[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.94' (ECDSA) to the list of known hosts. 2021/01/14 17:22:47 fuzzer started 2021/01/14 17:22:47 dialing manager at 10.128.0.26:37807 2021/01/14 17:22:48 syscalls: 3465 2021/01/14 17:22:48 code coverage: enabled 2021/01/14 17:22:48 comparison tracing: enabled 2021/01/14 17:22:48 extra coverage: enabled 2021/01/14 17:22:48 setuid sandbox: enabled 2021/01/14 17:22:48 namespace sandbox: enabled 2021/01/14 17:22:48 Android sandbox: /sys/fs/selinux/policy does not exist 2021/01/14 17:22:48 fault injection: enabled 2021/01/14 17:22:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/01/14 17:22:48 net packet injection: enabled 2021/01/14 17:22:48 net device setup: enabled 2021/01/14 17:22:48 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/01/14 17:22:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/01/14 17:22:48 USB emulation: enabled 2021/01/14 17:22:48 hci packet injection: enabled 2021/01/14 17:22:48 wifi device emulation: enabled 2021/01/14 17:22:48 fetching corpus: 0, signal 0/2000 (executing program) 2021/01/14 17:22:48 fetching corpus: 49, signal 58033/61819 (executing program) 2021/01/14 17:22:48 fetching corpus: 99, signal 86287/91777 (executing program) 2021/01/14 17:22:48 fetching corpus: 148, signal 115438/122520 (executing program) 2021/01/14 17:22:48 fetching corpus: 198, signal 132169/140849 (executing program) 2021/01/14 17:22:48 fetching corpus: 247, signal 146713/156989 (executing program) 2021/01/14 17:22:49 fetching corpus: 297, signal 159408/171223 (executing program) 2021/01/14 17:22:49 fetching corpus: 347, signal 169313/182643 (executing program) 2021/01/14 17:22:49 fetching corpus: 396, signal 179624/194431 (executing program) 2021/01/14 17:22:49 fetching corpus: 446, signal 191798/208011 (executing program) 2021/01/14 17:22:49 fetching corpus: 496, signal 206305/223801 (executing program) 2021/01/14 17:22:49 fetching corpus: 546, signal 215274/234209 (executing program) 2021/01/14 17:22:49 fetching corpus: 596, signal 228378/248550 (executing program) 2021/01/14 17:22:50 fetching corpus: 646, signal 237690/259141 (executing program) 2021/01/14 17:22:50 fetching corpus: 694, signal 245799/268591 (executing program) 2021/01/14 17:22:50 fetching corpus: 744, signal 254262/278335 (executing program) 2021/01/14 17:22:50 fetching corpus: 794, signal 263410/288687 (executing program) 2021/01/14 17:22:50 fetching corpus: 843, signal 270117/296653 (executing program) 2021/01/14 17:22:50 fetching corpus: 893, signal 276297/304074 (executing program) 2021/01/14 17:22:50 fetching corpus: 943, signal 283722/312647 (executing program) 2021/01/14 17:22:51 fetching corpus: 993, signal 294187/324063 (executing program) 2021/01/14 17:22:51 fetching corpus: 1042, signal 299556/330615 (executing program) 2021/01/14 17:22:51 fetching corpus: 1092, signal 305526/337656 (executing program) 2021/01/14 17:22:51 fetching corpus: 1142, signal 312574/345728 (executing program) 2021/01/14 17:22:51 fetching corpus: 1192, signal 321234/355301 (executing program) 2021/01/14 17:22:51 fetching corpus: 1242, signal 328188/363232 (executing program) 2021/01/14 17:22:51 fetching corpus: 1292, signal 335744/371688 (executing program) 2021/01/14 17:22:52 fetching corpus: 1341, signal 342007/378991 (executing program) 2021/01/14 17:22:52 fetching corpus: 1391, signal 347523/385504 (executing program) 2021/01/14 17:22:52 fetching corpus: 1441, signal 354787/393635 (executing program) 2021/01/14 