus: 2846, signal 192376/242314 (executing program) 2021/03/22 03:44:26 fetching corpus: 2896, signal 193743/244050 (executing program) 2021/03/22 03:44:26 fetching corpus: 2946, signal 195638/246088 (executing program) 2021/03/22 03:44:26 fetching corpus: 2996, signal 196629/247570 (executing program) 2021/03/22 03:44:26 fetching corpus: 3046, signal 197793/249155 (executing program) 2021/03/22 03:44:26 fetching corpus: 3096, signal 199238/250901 (executing program) 2021/03/22 03:44:26 fetching corpus: 3146, signal 201107/252895 (executing program) 2021/03/22 03:44:26 fetching corpus: 3196, signal 202354/254438 (executing program) 2021/03/22 03:44:26 fetching corpus: 3246, signal 204354/256486 (executing program) 2021/03/22 03:44:26 fetching corpus: 3296, signal 205399/257908 (executing program) 2021/03/22 03:44:26 fetching corpus: 3346, signal 207165/259748 (executing program) 2021/03/22 03:44:26 fetching corpus: 3396, signal 208086/261060 (executing program) 2021/03/22 03:44:27 fetching corpus: 3446, signal 209626/262710 (executing program) 2021/03/22 03:44:27 fetching corpus: 3496, signal 210892/264191 (executing program) 2021/03/22 03:44:27 fetching corpus: 3546, signal 211755/265434 (executing program) 2021/03/22 03:44:27 fetching corpus: 3596, signal 212839/266786 (executing program) 2021/03/22 03:44:27 fetching corpus: 3646, signal 214563/268486 (executing program) 2021/03/22 03:44:27 fetching corpus: 3696, signal 215703/269833 (executing program) 2021/03/22 03:44:27 fetching corpus: 3746, signal 216875/271157 (executing program) 2021/03/22 03:44:27 fetching corpus: 3796, signal 218598/272785 (executing program) 2021/03/22 03:44:27 fetching corpus: 3846, signal 219941/274224 (executing program) 2021/03/22 03:44:27 fetching corpus: 3896, signal 220981/275468 (executing program) 2021/03/22 03:44:27 fetching corpus: 3946, signal 222170/276806 (executing program) 2021/03/22 03:44:27 fetching corpus: 3996, signal 223252/278072 (executing program) 2021/03/22 03:44:28 fetching corpus: 4046, signal 225319/279801 (executing program) 2021/03/22 03:44:28 fetching corpus: 4096, signal 226584/281125 (executing program) 2021/03/22 03:44:28 fetching corpus: 4146, signal 228102/282597 (executing program) 2021/03/22 03:44:28 fetching corpus: 4196, signal 229087/283718 (executing program) 2021/03/22 03:44:28 fetching corpus: 4246, signal 229981/284806 (executing program) 2021/03/22 03:44:28 fetching corpus: 4296, signal 231073/285940 (executing program) 2021/03/22 03:44:28 fetching corpus: 4346, signal 232051/287048 (executing program) 2021/03/22 03:44:28 fetching corpus: 4396, signal 233412/288322 (executing program) 2021/03/22 03:44:28 fetching corpus: 4446, signal 234221/289319 (executing program) 2021/03/22 03:44:28 fetching corpus: 4496, signal 235026/290315 (executing program) 2021/03/22 03:44:28 fetching corpus: 4546, signal 236184/291498 (executing program) 2021/03/22 03:44:28 fetching corpus: 4596, signal 237359/292641 (executing program) 2021/03/22 03:44:28 fetching corpus: 4646, signal 238369/293676 (executing program) 2021/03/22 03:44:28 fetching corpus: 4696, signal 239091/294593 (executing program) 2021/03/22 03:44:28 fetching corpus: 4745, signal 239803/295477 (executing program) 2021/03/22 03:44:29 fetching corpus: 4795, signal 241323/296735 (executing program) 2021/03/22 03:44:29 fetching corpus: 4843, signal 243010/298186 (executing program) 2021/03/22 03:44:29 fetching corpus: 4893, signal 243547/299007 (executing program) 2021/03/22 03:44:29 fetching corpus: 4943, signal 244239/299842 (executing program) 2021/03/22 03:44:29 fetching corpus: 4993, signal 244933/300680 (executing program) 2021/03/22 03:44:29 fetching corpus: 5043, signal 245847/301586 (executing program) 2021/03/22 03:44:29 fetching corpus: 5093, signal 247230/302680 (executing program) 2021/03/22 03:44:29 fetching corpus: 5143, signal 248004/303511 (executing program) 2021/03/22 03:44:29 fetching corpus: 5193, signal 248916/304364 (executing program) 2021/03/22 03:44:29 fetching corpus: 5243, signal 249429/305119 (executing program) 2021/03/22 03:44:29 fetching corpus: 5293, signal 250665/306055 (executing program) 2021/03/22 03:44:29 fetching corpus: 5343, signal 251384/306811 (executing program) 2021/03/22 03:44:29 fetching corpus: 5393, signal 252815/307859 (executing program) 2021/03/22 03:44:29 fetching corpus: 5442, signal 253839/308743 (executing program) 2021/03/22 03:44:29 fetching corpus: 5492, signal 254491/309472 (executing program) 2021/03/22 03:44:29 fetching corpus: 5541, signal 255319/310232 (executing program) 2021/03/22 03:44:29 fetching corpus: 5591, signal 256223/310983 (executing program) 2021/03/22 03:44:29 fetching corpus: 5641, signal 257618/311915 (executing program) 2021/03/22 03:44:30 fetching corpus: 5691, signal 258716/312710 (executing program) 2021/03/22 03:44:30 fetching corpus: 5740, signal 259696/313524 (executing program) 2021/03/22 03:44:30 fetching corpus: 5790, signal 260466/314277 (executing program) 2021/03/22 03:44:30 fetching corpus: 5839, signal 261339/315020 (executing program) 2021/03/22 03:44:30 fetching corpus: 5888, signal 262741/315904 (executing program) 2021/03/22 03:44:30 fetching corpus: 5938, signal 263446/316550 (executing program) 2021/03/22 03:44:30 fetching corpus: 5987, signal 265168/317433 (executing program) 2021/03/22 03:44:30 fetching corpus: 6037, signal 265990/318097 (executing program) 2021/03/22 03:44:30 fetching corpus: 6087, signal 267096/318851 (executing program) 2021/03/22 03:44:30 fetching corpus: 6137, signal 268734/319708 (executing program) 2021/03/22 03:44:30 fetching corpus: 6187, signal 269672/320365 (executing program) 2021/03/22 03:44:30 fetching corpus: 6236, signal 270140/320915 (executing program) 2021/03/22 03:44:30 fetching corpus: 6285, signal 271173/321554 (executing program) 2021/03/22 03:44:30 fetching corpus: 6334, signal 272012/322157 (executing program) 2021/03/22 03:44:30 fetching corpus: 6383, signal 272773/322748 (executing program) 2021/03/22 03:44:31 fetching corpus: 6433, signal 274705/323580 (executing program) 2021/03/22 03:44:31 fetching corpus: 6483, signal 275325/324060 (executing program) 2021/03/22 03:44:31 fetching corpus: 6533, signal 275817/324557 (executing program) 2021/03/22 03:44:31 fetching corpus: 6583, signal 276638/325081 (executing program) 2021/03/22 03:44:31 fetching corpus: 6633, signal 277458/325661 (executing program) 2021/03/22 03:44:31 fetching corpus: 6683, signal 278221/326193 (executing program) 2021/03/22 03:44:31 fetching corpus: 6732, signal 278716/326608 (executing program) 2021/03/22 03:44:31 fetching corpus: 6782, signal 279624/327096 (executing program) 2021/03/22 03:44:31 fetching corpus: 6832, signal 280503/327601 (executing program) 2021/03/22 03:44:31 fetching corpus: 6882, signal 281434/328107 (executing program) 2021/03/22 03:44:31 fetching corpus: 6932, signal 282136/328573 (executing program) 2021/03/22 03:44:31 fetching corpus: 6982, signal 282823/329015 (executing program) 2021/03/22 03:44:31 fetching corpus: 7032, signal 283819/329530 (executing program) 2021/03/22 03:44:31 fetching corpus: 7082, signal 284987/330028 (executing program) 2021/03/22 03:44:31 fetching corpus: 7132, signal 285829/330500 (executing program) 2021/03/22 03:44:31 fetching corpus: 7182, signal 286814/330946 (executing program) 2021/03/22 03:44:31 fetching corpus: 7232, signal 287540/331361 (executing program) 2021/03/22 03:44:32 fetching corpus: 7282, signal 287877/331687 (executing program) 2021/03/22 03:44:32 fetching corpus: 7332, signal 288398/332038 (executing program) 2021/03/22 03:44:32 fetching corpus: 7382, signal 288786/332393 (executing program) 2021/03/22 03:44:32 fetching corpus: 7432, signal 289661/332757 (executing program) 2021/03/22 03:44:32 fetching corpus: 7482, signal 290291/333093 (executing program) 2021/03/22 03:44:32 fetching corpus: 7532, signal 290910/333436 (executing program) 2021/03/22 03:44:32 fetching corpus: 7582, signal 291549/333770 (executing program) 2021/03/22 03:44:32 fetching corpus: 7632, signal 292117/334087 (executing program) 2021/03/22 03:44:32 fetching corpus: 7682, signal 292880/334431 (executing program) 2021/03/22 03:44:32 fetching corpus: 7732, signal 293846/334770 (executing program) 2021/03/22 03:44:32 fetching corpus: 7782, signal 294352/335055 (executing program) 2021/03/22 03:44:32 fetching corpus: 7832, signal 295007/335369 (executing program) 2021/03/22 03:44:32 fetching corpus: 7882, signal 296094/335691 (executing program) 2021/03/22 03:44:32 fetching corpus: 7932, signal 296921/335991 (executing program) 2021/03/22 03:44:32 fetching corpus: 7982, signal 297664/336268 (executing program) 2021/03/22 03:44:32 fetching corpus: 8032, signal 298597/336534 (executing program) 2021/03/22 03:44:32 fetching corpus: 8082, signal 299433/336795 (executing program) 2021/03/22 03:44:32 fetching corpus: 8132, signal 300229/337068 (executing program) 2021/03/22 03:44:33 fetching corpus: 8182, signal 301432/337316 (executing program) 2021/03/22 03:44:33 fetching corpus: 8232, signal 301928/337545 (executing program) 2021/03/22 03:44:33 fetching corpus: 8282, signal 302517/337778 (executing program) 2021/03/22 03:44:33 fetching corpus: 8332, signal 303267/338040 (executing program) 2021/03/22 03:44:33 fetching corpus: 8382, signal 303973/338252 (executing program) 2021/03/22 03:44:33 fetching corpus: 8431, signal 305161/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8481, signal 306073/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8531, signal 306604/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8581, signal 307275/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8631, signal 307968/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8681, signal 308547/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8731, signal 308931/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8781, signal 309704/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8831, signal 310257/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8880, signal 311027/338290 (executing program) 2021/03/22 03:44:33 fetching corpus: 8930, signal 311519/338290 (executing program) 2021/03/22 03:44:34 fetching corpus: 8980, signal 312259/338290 (executing program) 2021/03/22 03:44:34 fetching corpus: 9030, signal 312852/338290 (executing program) 2021/03/22 03:44:34 fetching corpus: 9080, signal 313346/338290 (executing program) 2021/03/22 03:44:34 fetching corpus: 9130, signal 314047/338290 (executing program) 2021/03/22 03:44:34 fetching corpus: 9180, signal 314512/338290 (executing program) 2021/03/22 03:44:34 fetching corpus: 9230, signal 315362/338290 (executing program) 2021/03/22 03:44:34 fetching corpus: 9280, signal 316052/338290 (executing program) 2021/03/22 03:44:34 fetching corpus: 9329, signal 316835/338290 (executing program) 2021/03/22 03:44:34 fetching corpus: 9379, signal 317354/338290 (executing program) 2021/03/22 03:44:35 fetching corpus: 9429, signal 318271/338290 (executing program) 2021/03/22 03:44:35 fetching corpus: 9479, signal 318892/338306 (executing program) 2021/03/22 03:44:35 fetching corpus: 9529, signal 319281/338306 (executing program) 2021/03/22 03:44:35 fetching corpus: 9579, signal 319829/338306 (executing program) 2021/03/22 03:44:35 fetching corpus: 9629, signal 320430/338306 (executing program) 2021/03/22 03:44:35 fetching corpus: 9679, signal 321078/338306 (executing program) 2021/03/22 03:44:35 fetching corpus: 9729, signal 321671/338306 (executing program) 2021/03/22 03:44:35 fetching corpus: 9779, signal 322268/338306 (executing program) 2021/03/22 03:44:35 fetching corpus: 9829, signal 322760/338306 (executing program) 2021/03/22 03:44:35 fetching corpus: 9879, signal 323595/338308 (executing program) 2021/03/22 03:44:35 fetching corpus: 9929, signal 324737/338311 (executing program) 2021/03/22 03:44:35 fetching corpus: 9979, signal 325408/338311 (executing program) 2021/03/22 03:44:35 fetching corpus: 10029, signal 326124/338311 (executing program) 2021/03/22 03:44:35 fetching corpus: 10079, signal 326739/338311 (executing program) 2021/03/22 03:44:35 fetching corpus: 10129, signal 327326/338311 (executing program) 2021/03/22 03:44:35 fetching corpus: 10179, signal 327889/338311 (executing program) 2021/03/22 03:44:36 fetching corpus: 10229, signal 329162/338311 (executing program) 2021/03/22 03:44:36 fetching corpus: 10279, signal 329671/338311 (executing program) 2021/03/22 03:44:36 fetching corpus: 10329, signal 330298/338311 (executing program) 2021/03/22 