17:22:52 fetching corpus: 1491, signal 361115/400880 (executing program) 2021/01/14 17:22:52 fetching corpus: 1541, signal 365168/405982 (executing program) 2021/01/14 17:22:52 fetching corpus: 1591, signal 370955/412658 (executing program) 2021/01/14 17:22:53 fetching corpus: 1641, signal 374029/416809 (executing program) 2021/01/14 17:22:53 fetching corpus: 1690, signal 378333/422053 (executing program) 2021/01/14 17:22:53 fetching corpus: 1740, signal 382714/427314 (executing program) 2021/01/14 17:22:53 fetching corpus: 1789, signal 387720/433146 (executing program) 2021/01/14 17:22:53 fetching corpus: 1839, signal 391701/438030 (executing program) 2021/01/14 17:22:53 fetching corpus: 1888, signal 395630/442907 (executing program) 2021/01/14 17:22:54 fetching corpus: 1938, signal 401213/449242 (executing program) 2021/01/14 17:22:54 fetching corpus: 1986, signal 403672/452692 (executing program) 2021/01/14 17:22:54 fetching corpus: 2035, signal 408316/458102 (executing program) 2021/01/14 17:22:55 fetching corpus: 2081, signal 413080/463683 (executing program) 2021/01/14 17:22:55 fetching corpus: 2128, signal 416299/467867 (executing program) 2021/01/14 17:22:55 fetching corpus: 2177, signal 419310/471799 (executing program) 2021/01/14 17:22:55 fetching corpus: 2227, signal 423390/476671 (executing program) 2021/01/14 17:22:55 fetching corpus: 2277, signal 427757/481772 (executing program) 2021/01/14 17:22:55 fetching corpus: 2327, signal 434652/489116 (executing program) 2021/01/14 17:22:56 fetching corpus: 2377, signal 438730/493935 (executing program) 2021/01/14 17:22:56 fetching corpus: 2425, signal 441435/497417 (executing program) 2021/01/14 17:22:56 fetching corpus: 2475, signal 444094/500920 (executing program) 2021/01/14 17:22:56 fetching corpus: 2524, signal 446472/504204 (executing program) 2021/01/14 17:22:56 fetching corpus: 2574, signal 448716/507268 (executing program) 2021/01/14 17:22:56 fetching corpus: 2624, signal 453063/512258 (executing program) 2021/01/14 17:22:57 fetching corpus: 2673, signal 455920/515853 (executing program) 2021/01/14 17:22:57 fetching corpus: 2723, signal 457978/518749 (executing program) 2021/01/14 17:22:57 fetching corpus: 2773, signal 460210/521830 (executing program) 2021/01/14 17:22:57 fetching corpus: 2823, signal 463783/526030 (executing program) 2021/01/14 17:22:57 fetching corpus: 2873, signal 467071/530002 (executing program) 2021/01/14 17:22:57 fetching corpus: 2922, signal 471247/534765 (executing program) 2021/01/14 17:22:57 fetching corpus: 2972, signal 473806/538093 (executing program) 2021/01/14 17:22:58 fetching corpus: 3022, signal 477526/542414 (executing program) 2021/01/14 17:22:58 fetching corpus: 3071, signal 481342/546776 (executing program) 2021/01/14 17:22:58 fetching corpus: 3120, signal 486013/551833 (executing program) 2021/01/14 17:22:58 fetching corpus: 3168, signal 488789/555303 (executing program) 2021/01/14 17:22:58 fetching corpus: 3218, signal 490847/558122 (executing program) 2021/01/14 17:22:58 fetching corpus: 3268, signal 494951/562722 (executing program) 2021/01/14 17:22:59 fetching corpus: 3318, signal 497640/566077 (executing program) 2021/01/14 17:22:59 fetching corpus: 3368, signal 500366/569431 (executing program) 2021/01/14 17:22:59 fetching corpus: 3417, signal 502686/572436 (executing program) 2021/01/14 17:22:59 fetching corpus: 3466, signal 505590/575945 (executing program) 2021/01/14 17:22:59 fetching corpus: 3516, signal 508199/579172 (executing program) 2021/01/14 17:22:59 fetching corpus: 3565, signal 511488/582985 (executing program) 2021/01/14 17:23:00 fetching corpus: 3615, signal 514035/586124 (executing program) 2021/01/14 17:23:00 fetching corpus: 3665, signal 515601/588404 (executing program) 2021/01/14 17:23:00 fetching corpus: 3715, signal 518682/592030 (executing program) 2021/01/14 17:23:00 fetching corpus: 3764, signal 521080/595013 (executing program) 2021/01/14 17:23:00 fetching corpus: 3814, signal 522977/597544 (executing program) 2021/01/14 17:23:00 fetching corpus: 3864, signal 524930/600181 (executing program) 2021/01/14 17:23:00 fetching corpus: 3914, signal 527735/603491 (executing program) 2021/01/14 17:23:01 fetching corpus: 3964, signal 529017/605496 (executing program) 2021/01/14 17:23:01 fetching corpus: 4014, signal 531752/608768 (executing program) 2021/01/14 17:23:01 fetching corpus: 4064, signal 533939/611533 (executing program) 2021/01/14 17:23:01 fetching corpus: 4112, signal 536011/614210 (executing program) 2021/01/14 17:23:01 fetching corpus: 4162, signal 538118/616885 (executing program) 2021/01/14 17:23:01 fetching corpus: 4211, signal 540113/619472 (executing program) 2021/01/14 17:23:02 fetching corpus: 4259, signal 542945/622726 (executing program) 2021/01/14 17:23:02 fetching corpus: 4308, signal 545294/625573 (executing program) 2021/01/14 17:23:02 fetching corpus: 4358, signal 548650/629229 (executing program) 2021/01/14 17:23:02 fetching corpus: 4408, signal 550635/631735 (executing program) 2021/01/14 17:23:02 fetching corpus: 4458, signal 552305/633957 (executing program) 2021/01/14 17:23:02 fetching corpus: 4508, signal 555009/637089 (executing program) 2021/01/14 17:23:02 fetching corpus: 4558, signal 556991/639625 (executing program) 2021/01/14 17:23:03 fetching corpus: 4608, signal 558907/642091 (executing program) 2021/01/14 17:23:03 fetching corpus: 4655, signal 560834/644568 (executing program) 2021/01/14 17:23:03 fetching corpus: 4705, signal 563839/647880 (executing program) 2021/01/14 17:23:03 fetching corpus: 4754, signal 565724/650245 (executing program) 2021/01/14 17:23:04 fetching corpus: 4802, signal 569366/654019 (executing program) 2021/01/14 17:23:04 fetching corpus: 4852, signal 572313/657197 (executing program) 2021/01/14 17:23:04 fetching corpus: 4902, signal 573735/659196 (executing program) 2021/01/14 17:23:04 fetching corpus: 4952, signal 575305/661303 (executing program) 2021/01/14 17:23:04 fetching corpus: 5002, signal 578341/664608 (executing program) 2021/01/14 17:23:05 fetching corpus: 5051, signal 580525/667234 (executing program) 2021/01/14 17:23:05 fetching corpus: 5101, signal 582798/669819 (executing program) 2021/01/14 17:23:05 fetching corpus: 5151, signal 584627/672153 (executing program) 2021/01/14 17:23:05 fetching corpus: 5200, signal 585577/673721 (executing program) 2021/01/14 17:23:05 fetching corpus: 5250, signal 587871/676338 (executing program) 2021/01/14 17:23:05 fetching corpus: 5300, signal 589248/678253 (executing program) 2021/01/14 17:23:05 fetching corpus: 5350, signal 590927/680396 (executing program) 2021/01/14 17:23:06 fetching corpus: 5400, signal 593214/682997 (executing program) 2021/01/14 17:23:06 fetching corpus: 5450, signal 595419/685569 (executing program) 2021/01/14 17:23:06 fetching corpus: 5500, signal 596957/687607 (executing program) 2021/01/14 17:23:06 fetching corpus: 5549, signal 598651/689741 (executing program) 2021/01/14 17:23:06 fetching corpus: 5599, signal 