03:44:36 fetching corpus: 10379, signal 331058/338449 (executing program) 2021/03/22 03:44:36 fetching corpus: 10429, signal 331622/338449 (executing program) 2021/03/22 03:44:36 fetching corpus: 10479, signal 332648/338449 (executing program) 2021/03/22 03:44:36 fetching corpus: 10529, signal 333108/338449 (executing program) 2021/03/22 03:44:36 fetching corpus: 10579, signal 333585/338449 (executing program) 2021/03/22 03:44:36 fetching corpus: 10629, signal 334065/338449 (executing program) 2021/03/22 03:44:36 fetching corpus: 10659, signal 334484/338453 (executing program) 2021/03/22 03:44:36 fetching corpus: 10659, signal 334484/338453 (executing program) 2021/03/22 03:44:38 starting 6 fuzzer processes 03:44:38 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x5c, 0x0, 0x1, 0x40b, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x5c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 03:44:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@can_delroute={0x3c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "6cc03f5b81a2e427"}, 0x1}}, @CGW_MOD_UID={0x8, 0xe, 0xee00}, @CGW_CS_XOR={0x8, 0x5, {0x0, 0xfffffffffffffffa}}]}, 0x3c}}, 0x0) 03:44:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0c0583b, &(0x7f0000000000)) close(r0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0xf2, 0x2, 0x74, 0xad, 0x0, 0x10001, 0x5820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x9276c83a5377000f, @perf_config_ext={0x2, 0x5}, 0x0, 0xffff, 0x2, 0x5, 0x0, 0xffffffff, 0x3ff}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x2) close(r1) 03:44:38 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet_pktinfo(r0, 0x10d, 0xa4, 0x0, &(0x7f00000001c0)=0x4) 03:44:39 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b47, &(0x7f0000000240)={0x0, "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"}) [ 49.408525][ T8416] IPVS: ftp: loaded support on port[0] = 21 [ 49.484793][ T8416] chnl_net:caif_netlink_parms(): no params data found [ 49.511117][ T8416] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.518354][ T8416] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.526402][ T8416] device bridge_slave_0 entered promiscuous mode [ 49.533711][ T8416] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.541392][ T8416] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.549295][ T8416] device bridge_slave_1 entered promiscuous mode [ 49.562534][ T8416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.573166][ T8416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.589008][ T8416] team0: Port device team_slave_0 added [ 49.595895][ T8416] team0: Port device team_slave_1 added [ 49.608253][ T8416] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 49.615259][ T8416] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 49.648314][ T8416] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 49.665057][ T8416] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 49.672056][ T8416] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 49.698136][ T8416] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 49.726501][ T8418] IPVS: ftp: loaded support on port[0] = 21 [ 49.754040][ T8420] IPVS: ftp: loaded support on port[0] = 21 [ 49.757199][ T8416] device hsr_slave_0 entered promiscuous mode [ 49.771774][ T8416] device hsr_slave_1 entered promiscuous mode [ 49.849155][ T8418] chnl_net:caif_netlink_parms(): no params data found [ 49.915392][ T8420] chnl_net:caif_netlink_parms(): no params data found [ 49.944784][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.951818][ T8418] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.965482][ T8418] device bridge_slave_0 entered promiscuous mode [ 49.975959][ T8416] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 50.008071][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.015205][ T8418] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.022695][ T8418] device bridge_slave_1 entered promiscuous mode [ 50.034745][ T8416] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 50.043398][ T8416] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 50.070818][ T8420] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.087866][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.096436][ T8420] device bridge_slave_0 entered promiscuous mode [ 50.103868][ T8420] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.106549][ T8422] IPVS: ftp: loaded support on port[0] = 21 [ 50.111009][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.124457][ T8420] device bridge_slave_1 entered promiscuous mode [ 50.130962][ T8416] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 50.139648][ T8418] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.155225][ T8424] IPVS: ftp: loaded support on port[0] = 21 [ 50.162855][ T8420] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.184602][ T8418] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.206340][ T8420] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.233448][ T8420] team0: Port device team_slave_0 added [ 50.242709][ T8418] team0: Port device team_slave_0 added [ 50.262852][ T8418] team0: Port device team_slave_1 added [ 50.287224][ T8420] team0: Port device team_slave_1 added [ 50.293255][ T8416] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.300293][ T8416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.307566][ T8416] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.314588][ T8416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.329574][ T8426] IPVS: ftp: loaded support on port[0] = 21 [ 50.350190][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 50.357251][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.383444][ T8418] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 50.432092][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 50.443920][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.470582][ T8418] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 50.481944][ T8420] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 50.488959][ T8420] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.515007][ T8420] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 50.526981][ T8420] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 50.533913][ T8420] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.559879][ T8420] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 50.576737][ T8424] chnl_net:caif_netlink_parms(): no params data found [ 50.593027][ T4854] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.600762][ T4854] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.616452][ T8416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.651692][ T8420] device hsr_slave_0 entered promiscuous mode [ 50.658296][ T8420] device hsr_slave_1 entered promiscuous mode [ 50.665245][ T8420] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 50.672775][ T8420] Cannot create hsr debugfs directory [ 50.681941][ T8422] chnl_net:caif_netlink_parms(): no params data found [ 50.693414][ T8418] device hsr_slave_0 entered promiscuous mode [ 50.700036][ T8418] device hsr_slave_1 entered promiscuous mode [ 50.706894][ T8418] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 50.714790][ T8418] Cannot create hsr debugfs directory [ 50.725103][ T8416] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.746910][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.754661][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.792133][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.800526][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.809401][ T4818] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.816501][ T4818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.825157][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.833610][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.842393][ T4818] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.849430][ T4818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.857663][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 50.885654][ T8424] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.892703][ T8424] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.900187][ T8424] device bridge_slave_0 entered promiscuous mode [ 50.907198][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 50.916063][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 50.924702][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.933023][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 50.941559][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.950235][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 50.958565][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.966817][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 50.975054][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.983341][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.001473][ T8424] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.008689][ T8424] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.016226][ T8424] device bridge_slave_1 entered promiscuous mode [ 51.049901][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.062327][ T8422] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.070412][ T8422] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.080100][ T8422] device bridge_slave_0 entered promiscuous mode [ 51.089256][ T8422] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.097005][ T8422] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.105605][ T8422] device bridge_slave_1 entered promiscuous mode [ 51.119333][ T8424] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.136606][ T8418] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 51.157623][ T8426] chnl_net:caif_netlink_parms(): no params data found [ 51.168288][ T8424] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.178378][ T8420] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 51.186843][ T8418] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 51.196319][ T8422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.212755][ T8420] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 51.221118][ T8418] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 51.229274][ T8418] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 51.238072][ T8422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.253247][ T8424] team0: Port device team_slave_0 added [ 51.261164][ T8420] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 51.270194][ T8420] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 51.284380][ T8424] team0: Port device team_slave_1 added [ 51.298390][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 51.306219][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 51.320586][ T8422] team0: Port device team_slave_0 added [ 51.339175][ T8416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.363064][ T8426] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.370228][ T8426] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.378714][ T8426] device bridge_slave_0 entered promiscuous mode [ 51.386662][ T8422] team0: Port device team_slave_1 added [ 51.392334][ T8426] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.399929][ T8426] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.407826][ T8426] device bridge_slave_1 entered promiscuous mode [ 51.415051][ T8424] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.422076][ T8424] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.448306][ T8424] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.458979][ T9491] Bluetooth: hci0: command 0x0409 tx timeout [ 51.460639][ T8424] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.472319][ T8424] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.498364][ T8424] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.522117][ T8424] device hsr_slave_0 entered promiscuous mode [ 51.528745][ T8424] device hsr_slave_1 entered promiscuous mode [ 51.535155][ T8424] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 51.542749][ T8424] Cannot create hsr debugfs directory [ 51.567191][ T8426] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.600688][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 51.610505][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.622155][ T8426] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.631754][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.639018][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.665315][ T8422] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.678722][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.685961][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.712187][ T8422] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.713507][ T4854] Bluetooth: hci1: command 0x0409 tx timeout [ 51.764595][ T8422] device hsr_slave_0 entered promiscuous mode [ 51.771204][ T8422] device hsr_slave_1 entered promiscuous mode [ 51.778106][ T8422] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 51.785748][ T9491] Bluetooth: hci2: command 0x0409 tx timeout [ 51.785980][ T8422] Cannot create hsr debugfs directory [ 51.804846][ T8416] device veth0_vlan entered promiscuous mode [ 51.814835][ T8426] team0: Port device team_slave_0 added [ 51.820728][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 51.830424][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.839457][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.848123][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.856617][ T8424] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 51.874350][ T8416] device veth1_vlan entered promiscuous mode [ 51.881132][ T8426] team0: Port device team_slave_1 added [ 51.893439][ T8424] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 51.911209][ T8418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.925535][ T8426] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.932627][ T8426] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.959688][ T8426] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.970804][ T8424] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 51.979636][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 51.987893][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 51.996302][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.004019][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.012630][ T8420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.019384][ T4854] Bluetooth: hci3: command 0x0409 tx timeout [ 52.021415][ T8418] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.035432][ T8426] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 52.042381][ T8426] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 52.068953][ T8426] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 52.084912][ T8424] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 52.099835][ T8420] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.106567][ T9491] Bluetooth: hci4: command 0x0409 tx timeout [ 52.120909][ T8426] device hsr_slave_0 entered promiscuous mode [ 52.127817][ T8426] device hsr_slave_1 entered promiscuous mode [ 52.134726][ T8426] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 52.142341][ T8426] Cannot create hsr debugfs directory [ 52.176932][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.184561][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.191917][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.201412][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.209921][ T9491] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.217032][ T9491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.225140][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.233470][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.241677][ T9491] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.248803][ T9491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.256805][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.265371][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 52.273642][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.281961][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.290703][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.299113][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.307502][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.316098][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.324798][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.332932][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.341085][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.349456][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.357751][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.366186][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.374513][ T9491] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.381525][ T9491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.389261][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.397934][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.406487][ T9491] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.413507][ T9491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.421411][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.430322][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.438976][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.447301][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.455833][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.464136][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.473240][ T4854] Bluetooth: hci5: command 0x0409 tx timeout [ 52.479855][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.487801][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.495936][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.503555][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.512178][ T8416] device veth0_macvtap entered promiscuous mode [ 52.524724][ T8416] device veth1_macvtap entered promiscuous mode [ 52.534555][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.558576][ T9652] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 52.566749][ T9652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 52.576005][ T9652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.585278][ T9652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.602347][ T8420] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.614365][ T8420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.626672][ T8416] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 52.639220][ T8416] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 52.650234][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.660006][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.668297][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.678613][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.687304][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.696739][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.706732][ T8422] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 52.734647][ T8416] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.743359][ T8416] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.754860][ T8416] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.763703][ T8416] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.774082][ T8422] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 52.788755][ T8420] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.796326][ T9652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 52.804545][ T9652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 52.811907][ T9652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 52.819494][ T9652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 52.827806][ T8418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.836561][ T8426] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 52.851279][ T8422] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 52.859499][ T8422] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 52.878316][ T8426] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 52.887390][ T8426] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 52.904222][ T8426] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 52.926973][ T8424] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.945320][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 52.954662][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.018844][ T8420] device veth0_vlan entered promiscuous mode [ 53.031002][ T8420] device veth1_vlan entered promiscuous mode [ 53.041788][ T8422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.051473][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 53.062771][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 53.071375][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 53.079627][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.088803][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 53.097160][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.105704][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 53.113612][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.121494][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.129402][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 53.137785][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.145891][ T4854] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.158989][ T8426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.170312][ T8418] device veth0_vlan entered promiscuous mode [ 53.184269][ T8424] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.184798][ T270] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 53.199780][ T270] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 53.199977][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 53.216423][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 53.224724][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.232979][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 53.241123][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.249076][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.256895][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.265598][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.274090][ T8922] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.281174][ T8922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.289033][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.297620][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.305813][ T8922] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.312917][ T8922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.325872][ T8426] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.345775][ T8422] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.355853][ T8418] device veth1_vlan entered promiscuous mode [ 53.364722][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.372224][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.394298][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 53.402250][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.421383][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.429387][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.438962][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.469812][ T8424] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.480358][ T8424] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.495079][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 53.502809][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.513207][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.521659][ T3741] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.528695][ T3741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.537583][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.543840][ T35] Bluetooth: hci0: command 0x041b tx timeout [ 53.546581][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.560212][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.568803][ T3741] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.575863][ T3741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.584169][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.592448][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.601450][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.610378][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.619457][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.628442][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.637443][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.645981][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.654627][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.662868][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.671566][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.680414][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.689098][ T3741] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.696137][ T3741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.704683][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.712542][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.720912][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.728792][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.748190][ T8418] device veth0_macvtap entered promiscuous mode [ 53.759689][ T8418] device veth1_macvtap entered promiscuous mode [ 53.768159][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.776808][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.785587][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.792593][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.800476][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.809296][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.817964][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.826605][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 53.835138][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 53.843343][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 53.851802][ T35] Bluetooth: hci1: command 0x041b tx timeout [ 53.859286][ T9197] Bluetooth: hci2: command 0x041b tx timeout [ 53.866638][ T8424] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.887145][ T8420] device veth0_macvtap entered promiscuous mode [ 53.902169][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 53.913468][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 53.925665][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 53.933028][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.941154][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 53.949150][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.957598][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.966075][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.974261][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.982345][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.990786][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.999029][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 54.006578][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 54.014358][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.022673][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.031143][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.039981][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.048461][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.056998][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.065575][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.074120][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 54.082642][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.092894][ T8426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.103817][ T4854] Bluetooth: hci3: command 0x041b tx timeout [ 54.109423][ T8420] device veth1_macvtap entered promiscuous mode [ 54.121794][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 54.132087][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.142286][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.151321][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.159682][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 03:44:44 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x5c, 0x0, 0x1, 0x40b, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x5c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) [ 54.168145][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.176760][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.185401][ T9197] Bluetooth: hci4: command 0x041b tx timeout [ 54.194546][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 54.211404][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 54.230190][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 54.239152][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.259256][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 54.268600][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 54.276777][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 54.285604][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 54.300551][ T8418] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.313305][ T8418] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.323950][ T8418] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.332725][ T8418] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.361635][ T8422] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.378096][ T9755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 54.385714][ T9755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 54.406004][ T8426] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.413290][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 54.425747][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 54.436623][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 54.447134][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 54.458036][ T8420] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 54.473656][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 54.482029][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.490684][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 54.499395][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.503906][ T9197] Bluetooth: hci5: command 0x041b tx timeout [ 54.508263][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 54.522031][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.543641][ T8424] device veth0_vlan entered promiscuous mode [ 54.550254][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 54.560537][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.571181][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.580402][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.589174][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 54.603095][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 54.615290][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 54.625786][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 54.636710][ T8420] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 54.673651][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 54.682093][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 54.694614][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 54.702627][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.712069][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.720268][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.730880][ T8424] device veth1_vlan entered promiscuous mode [ 54.739284][ T8420] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.751295][ T8420] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.762871][ T8420] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.774842][ T8420] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.793768][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 54.803705][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 54.811259][ T8426] device veth0_vlan entered promiscuous mode [ 54.820659][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 54.829343][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.838031][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 54.845829][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 54.853962][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.873621][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.881359][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.889050][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.897488][ T9678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.907174][ T8422] device veth0_vlan entered promiscuous mode [ 54.919838][ T8424] device veth0_macvtap entered promiscuous mode [ 54.940846][ T8422] device veth1_vlan entered promiscuous mode [ 54.959183][ T8426] device veth1_vlan entered promiscuous mode [ 54.970943][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 54.981549][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 54.997571][ T8424] device veth1_macvtap entered promiscuous mode [ 55.016965][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 55.029666][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 55.037890][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 55.047185][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.056343][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 55.065928][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 03:44:45 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x5c, 0x0, 0x1, 0x40b, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x5c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) [ 55.074671][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.087888][ T8426] device veth0_macvtap entered promiscuous mode [ 55.114145][ T270] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 55.134551][ T270] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 55.138247][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.173691][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.193630][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.223543][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.233351][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.253544][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.279334][ T8424] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.290349][ T8426] device veth1_macvtap entered promiscuous mode [ 55.300762][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 55.309222][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.317375][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 55.325273][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 55.333993][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.342356][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 03:44:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@can_delroute={0x3c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "6cc03f5b81a2e427"}, 0x1}}, @CGW_MOD_UID={0x8, 0xe, 0xee00}, @CGW_CS_XOR={0x8, 0x5, {0x0, 0xfffffffffffffffa}}]}, 0x3c}}, 0x0) [ 55.351108][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.360630][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 55.370467][ T8422] device veth0_macvtap entered promiscuous mode [ 55.383846][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 55.397086][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 55.404955][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.416779][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 55.428106][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.438280][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 55.449080][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.460628][ T8424] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 55.482138][ T8422] device veth1_macvtap entered promiscuous mode [ 55.489058][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 55.499160][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.508025][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 55.517475][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 55.526391][ T8922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.539714][ T8424] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.549061][ T8424] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.561061][ T8424] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.573115][ T8424] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 03:44:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@can_delroute={0x3c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "6cc03f5b81a2e427"}, 0x1}}, @CGW_MOD_UID={0x8, 0xe, 0xee00}, @CGW_CS_XOR={0x8, 0x5, {0x0, 0xfffffffffffffffa}}]}, 0x3c}}, 0x0) [ 55.605507][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.616551][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.623628][ T9197] Bluetooth: hci0: command 0x040f tx timeout [ 55.630262][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.645158][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.655732][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.666562][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.676647][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.687472][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.700109][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.709381][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.725810][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.737701][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.748701][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.758720][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.769382][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.780040][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.790821][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.790928][ T9831] loop2: detected capacity change from 0 to 8 [ 55.801093][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 55.818218][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.829215][ T8426] batman_adv: batadv0: Interface activated: batadv_slave_0 03:44:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) [ 55.851256][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.864295][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.872947][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.883971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.894880][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 55.908105][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.918138][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 55.929208][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.939326][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 55.943625][ T9805] Bluetooth: hci2: command 0x040f tx timeout 03:44:45 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x5c, 0x0, 0x1, 0x40b, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x5c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) [ 55.950034][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.958544][ T9805] Bluetooth: hci1: command 0x040f tx timeout [ 55.965867][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 55.982248][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.993466][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.002360][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 56.021303][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.031660][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 56.044410][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.055979][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 56.067486][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.078535][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 56.090179][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.102203][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 56.115093][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.126556][ T8426] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.146011][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 03:44:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@can_delroute={0x3c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "6cc03f5b81a2e427"}, 0x1}}, @CGW_MOD_UID={0x8, 0xe, 0xee00}, @CGW_CS_XOR={0x8, 0x5, {0x0, 0xfffffffffffffffa}}]}, 0x3c}}, 0x0) [ 56.157630][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.173886][ T35] Bluetooth: hci3: command 0x040f tx timeout [ 56.189319][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 56.206269][ T9849] loop2: detected capacity change from 0 to 8 [ 56.218979][ T4818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.234543][ T8422] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.262610][ T8422] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.263435][ T35] Bluetooth: hci4: command 0x040f tx timeout [ 56.293460][ T8422] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.302267][ T8422] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.323309][ T8426] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.363134][ T8426] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.375585][ T8426] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.387274][ T8426] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 03:44:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) [ 56.453691][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.481950][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.519884][ T270] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.535723][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 56.537479][ T9884] loop2: detected capacity change from 0 to 8 [ 56.549540][ T9879] loop1: detected capacity change from 0 to 8 [ 56.551573][ T270] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.572701][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.581388][ T3129] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.593632][ T9805] Bluetooth: hci5: command 0x040f tx timeout [ 56.607815][ T3129] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.615499][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.623180][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.632366][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.640046][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 56.641691][ T2016] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.670687][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 56.699002][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 56.710214][ T2016] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.726165][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 56.745585][ T3741] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 57.399570][ C1] hrtimer: interrupt took 26152 ns 03:44:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0c0583b, &(0x7f0000000000)) close(r0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0xf2, 0x2, 0x74, 0xad, 0x0, 0x10001, 0x5820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x9276c83a5377000f, @perf_config_ext={0x2, 0x5}, 0x0, 0xffff, 0x2, 0x5, 0x0, 0xffffffff, 0x3ff}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x2) close(r1) 03:44:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd010000000000000100000000000000dc01", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:47 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet_pktinfo(r0, 0x10d, 0xa4, 0x0, &(0x7f00000001c0)=0x4) 03:44:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b47, &(0x7f0000000240)={0x0, "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"}) 03:44:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) [ 57.701841][ T4847] Bluetooth: hci0: command 0x0419 tx timeout [ 57.719515][ T9967] loop1: detected capacity change from 0 to 8 [ 57.727462][ T9968] loop2: detected capacity change from 0 to 8 [ 57.748284][ T9971] loop0: detected capacity change from 0 to 8 03:44:47 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet_pktinfo(r0, 0x10d, 0xa4, 0x0, &(0x7f00000001c0)=0x4) 03:44:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b47, &(0x7f0000000240)={0x0, "61ce4b320f96e45a622adcdb32777e872598a4ccb3855253e75e016e0e9456c1f94d88447b275a859154f03a4d1178b08328a70d9c2f3e3b7542577fea2261cce5c308be559451d61e798e49ca079581d9c08b5b779f2d74828d54d5b5aa1faeefbd8bbf03911647263e8948034537166455e874aecac66ff441b21def4b1cb4a91882332f74a7d6643d5ccabb989100ca7d7815c88f54ace772cf6eddc8fc4844aa17d592c52868935998ce18f91a2c3cd83b2f24668bb4ad4099e4c390ecfb62def483e7c857524baad01db40787ac4a1276ee984a2597313a3d28b3a78645aea5de13c831adc7345ba7e65d249411f669e6b56f4626acc70a32dfe308e16d1d7e337a13fe5cf1f7e0950b89ae3540fd1ae1bf3aeddd29c7b9b8bc84abb02267c8b32bf9a42e7ae69ea71e0c7bed7199771a9f9557334515dbf49c93590c59d07682b4e11c8504d64560c59d8f46862a10b921c9350b76b4f58501cd97f5c1ba97956559775b6b2efaf03340af9d1f42878226ca10af516bbdadb9541f7395bbe7c2c1a36ec726c0abfcafca96e9fcdd1a820469a9247f783415afbdb9fd9d35183840776e50e47ca16651fd0e2932de27c1d26211e8f9143683caba8e12297108b1f99ec50ccfa6cde4a924f348910f18b474dd514642443347f790bf4112d111d7a7ab5096655bd8482c06f5d01ac972331d53cf73342c3e4eb23f3e40fd"}) 03:44:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0c0583b, &(0x7f0000000000)) close(r0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0xf2, 0x2, 0x74, 0xad, 0x0, 0x10001, 0x5820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x9276c83a5377000f, @perf_config_ext={0x2, 0x5}, 0x0, 0xffff, 0x2, 0x5, 0x0, 0xffffffff, 0x3ff}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x2) close(r1) [ 57.920143][ T9992] loop1: detected capacity change from 0 to 8 03:44:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b47, &(0x7f0000000240)={0x0, "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"}) [ 58.024101][ T4854] Bluetooth: hci1: command 0x0419 tx timeout [ 58.031778][ T4854] Bluetooth: hci2: command 0x0419 tx timeout [ 58.067671][T10002] loop0: detected capacity change from 0 to 8 03:44:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0c0583b, &(0x7f0000000000)) close(r0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0xf2, 0x2, 0x74, 0xad, 0x0, 0x10001, 0x5820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x9276c83a5377000f, @perf_config_ext={0x2, 0x5}, 0x0, 0xffff, 0x2, 0x5, 0x0, 0xffffffff, 0x3ff}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x2) close(r1) 03:44:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:48 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet_pktinfo(r0, 0x10d, 0xa4, 0x0, &(0x7f00000001c0)=0x4) 03:44:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0c0583b, &(0x7f0000000000)) close(r0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0xf2, 0x2, 0x74, 0xad, 0x0, 0x10001, 0x5820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x9276c83a5377000f, @perf_config_ext={0x2, 0x5}, 0x0, 0xffff, 0x2, 0x5, 0x0, 0xffffffff, 0x3ff}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x2) close(r1) [ 58.253519][ T9197] Bluetooth: hci3: command 0x0419 tx timeout 03:44:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0x1}, 0x14}}, 0x0) [ 58.308068][T10018] loop5: detected capacity change from 0 to 8 [ 58.333241][ T9197] Bluetooth: hci4: command 0x0419 tx timeout 03:44:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) [ 58.374208][T10023] loop0: detected capacity change from 0 to 8 [ 58.391801][T10024] loop1: detected capacity change from 0 to 8 03:44:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0x1}, 0x14}}, 0x0) 03:44:48 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "540883", 0x10, 0x3c, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0xc9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "4c58da", 0x0, "e3b54b"}}}}}}}, 0x0) 03:44:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0c0583b, &(0x7f0000000000)) close(r0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0xf2, 0x2, 0x74, 0xad, 0x0, 0x10001, 0x5820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x9276c83a5377000f, @perf_config_ext={0x2, 0x5}, 0x0, 0xffff, 0x2, 0x5, 0x0, 0xffffffff, 0x3ff}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x2) close(r1) 03:44:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0x1}, 0x14}}, 0x0) [ 58.561473][T10041] loop5: detected capacity change from 0 to 8 03:44:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) 03:44:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0x1}, 0x14}}, 0x0) 03:44:48 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "540883", 0x10, 0x3c, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0xc9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "4c58da", 0x0, "e3b54b"}}}}}}}, 0x0) [ 58.658252][ T4854] Bluetooth: hci5: command 0x0419 tx timeout 03:44:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd010000000000000100000000000000dc01", 0x200}], 0x0, &(0x7f0000010200)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x400, 0x1, &(0x7f00000004c0)) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r2, &(0x7f0000005200)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@generic={0x0, "27b47c200224381c74ac51a589f64864dacb9e7aeddee0a9fa6f353010f549e9802cd7ae777ee35e114d12dff5e92302a7804be96ebfc263fe3253ea417565ec514b2d5176c5a336aabe2c0d57d47e1264d45295ee23de6a7dc36096e44de886cf20f90b307cd25bb772b234dde169ff146353dc13ff5c95b1acda88beab"}, 0x80, 0x0, 0x0, &(0x7f0000005340)=ANY=[], 0x448}}], 0x2, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x5) fcntl$addseals(r2, 0x409, 0xb) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1831001}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xfffffffa}, @ETHTOOL_A_LINKMODES_OURS={0x8c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8a3a908def42eedf203c65a755f2bbcb0ce2c9f99f0a97ea84652ea070973b28ffe00c8a05b8208fb6db16bd679666b090a818d614728f083943f85d24bf21f70de5bad2ab1021ea6d92cb9566972aa6b198c888cc6f683294cb3408dcf70b162abe842f36c4318dd1c4c70ad02c40925b7783eb5b65db249dba6b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_OURS={0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0xc4}, 0x1, 0x0, 0x0, 0x400c001}, 0x8000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40046f41, 0x76006e) [ 58.700069][T10057] loop1: detected capacity change from 0 to 8 03:44:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0c0583b, &(0x7f0000000000)) close(r0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0xf2, 0x2, 0x74, 0xad, 0x0, 0x10001, 