601270/692547 (executing program) 2021/01/14 17:23:06 fetching corpus: 5649, signal 603245/694927 (executing program) 2021/01/14 17:23:06 fetching corpus: 5698, signal 605761/697660 (executing program) 2021/01/14 17:23:07 fetching corpus: 5748, signal 608723/700746 (executing program) 2021/01/14 17:23:07 fetching corpus: 5797, signal 610361/702736 (executing program) 2021/01/14 17:23:07 fetching corpus: 5846, signal 611677/704522 (executing program) 2021/01/14 17:23:07 fetching corpus: 5894, signal 613105/706354 (executing program) 2021/01/14 17:23:07 fetching corpus: 5943, signal 614301/708018 (executing program) 2021/01/14 17:23:07 fetching corpus: 5992, signal 615801/709909 (executing program) 2021/01/14 17:23:07 fetching corpus: 6042, signal 618698/712864 (executing program) 2021/01/14 17:23:08 fetching corpus: 6091, signal 621031/715408 (executing program) 2021/01/14 17:23:08 fetching corpus: 6141, signal 622288/717106 (executing program) 2021/01/14 17:23:08 fetching corpus: 6191, signal 623829/719032 (executing program) 2021/01/14 17:23:08 fetching corpus: 6241, signal 624946/720627 (executing program) 2021/01/14 17:23:08 fetching corpus: 6291, signal 626376/722489 (executing program) 2021/01/14 17:23:08 fetching corpus: 6341, signal 629279/725381 (executing program) 2021/01/14 17:23:08 fetching corpus: 6391, signal 630942/727385 (executing program) 2021/01/14 17:23:09 fetching corpus: 6441, signal 632888/729549 (executing program) 2021/01/14 17:23:09 fetching corpus: 6490, signal 636298/732808 (executing program) 2021/01/14 17:23:09 fetching corpus: 6540, signal 637499/734474 (executing program) 2021/01/14 17:23:09 fetching corpus: 6590, signal 639663/736810 (executing program) 2021/01/14 17:23:09 fetching corpus: 6638, signal 640876/738462 (executing program) 2021/01/14 17:23:09 fetching corpus: 6687, signal 642159/740219 (executing program) 2021/01/14 17:23:09 fetching corpus: 6736, signal 643197/741713 (executing program) 2021/01/14 17:23:10 fetching corpus: 6785, signal 645306/743971 (executing program) 2021/01/14 17:23:10 fetching corpus: 6834, signal 647211/746103 (executing program) 2021/01/14 17:23:10 fetching corpus: 6884, signal 650104/748958 (executing program) 2021/01/14 17:23:10 fetching corpus: 6933, signal 651966/750979 (executing program) 2021/01/14 17:23:11 fetching corpus: 6982, signal 653464/752733 (executing program) 2021/01/14 17:23:11 fetching corpus: 7032, signal 654436/754127 (executing program) 2021/01/14 17:23:11 fetching corpus: 7082, signal 655927/755890 (executing program) 2021/01/14 17:23:11 fetching corpus: 7132, signal 657730/757867 (executing program) 2021/01/14 17:23:11 fetching corpus: 7182, signal 659644/759918 (executing program) 2021/01/14 17:23:11 fetching corpus: 7232, signal 660557/761227 (executing program) 2021/01/14 17:23:11 fetching corpus: 7281, signal 662031/763003 (executing program) 2021/01/14 17:23:12 fetching corpus: 7331, signal 662894/764291 (executing program) 2021/01/14 17:23:12 fetching corpus: 7380, signal 664374/765972 (executing program) 2021/01/14 17:23:12 fetching corpus: 7429, signal 666569/768190 (executing program) 2021/01/14 17:23:12 fetching corpus: 7478, signal 667687/769684 (executing program) 2021/01/14 17:23:12 fetching corpus: 7527, signal 669468/771620 (executing program) 2021/01/14 17:23:13 fetching corpus: 7577, signal 670444/772930 (executing program) 2021/01/14 17:23:13 fetching corpus: 7627, signal 672239/774840 (executing program) 2021/01/14 17:23:13 fetching corpus: 7676, signal 673595/776427 (executing program) 2021/01/14 17:23:13 fetching corpus: 7726, signal 674904/777975 (executing program) 2021/01/14 17:23:13 fetching corpus: 7776, signal 676501/779736 (executing program) 2021/01/14 17:23:13 fetching corpus: 7826, signal 677485/781055 (executing program) 2021/01/14 17:23:14 fetching corpus: 7874, signal 678511/782416 (executing program) 2021/01/14 17:23:14 fetching corpus: 7924, signal 680559/784453 (executing program) 2021/01/14 17:23:14 fetching corpus: 7974, signal 682533/786479 (executing program) 2021/01/14 17:23:14 fetching corpus: 8024, signal 685230/788969 (executing program) 2021/01/14 17:23:14 fetching corpus: 8074, signal 686731/790619 (executing program) 2021/01/14 17:23:15 fetching corpus: 8124, signal 687576/791829 (executing program) 2021/01/14 17:23:15 fetching corpus: 8173, signal 688732/793175 (executing program) 2021/01/14 17:23:15 fetching corpus: 8223, signal 689696/794472 (executing program) 2021/01/14 17:23:15 fetching corpus: 8273, signal 690989/795936 (executing program) 2021/01/14 17:23:15 fetching corpus: 8323, signal 692420/797546 (executing program) 2021/01/14 17:23:15 fetching corpus: 8373, signal 693633/798982 (executing program) 2021/01/14 17:23:16 fetching corpus: 8422, signal 695097/800555 (executing program) 2021/01/14 17:23:16 fetching corpus: 8472, signal 696813/802280 (executing program) 2021/01/14 17:23:16 fetching corpus: 8519, signal 697552/803393 (executing program) 2021/01/14 17:23:16 fetching corpus: 8568, signal 699039/804980 (executing program) 2021/01/14 17:23:16 fetching corpus: 8616, signal 700413/806491 (executing program) 2021/01/14 17:23:17 fetching corpus: 8666, signal 701403/807714 (executing program) 2021/01/14 17:23:17 fetching corpus: 8716, signal 702850/809244 (executing program) 2021/01/14 17:23:17 fetching corpus: 8766, signal 703769/810464 (executing program) 2021/01/14 17:23:17 fetching corpus: 8816, signal 704779/811705 (executing program) 2021/01/14 17:23:17 fetching corpus: 8866, signal 706019/813078 (executing program) 2021/01/14 17:23:17 fetching corpus: 8916, signal 706773/814166 (executing program) 2021/01/14 17:23:18 fetching corpus: 8966, signal 707783/815385 (executing program) 2021/01/14 17:23:18 fetching corpus: 9015, signal 708757/816618 (executing program) 2021/01/14 17:23:18 fetching corpus: 9065, signal 709623/817739 (executing program) 2021/01/14 17:23:18 fetching corpus: 9113, signal 710457/818836 (executing program) 2021/01/14 17:23:18 fetching corpus: 9163, signal 711964/820346 (executing program) 2021/01/14 17:23:19 fetching corpus: 9213, signal 713948/822204 (executing program) 2021/01/14 17:23:19 fetching corpus: 9263, signal 714776/823327 (executing program) 2021/01/14 17:23:19 fetching corpus: 9313, signal 715845/824547 (executing program) 2021/01/14 17:23:19 fetching corpus: 9363, signal 716779/825724 (executing program) 2021/01/14 17:23:19 fetching corpus: 9413, signal 717971/827036 (executing program) 2021/01/14 17:23:20 fetching corpus: 9463, signal 720310/829070 (executing program) 2021/01/14 17:23:20 fetching corpus: 9512, signal 721446/830333 (executing program) 2021/01/14 17:23:20 fetching corpus: 9562, signal 722311/831396 (executing program) 2021/01/14 17:23:20 fetching corpus: 9612, signal 723484/832690 (executing program) 2021/01/14 17:23:20 fetching corpus: 9661, signal 724567/833881 (executing program) 2021/01/14 17:23:21 fetching corpus: 9711, signal 725838/835173 (executing program) 