0x5820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x9276c83a5377000f, @perf_config_ext={0x2, 0x5}, 0x0, 0xffff, 0x2, 0x5, 0x0, 0xffffffff, 0x3ff}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x2) close(r1) 03:44:48 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "540883", 0x10, 0x3c, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0xc9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "4c58da", 0x0, "e3b54b"}}}}}}}, 0x0) 03:44:48 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="fc7f481257d8f1e9ca585b4d10cf52f7fe57c1e4695d3399d79453ac1564486abf256850ee0e2205b1f5b90ac8b099b9a6990cd2e096b80bdd40e13820413deecaa892133be3d1a660dae05d7eaac805903c7671b61ff11edee63a5fffad7437220a0002a5309f4c736c908266095b513e30e65f927d94615e2ac9333bf746dd3e322c526e48fa249c28b379b53f8a6170ee592326ad65c7be3dabbca548dbff7aee780f635c3224d3340c44e4b276ca8cd79d2f1a03a864179223dd5cb1b643d33e6aff9f0de4d39e2b03921b5606e668cbeb2c3bb63d6aa536f0a57a36a9e8f32a59de88d66269e32141", 0xeb, 0x100}]) [ 58.845325][T10070] loop5: detected capacity change from 0 to 8 03:44:48 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "540883", 0x10, 0x3c, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0xc9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "4c58da", 0x0, "e3b54b"}}}}}}}, 0x0) [ 58.917323][T10081] loop1: detected capacity change from 0 to 8 [ 58.923950][T10085] loop4: detected capacity change from 0 to 1 03:44:48 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c6530204767cc5244e2c8be01001a105d72b9e241ffb699c22341a5f7b517803180a7a210dfb3ebd3ce31f826de64c0ab2b417713f032100e2efa8daedb5e74b883fcb01cd1badab3f5ff155d1e16a09b8f73334bb21ce0083b4356dfb03c65b45304cae965c2b46cef4f7a848e7dd1c24ef7e2ad01c297614940dcf87a6197af6c349a5911cc150fa44d"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getpgid(0x0) open(&(0x7f0000000240)='./file0\x00', 0x121880, 0x20) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 58.979147][T10085] Dev loop4: unable to read RDB block 1 [ 59.007017][T10085] loop4: unable to read partition table [ 59.045761][T10085] loop4: partition table beyond EOD, truncated [ 59.077953][T10085] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 59.148841][T10085] loop4: detected capacity change from 0 to 1 03:44:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 03:44:49 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d000000010000611cad49e10000001e000000000000000010ec030200010052654973457233467300000002000000020001000000853d0100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003ac1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/1984, 0x7c0, 0x11000}, {&(0x7f0000010900)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x800, 0x11800}, {&(0x7f0000011100)="0000000000000000000000001200000000000000843d000000010000611cad49e10000001e00"/64, 0x40, 0x3d96000}, {&(0x7f0000011200)="01000200750f0000000000000000000000000000000000000100000002000000000000000000000000002000e00f0000010000000200000001000000f401000002002300bd0f00"/96, 0x60, 0x3d97000}, {&(0x7f0000011300)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003ac1655f3ac1655f3ac1655f01000000ffffffff", 0x60, 0x3d97fa0}], 0x0, &(0x7f0000011400)) 03:44:49 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 03:44:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 59.193430][T10085] Dev loop4: unable to read RDB block 1 [ 59.199045][T10085] loop4: unable to read partition table [ 59.211269][T10085] loop4: partition table beyond EOD, truncated [ 59.228563][T10085] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:44:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$adfs(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) [ 59.266911][T10112] device team0 entered promiscuous mode [ 59.298885][T10112] device team_slave_0 entered promiscuous mode 03:44:49 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="fc7f481257d8f1e9ca585b4d10cf52f7fe57c1e4695d3399d79453ac1564486abf256850ee0e2205b1f5b90ac8b099b9a6990cd2e096b80bdd40e13820413deecaa892133be3d1a660dae05d7eaac805903c7671b61ff11edee63a5fffad7437220a0002a5309f4c736c908266095b513e30e65f927d94615e2ac9333bf746dd3e322c526e48fa249c28b379b53f8a6170ee592326ad65c7be3dabbca548dbff7aee780f635c3224d3340c44e4b276ca8cd79d2f1a03a864179223dd5cb1b643d33e6aff9f0de4d39e2b03921b5606e668cbeb2c3bb63d6aa536f0a57a36a9e8f32a59de88d66269e32141", 0xeb, 0x100}]) [ 59.315155][T10112] device team_slave_1 entered promiscuous mode 03:44:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 59.344399][T10112] device team0 left promiscuous mode [ 59.349786][T10112] device team_slave_0 left promiscuous mode [ 59.358953][T10124] loop3: detected capacity change from 0 to 252287 [ 59.360940][T10112] device team_slave_1 left promiscuous mode 03:44:49 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 03:44:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$adfs(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) [ 59.464885][T10124] REISERFS (device loop3): found reiserfs format "3.5" with non-standard journal [ 59.474772][T10137] loop4: detected capacity change from 0 to 1 [ 59.488067][T10124] REISERFS (device loop3): using ordered data mode [ 59.501155][T10124] reiserfs: using flush barriers 03:44:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 03:44:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$adfs(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) [ 59.513969][T10124] REISERFS (device loop3): journal params: device loop3, size 15748, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 59.547559][T10145] device team0 entered promiscuous mode [ 59.549949][T10124] REISERFS (device loop3): checking transaction log (loop3) [ 59.562605][T10145] device team_slave_0 entered promiscuous mode [ 59.573255][T10137] Dev loop4: unable to read RDB block 1 [ 59.585712][T10137] loop4: unable to read partition table [ 59.588263][T10145] device team_slave_1 entered promiscuous mode [ 59.596410][T10137] loop4: partition table beyond EOD, truncated [ 59.620198][T10145] device team0 left promiscuous mode [ 59.628491][T10137] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 59.640468][T10145] device team_slave_0 left promiscuous mode [ 59.688177][T10145] device team_slave_1 left promiscuous mode [ 60.988568][ C1] ================================================================== [ 60.996671][ C1] BUG: KCSAN: data-race in wbt_done / wbt_issue [ 61.002910][ C1] [ 61.005231][ C1] write to 0xffff888102615930 of 8 bytes by task 2020 on cpu 0: [ 61.012845][ C1] wbt_issue+0x9e/0xd0 [ 61.016904][ C1] __rq_qos_issue+0x3b/0x70 [ 61.021393][ C1] blk_mq_start_request+0xd0/0x230 [ 61.026595][ C1] loop_queue_rq+0x3c/0x230 [ 61.031123][ C1] blk_mq_dispatch_rq_list+0x570/0xe80 [ 61.036584][ C1] blk_mq_do_dispatch_sched+0x370/0x610 [ 61.042133][ C1] __blk_mq_sched_dispatch_requests+0x1fd/0x2a0 [ 61.048382][ C1] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 61.054366][ C1] __blk_mq_run_hw_queue+0xc1/0x140 [ 61.059567][ C1] blk_mq_run_work_fn+0x3d/0x50 [ 61.064405][ C1] process_one_work+0x3e1/0x950 [ 61.069243][ C1] worker_thread+0x616/0xa70 [ 61.073829][ C1] kthread+0x20b/0x230 [ 61.077885][ C1] ret_from_fork+0x1f/0x30 [ 61.082298][ C1] [ 61.084622][ C1] read to 0xffff888102615930 of 8 bytes by interrupt on cpu 1: [ 61.092146][ C1] wbt_done+0x50/0x1c0 [ 61.096211][ C1] __rq_qos_done+0x3b/0x70 [ 61.100620][ C1] blk_mq_free_request+0x27b/0x330 [ 61.105725][ C1] __blk_mq_end_request+0x214/0x230 [ 61.110930][ C1] blk_mq_end_request+0x37/0x50 [ 61.115775][ C1] lo_complete_rq+0xca/0x180 [ 61.120366][ C1] blk_done_softirq+0x69/0x90 [ 61.125041][ C1] __do_softirq+0x13c/0x2c3 [ 61.129544][ C1] run_ksoftirqd+0x13/0x20 [ 61.133962][ C1] smpboot_thread_fn+0x34f/0x520 [ 61.138918][ C1] kthread+0x20b/0x230 [ 61.142986][ C1] ret_from_fork+0x1f/0x30 [ 61.147384][ C1] [ 61.149688][ C1] Reported by Kernel Concurrency Sanitizer on: [ 61.152348][T10124] REISERFS warning: reiserfs-5093 is_leaf: item entry count seems wrong *3.5*[1 2 0(1) DIR], item_len 35, item_location 4029, free_space(entry_count) 2 [ 61.155821][ C1] CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 5.12.0-rc3-syzkaller #0 [ 61.155838][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.155848][ C1] ================================================================== [ 61.197612][T10124] REISERFS error (device loop3): vs-5150 search_by_key: invalid format found in block 15767. Fsck? [ 61.208316][T10124] REISERFS (device loop3): Remounting filesystem read-only [ 61.215771][T10124] REISERFS error (device loop3): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 61.229671][T10124] REISERFS (device loop3): Using rupasov hash to sort names [ 61.237634][T10124] REISERFS (device loop3): using 3.5.x disk format 03:44:51 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c6530204767cc5244e2c8be01001a105d72b9e241ffb699c22341a5f7b517803180a7a210dfb3ebd3ce31f826de64c0ab2b417713f032100e2efa8daedb5e74b883fcb01cd1badab3f5ff155d1e16a09b8f73334bb21ce0083b4356dfb03c65b45304cae965c2b46cef4f7a848e7dd1c24ef7e2ad01c297614940dcf87a6197af6c349a5911cc150fa44d"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getpgid(0x0) open(&(0x7f0000000240)='./file0\x00', 0x121880, 0x20) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 03:44:51 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 03:44:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$adfs(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 03:44:51 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 03:44:51 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="fc7f481257d8f1e9ca585b4d10cf52f7fe57c1e4695d3399d79453ac1564486abf256850ee0e2205b1f5b90ac8b099b9a6990cd2e096b80bdd40e13820413deecaa892133be3d1a660dae05d7eaac805903c7671b61ff11edee63a5fffad7437220a0002a5309f4c736c908266095b513e30e65f927d94615e2ac9333bf746dd3e322c526e48fa249c28b379b53f8a6170ee592326ad65c7be3dabbca548dbff7aee780f635c3224d3340c44e4b276ca8cd79d2f1a03a864179223dd5cb1b643d33e6aff9f0de4d39e2b03921b5606e668cbeb2c3bb63d6aa536f0a57a36a9e8f32a59de88d66269e32141", 0xeb, 0x100}]) 03:44:51 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d000000010000611cad49e10000001e000000000000000010ec030200010052654973457233467300000002000000020001000000853d0100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003ac1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/1984, 0x7c0, 0x11000}, {&(0x7f0000010900)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x800, 0x11800}, {&(0x7f0000011100)="0000000000000000000000001200000000000000843d000000010000611cad49e10000001e00"/64, 0x40, 0x3d96000}, {&(0x7f0000011200)="01000200750f0000000000000000000000000000000000000100000002000000000000000000000000002000e00f0000010000000200000001000000f401000002002300bd0f00"/96, 0x60, 0x3d97000}, {&(0x7f0000011300)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003ac1655f3ac1655f3ac1655f01000000ffffffff", 0x60, 0x3d97fa0}], 0x0, &(0x7f0000011400)) [ 62.038468][T10175] loop3: detected capacity change from 0 to 252287 [ 62.050078][T10174] device team0 entered promiscuous mode [ 62.065360][T10178] loop4: detected capacity change from 0 to 1 [ 62.076894][T10175] REISERFS (device loop3): found reiserfs format "3.5" with non-standard journal 03:44:52 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c6530204767cc5244e2c8be01001a105d72b9e241ffb699c22341a5f7b517803180a7a210dfb3ebd3ce31f826de64c0ab2b417713f032100e2efa8daedb5e74b883fcb01cd1badab3f5ff155d1e16a09b8f73334bb21ce0083b4356dfb03c65b45304cae965c2b46cef4f7a848e7dd1c24ef7e2ad01c297614940dcf87a6197af6c349a5911cc150fa44d"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getpgid(0x0) open(&(0x7f0000000240)='./file0\x00', 0x121880, 0x20) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 62.090550][T10174] device team_slave_0 entered promiscuous mode [ 62.105003][T10175] REISERFS (device loop3): using ordered data mode [ 62.111853][T10175] reiserfs: using flush barriers [ 62.117975][T10174] device team_slave_1 entered promiscuous mode [ 62.128127][T10174] device team0 left promiscuous mode [ 62.134161][T10174] device team_slave_0 left promiscuous mode [ 62.140159][T10174] device team_slave_1 left promiscuous mode [ 62.146752][T10175] REISERFS (device loop3): journal params: device loop3, size 15748, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 62.160908][T10179] device team0 entered promiscuous mode [ 62.164739][T10175] REISERFS (device loop3): checking transaction log (loop3) [ 62.175765][T10178] Dev loop4: unable to read RDB block 1 [ 62.182429][T10179] device team_slave_0 entered promiscuous mode [ 62.197696][T10178] loop4: unable to read partition table [ 62.215212][T10179] device team_slave_1 entered promiscuous mode [ 62.227948][T10178] loop4: partition table beyond EOD, truncated [ 62.243155][T10179] device team0 left promiscuous mode [ 62.254345][T10178] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:44:52 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 03:44:52 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="fc7f481257d8f1e9ca585b4d10cf52f7fe57c1e4695d3399d79453ac1564486abf256850ee0e2205b1f5b90ac8b099b9a6990cd2e096b80bdd40e13820413deecaa892133be3d1a660dae05d7eaac805903c7671b61ff11edee63a5fffad7437220a0002a5309f4c736c908266095b513e30e65f927d94615e2ac9333bf746dd3e322c526e48fa249c28b379b53f8a6170ee592326ad65c7be3dabbca548dbff7aee780f635c3224d3340c44e4b276ca8cd79d2f1a03a864179223dd5cb1b643d33e6aff9f0de4d39e2b03921b5606e668cbeb2c3bb63d6aa536f0a57a36a9e8f32a59de88d66269e32141", 0xeb, 0x100}]) [ 62.301548][T10179] device team_slave_0 left promiscuous mode [ 62.308268][T10179] device team_slave_1 left promiscuous mode 03:44:52 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 62.400464][T10200] device team0 entered promiscuous mode [ 62.406097][T10200] device team_slave_0 entered promiscuous mode [ 62.412285][T10200] device team_slave_1 entered promiscuous mode [ 62.420769][T10200] device team0 left promiscuous mode [ 62.427159][T10200] device team_slave_0 left promiscuous mode [ 62.433304][T10200] device team_slave_1 left promiscuous mode 03:44:52 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c6530204767cc5244e2c8be01001a105d72b9e241ffb699c22341a5f7b517803180a7a210dfb3ebd3ce31f826de64c0ab2b417713f032100e2efa8daedb5e74b883fcb01cd1badab3f5ff155d1e16a09b8f73334bb21ce0083b4356dfb03c65b45304cae965c2b46cef4f7a848e7dd1c24ef7e2ad01c297614940dcf87a6197af6c349a5911cc150fa44d"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getpgid(0x0) open(&(0x7f0000000240)='./file0\x00', 0x121880, 0x20) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 62.448095][T10202] loop4: detected capacity change from 0 to 1 [ 62.460048][T10203] ptrace attach of ""[10199] was attempted by "/root/syz-executor.2"[10203] [ 62.466247][T10207] device team0 entered promiscuous mode [ 62.474619][T10207] device team_slave_0 entered promiscuous mode [ 62.481032][T10207] device team_slave_1 entered promiscuous mode [ 62.491553][T10207] device team0 left promiscuous mode 03:44:52 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 62.497843][T10202] Dev loop4: unable to read RDB block 1 [ 62.504637][T10202] loop4: unable to read partition table [ 62.510571][T10207] device team_slave_0 left promiscuous mode [ 62.517931][T10202] loop4: partition table beyond EOD, truncated [ 62.524653][T10207] device team_slave_1 left promiscuous mode [ 62.530653][T10202] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 62.625309][T10214] device team0 entered promiscuous mode [ 62.666122][T10214] device team_slave_0 entered promiscuous mode [ 62.693154][T10214] device team_slave_1 entered promiscuous mode [ 62.699872][T10214] device team0 left promiscuous mode [ 62.715169][T10214] device team_slave_0 left promiscuous mode [ 62.722976][T10214] device team_slave_1 left promiscuous mode [ 63.576944][T10175] REISERFS warning: reiserfs-5093 is_leaf: item entry count seems wrong *3.5*[1 2 0(1) DIR], item_len 35, item_location 4029, free_space(entry_count) 2 [ 63.592419][T10175] REISERFS error (device loop3): vs-5150 search_by_key: invalid format found in block 15767. Fsck? [ 63.603191][T10175] REISERFS (device loop3): Remounting filesystem read-only [ 63.610380][T10175] REISERFS error (device loop3): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 63.624709][T10175] REISERFS (device loop3): Using rupasov hash to sort names [ 63.632001][T10175] REISERFS (device loop3): using 3.5.x disk format [ 64.742891][ T3245] ieee802154 phy0 wpan0: encryption failed: -22 [ 64.749221][ T3245] ieee802154 phy1 wpan1: encryption failed: -22 03:44:55 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c6530204767cc5244e2c8be01001a105d72b9e241ffb699c22341a5f7b517803180a7a210dfb3ebd3ce31f826de64c0ab2b417713f032100e2efa8daedb5e74b883fcb01cd1badab3f5ff155d1e16a09b8f73334bb21ce0083b4356dfb03c65b45304cae965c2b46cef4f7a848e7dd1c24ef7e2ad01c297614940dcf87a6197af6c349a5911cc150fa44d"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getpgid(0x0) open(&(0x7f0000000240)='./file0\x00', 0x121880, 0x20) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 03:44:55 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 03:44:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x34}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:44:55 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c6530204767cc5244e2c8be01001a105d72b9e241ffb699c22341a5f7b517803180a7a210dfb3ebd3ce31f826de64c0ab2b417713f032100e2efa8daedb5e74b883fcb01cd1badab3f5ff155d1e16a09b8f73334bb21ce0083b4356dfb03c65b45304cae965c2b46cef4f7a848e7dd1c24ef7e2ad01c297614940dcf87a6197af6c349a5911cc150fa44d"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getpgid(0x0) open(&(0x7f0000000240)='./file0\x00', 0x121880, 0x20) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 03:44:55 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 03:44:55 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d000000010000611cad49e10000001e000000000000000010ec030200010052654973457233467300000002000000020001000000853d0100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003ac1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/1984, 0x7c0, 0x11000}, {&(0x7f0000010900)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x800, 0x11800}, {&(0x7f0000011100)="0000000000000000000000001200000000000000843d000000010000611cad49e10000001e00"/64, 0x40, 0x3d96000}, {&(0x7f0000011200)="01000200750f0000000000000000000000000000000000000100000002000000000000000000000000002000e00f0000010000000200000001000000f401000002002300bd0f00"/96, 0x60, 0x3d97000}, {&(0x7f0000011300)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003ac1655f3ac1655f3ac1655f01000000ffffffff", 0x60, 0x3d97fa0}], 0x0, &(0x7f0000011400)) 03:44:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x34}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:44:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000001c0)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x2}, 0x190) [ 65.082723][T10231] device team0 entered promiscuous mode [ 65.088490][T10231] device team_slave_0 entered promiscuous mode [ 65.095501][T10231] device team_slave_1 entered promiscuous mode [ 65.117693][T10235] loop3: detected capacity change from 0 to 252287 03:44:55 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001580)={@private0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x0, 0x0, 0x18}, @generic={0x1, "a374fecd17754636cb0b803d22f8"}, @llc={0x1a, 0xffff, 0x1f, 0x37, 0x0, 0x81, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffd}) socket$inet6_udp(0xa, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 03:44:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x34}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 65.142361][T10231] device team0 left promiscuous mode [ 65.147762][T10231] device team_slave_0 left promiscuous mode [ 65.154045][T10231] device team_slave_1 left promiscuous mode [ 65.180887][T10239] device team0 entered promiscuous mode [ 65.203496][T10239] device team_slave_0 entered promiscuous mode [ 65.213248][T10235] REISERFS (device loop3): found reiserfs format "3.5" with non-standard journal [ 65.217933][T10239] device team_slave_1 entered promiscuous mode [ 65.241616][T10239] device team0 left promiscuous mode [ 65.253483][T10239] device team_slave_0 left promiscuous mode [ 65.255852][T10235] REISERFS (device loop3): using ordered data mode [ 65.265973][T10239] device team_slave_1 left promiscuous mode [ 65.272098][T10235] reiserfs: using flush barriers [ 65.279277][T10250] device team0 entered promiscuous mode 03:44:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x34}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:44:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab", 0x4) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg$can_bcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)=""/242, 0xf2}, {&(0x7f0000000080)=""/41, 0x29}], 0x2}, 0x0) [ 65.297817][T10235] REISERFS (device loop3): journal params: device loop3, size 15748, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 65.324421][T10250] device team_slave_0 entered promiscuous mode [ 65.343733][T10235] REISERFS (device loop3): checking transaction log (loop3) [ 65.380458][T10250] device team_slave_1 entered promiscuous mode [ 65.420699][T10250] device team0 left promiscuous mode [ 65.458873][T10250] device team_slave_0 left promiscuous mode [ 65.477351][T10250] device team_slave_1 left promiscuous mode [ 66.450525][T10235] REISERFS warning: reiserfs-5093 is_leaf: item entry count seems wrong *3.5*[1 2 0(1) DIR], item_len 35, item_location 4029, free_space(entry_count) 2 [ 66.466819][T10235] REISERFS error (device loop3): vs-5150 search_by_key: invalid format found in block 15767. Fsck? [ 66.477652][T10235] REISERFS (device loop3): Remounting filesystem read-only [ 66.484874][T10235] REISERFS error (device loop3): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 66.498448][T10235] REISERFS (device loop3): Using rupasov hash to sort names [ 66.505742][T10235] REISERFS (device loop3): using 3.5.x disk format 03:44:58 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c6530204767cc5244e2c8be01001a105d72b9e241ffb699c22341a5f7b517803180a7a210dfb3ebd3ce31f826de64c0ab2b417713f032100e2efa8daedb5e74b883fcb01cd1badab3f5ff155d1e16a09b8f73334bb21ce0083b4356dfb03c65b45304cae965c2b46cef4f7a848e7dd1c24ef7e2ad01c297614940dcf87a6197af6c349a5911cc150fa44d"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getpgid(0x0) open(&(0x7f0000000240)='./file0\x00', 0x121880, 0x20) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 03:44:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000001c0)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x2}, 0x190) 03:44:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000140)=0xffffffffffffffff, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) 03:44:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab", 0x4) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg$can_bcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)=""/242, 0xf2}, {&(0x7f0000000080)=""/41, 0x29}], 0x2}, 0x0) 03:44:58 executing program 1: unshare(0x2000400) r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 03:44:58 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d000000010000611cad49e10000001e000000000000000010ec030200010052654973457233467300000002000000020001000000853d0100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003ac1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/1984, 0x7c0, 0x11000}, {&(0x7f0000010900)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x800, 0x11800}, {&(0x7f0000011100)="0000000000000000000000001200000000000000843d000000010000611cad49e10000001e00"/64, 0x40, 0x3d96000}, {&(0x7f0000011200)="01000200750f0000000000000000000000000000000000000100000002000000000000000000000000002000e00f0000010000000200000001000000f401000002002300bd0f00"/96, 0x60, 0x3d97000}, {&(0x7f0000011300)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003ac1655f3ac1655f3ac1655f01000000ffffffff", 0x60, 0x3d97fa0}], 0x0, &(0x7f0000011400)) 03:44:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 03:44:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000001c0)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x2}, 0x190) 03:44:58 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bb040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000092420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c09a72ed0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0xfffffffffffffea0}}, 0x1006) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) copy_file_range(r0, &(0x7f0000000000)=0x3bf, r3, 0x0, 0x9, 0x0) [ 68.214984][T10284] loop3: detected capacity change from 0 to 252287 03:44:58 executing program 1: unshare(0x2000400) r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 03:44:58 executing program 1: unshare(0x2000400) r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 03:44:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab", 0x4) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg$can_bcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)=""/242, 0xf2}, {&(0x7f0000000080)=""/41, 0x29}], 0x2}, 0x0) [ 68.298292][T10284] REISERFS (device loop3): found reiserfs format "3.5" with non-standard journal [ 68.329433][T10284] REISERFS (device loop3): using ordered data mode [ 68.338602][T10284] reiserfs: using flush barriers 03:44:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000001c0)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x2}, 0x190) 03:44:58 executing program 1: unshare(0x2000400) r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 03:44:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab", 0x4) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg$can_bcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)=""/242, 0xf2}, {&(0x7f0000000080)=""/41, 0x29}], 0x2}, 0x0) [ 68.345043][T10284] REISERFS (device loop3): journal params: device loop3, size 15748, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 03:44:58 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bb040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000092420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c09a72ed0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0xfffffffffffffea0}}, 0x1006) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) copy_file_range(r0, &(0x7f0000000000)=0x3bf, r3, 0x0, 0x9, 0x0) [ 68.388797][T10284] REISERFS (device loop3): checking transaction log (loop3) 03:44:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) [ 69.614800][T10284] REISERFS warning: reiserfs-5093 is_leaf: item entry count seems wrong *3.5*[1 2 0(1) DIR], item_len 35, item_location 4029, free_space(entry_count) 2 [ 69.630295][T10284] REISERFS error (device loop3): vs-5150 search_by_key: invalid format found in block 15767. Fsck? [ 69.640979][T10284] REISERFS (device loop3): Remounting filesystem read-only [ 69.648343][T10284] REISERFS error (device loop3): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 69.662742][T10284] REISERFS (device loop3): Using rupasov hash to sort names [ 69.670065][T10284] REISERFS (device loop3): using 3.5.x disk format 03:44:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 03:44:59 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000240000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) poll(0x0, 0x0, 0x204) 03:44:59 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) 03:44:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:44:59 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bb040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000092420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c09a72ed0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0xfffffffffffffea0}}, 0x1006) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) copy_file_range(r0, &(0x7f0000000000)=0x3bf, r3, 0x0, 0x9, 0x0) 03:44:59 executing program 3: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x802, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd94", 0xc}], 0x1}, 0x0) io_submit(0x0, 0x1, &(0x7f0000000700)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="afd1fa4c9fd4e0361106af102a250b7672ed10a02ca1ddfb91ba3c92572a41cc6dc0a12c150b2f6c96c6f49b6d70b42dea74e0e1b1f6fbe29513a37d2e4e5340a0a2a9b781", 0x45}]) io_submit(r0, 0xa, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 03:44:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x9, 0x1, 0x74}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:44:59 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) [ 69.828692][T10344] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 69.846843][T10345] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 03:44:59 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bb040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000092420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c09a72ed0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0xfffffffffffffea0}}, 0x1006) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) copy_file_range(r0, &(0x7f0000000000)=0x3bf, r3, 0x0, 0x9, 0x0) 03:44:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:44:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 03:44:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x9, 0x1, 0x74}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:44:59 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0)=0xffffffff, 0x4) 03:44:59 executing program 5: r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000002ac0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1, 0x0, 0x3f00}}], 0x1, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x39) 03:45:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x9, 0x1, 0x74}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 70.032388][T10368] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 03:45:00 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0)=0xffffffff, 0x4) 03:45:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000031ec0000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) [ 70.197296][T10387] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 70.213562][T10388] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 70.317905][T10394] skbuff: bad partial csum: csum=38141/0 headroom=64 headlen=3712 03:45:00 executing program 3: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x802, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd94", 0xc}], 0x1}, 0x0) io_submit(0x0, 0x1, &(0x7f0000000700)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="afd1fa4c9fd4e0361106af102a250b7672ed10a02ca1ddfb91ba3c92572a41cc6dc0a12c150b2f6c96c6f49b6d70b42dea74e0e1b1f6fbe29513a37d2e4e5340a0a2a9b781", 0x45}]) io_submit(r0, 0xa, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 03:45:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:45:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x9, 0x1, 0x74}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:45:00 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0)=0xffffffff, 0x4) 03:45:00 executing program 5: r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000002ac0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1, 0x0, 0x3f00}}], 0x1, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x39) 03:45:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000031ec0000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) [ 70.501802][T10410] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 03:45:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000031ec0000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) 03:45:00 executing program 0: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x802, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd94", 0xc}], 0x1}, 0x0) io_submit(0x0, 0x1, &(0x7f0000000700)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="afd1fa4c9fd4e0361106af102a250b7672ed10a02ca1ddfb91ba3c92572a41cc6dc0a12c150b2f6c96c6f49b6d70b42dea74e0e1b1f6fbe29513a37d2e4e5340a0a2a9b781", 0x45}]) io_submit(r0, 0xa, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 03:45:00 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0)=0xffffffff, 0x4) [ 70.544018][T10419] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 03:45:00 executing program 5: r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000002ac0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1, 0x0, 0x3f00}}], 0x1, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x39) 03:45:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 70.598950][T10428] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 70.600344][T10420] skbuff: bad partial csum: csum=38141/0 headroom=64 headlen=3712 [ 70.629351][T10430] skbuff: bad partial csum: csum=38141/0 headroom=64 headlen=3712 03:45:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000031ec0000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) [ 70.699323][T10447] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 70.724126][T10448] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 03:45:00 executing program 3: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x802, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd94", 0xc}], 0x1}, 0x0) io_submit(0x0, 0x1, &(0x7f0000000700)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="afd1fa4c9fd4e0361106af102a250b7672ed10a02ca1ddfb91ba3c92572a41cc6dc0a12c150b2f6c96c6f49b6d70b42dea74e0e1b1f6fbe29513a37d2e4e5340a0a2a9b781", 0x45}]) io_submit(r0, 0xa, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 03:45:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) fanotify_init(0x0, 0x0) 03:45:00 executing program 5: r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000002ac0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1, 0x0, 0x3f00}}], 0x1, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x39) 03:45:00 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@can_delroute={0x1c, 0x19, 0x201, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5, 0xd, 0x1}]}, 0x1c}}, 0x0) 03:45:00 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r1, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) read(r1, &(0x7f0000000080)=""/161, 0xa1) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x7, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) [ 70.826147][ T36] audit: type=1326 audit(1616384700.787:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10458 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7ffc0000 03:45:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) fanotify_init(0x0, 0x0) 03:45:00 executing program 0: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x802, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd94", 0xc}], 0x1}, 0x0) io_submit(0x0, 0x1, &(0x7f0000000700)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="afd1fa4c9fd4e0361106af102a250b7672ed10a02ca1ddfb91ba3c92572a41cc6dc0a12c150b2f6c96c6f49b6d70b42dea74e0e1b1f6fbe29513a37d2e4e5340a0a2a9b781", 0x45}]) io_submit(r0, 0xa, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 03:45:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d640500000000005704000000ffffffd404000040000000b704000010000020620700fe000000008500000007000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113840c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f16b3d48188468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc2739c2e735d0ab961dac07f4f6d8aa1c3f16765d427c0ecd795ec78ee8e9a4e92a9de96e1e78c61c6453e6f5b99f29d513b66a3a550bf6363dc6a9b6d43b0ed47fc09a3d14e86481d46471d03d41ed80b66b5976f504b8cfbc3d7a8d4922962e8b87947577a2eb5408435adc8b5bc376e3122efa06ef556dfa299e9e815ab226fbbe5d4cf10be041cf8957d0fbabf7b75370eb9c911b0346277d0029efaa7ce0b1678913f6aedbc1951411ea1052c73289d8cfbfc1a7da27ce8e25384fa0caea543f3bbae1bb461abc63e6664fd0c83e2067b3cda7ab3720473613a8ffca7198f2c7efc030241632018cad6910a4ccfadc5407a4247ff67d90003833ad9fe8f27bcab7bda878e05de87d8ef55dc5e3d033ac186c1bf46c7f2cf5857fb1aa7256d1dca0c91340b18bde68f8b4f578a064de41fecadbef071917b953f004fb95c8c74ef692d419433e148a36e5569bb3a589985a04304b9da92cf057aff9c8c252fb3ef15532c4cbd6f4791825fe465ecc1c2d3804dfc7fcfc4424c6f136f80fba21523f9688c9ab321e793a7373c44e98d4536c0442f59064e00cdfa61be20eb0f36aa6dd97ffb0fd0eb949fdd0debc280cce6de0ff7ebaa0e6e5cc7c8e45ecfcf22a0d2cc082420398254d541772c980512d0ab688144a2562e9b5710e5a5df6b8860db1a45bd2699d78266496003cf4b4351ac124af9646d303a27331ada50dfbef941b5ebaa8d644f70b2c42226b160dc93c3d552fc466dcd00eec8cfa1c301e674e89fea046cc36b939cfa68d87cf30f6ffa59c99d04dfb0005212a275aecac343ec825f0cf982e10926e589ee081bbd5d6bbdead8ca6b13617798fb33e4e50680f1634ce335fda75ab69ab51bfb67cc08dfad0f045322281dd272ab66f047b08705acd8fdfdf9c0bc538edd806c5a40a2ae813d56a9801eaf3eb11c899f596e11ef21a997cb5cd41d923cfa2ab00a25f3093be397cf2d6f747fbc46cf3a1919ef56fe6fa7a"], &(0x7f0000000280)='GPL\x00'}, 0x48) [ 70.855782][ T36] audit: type=1326 audit(1616384700.787:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10458 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7ffc0000 [ 70.896022][T10467] skbuff: bad partial csum: csum=38141/0 headroom=64 headlen=3712 03:45:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) fanotify_init(0x0, 0x0) 03:45:00 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r1, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) read(r1, &(0x7f0000000080)=""/161, 0xa1) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x7, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) [ 70.950510][ T36] audit: type=1326 audit(1616384700.787:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10458 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=300 compat=0 ip=0x466459 code=0x7ffc0000 03:45:00 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@can_delroute={0x1c, 0x19, 0x201, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5, 0xd, 0x1}]}, 0x1c}}, 0x0)