2021/01/14 17:23:21 fetching corpus: 9761, signal 726842/836295 (executing program) 2021/01/14 17:23:21 fetching corpus: 9811, signal 729435/838407 (executing program) 2021/01/14 17:23:21 fetching corpus: 9861, signal 730300/839488 (executing program) 2021/01/14 17:23:21 fetching corpus: 9911, signal 731604/840820 (executing program) 2021/01/14 17:23:22 fetching corpus: 9961, signal 732438/841845 (executing program) 2021/01/14 17:23:22 fetching corpus: 10011, signal 733797/843182 (executing program) 2021/01/14 17:23:22 fetching corpus: 10060, signal 734618/844266 (executing program) 2021/01/14 17:23:22 fetching corpus: 10110, signal 735564/845344 (executing program) 2021/01/14 17:23:23 fetching corpus: 10160, signal 736436/846431 (executing program) 2021/01/14 17:23:23 fetching corpus: 10208, signal 737219/847418 (executing program) 2021/01/14 17:23:23 fetching corpus: 10256, signal 738193/848512 (executing program) 2021/01/14 17:23:24 fetching corpus: 10305, signal 738866/849425 (executing program) 2021/01/14 17:23:24 fetching corpus: 10354, signal 739557/850344 (executing program) 2021/01/14 17:23:24 fetching corpus: 10402, signal 740626/851509 (executing program) 2021/01/14 17:23:24 fetching corpus: 10452, signal 741469/852556 (executing program) 2021/01/14 17:23:24 fetching corpus: 10500, signal 742623/853692 (executing program) 2021/01/14 17:23:25 fetching corpus: 10550, signal 743952/855005 (executing program) 2021/01/14 17:23:25 fetching corpus: 10600, signal 745677/856515 (executing program) 2021/01/14 17:23:25 fetching corpus: 10650, signal 746452/857495 (executing program) 2021/01/14 17:23:25 fetching corpus: 10700, signal 747958/858830 (executing program) 2021/01/14 17:23:25 fetching corpus: 10750, signal 748851/859844 (executing program) 2021/01/14 17:23:26 fetching corpus: 10800, signal 750206/861130 (executing program) 2021/01/14 17:23:26 fetching corpus: 10849, signal 751501/862341 (executing program) 2021/01/14 17:23:26 fetching corpus: 10896, signal 752841/863592 (executing program) 2021/01/14 17:23:27 fetching corpus: 10946, signal 753773/864630 (executing program) 2021/01/14 17:23:27 fetching corpus: 10994, signal 754754/865689 (executing program) 2021/01/14 17:23:27 fetching corpus: 11044, signal 755495/866632 (executing program) 2021/01/14 17:23:27 fetching corpus: 11094, signal 756392/867648 (executing program) 2021/01/14 17:23:28 fetching corpus: 11144, signal 757052/868501 (executing program) 2021/01/14 17:23:28 fetching corpus: 11193, signal 758276/869664 (executing program) 2021/01/14 17:23:28 fetching corpus: 11243, signal 759550/870843 (executing program) 2021/01/14 17:23:28 fetching corpus: 11293, signal 760440/871811 (executing program) 2021/01/14 17:23:29 fetching corpus: 11343, signal 761684/873012 (executing program) 2021/01/14 17:23:29 fetching corpus: 11392, signal 763121/874279 (executing program) 2021/01/14 17:23:29 fetching corpus: 11442, signal 763940/875216 (executing program) 2021/01/14 17:23:29 fetching corpus: 11491, signal 764647/876080 (executing program) 2021/01/14 17:23:29 fetching corpus: 11539, signal 765738/877169 (executing program) 2021/01/14 17:23:30 fetching corpus: 11589, signal 766725/878208 (executing program) 2021/01/14 17:23:30 fetching corpus: 11637, signal 767370/879032 (executing program) 2021/01/14 17:23:30 fetching corpus: 11687, signal 769082/880402 (executing program) 2021/01/14 17:23:30 fetching corpus: 11737, signal 770260/881491 (executing program) 2021/01/14 17:23:31 fetching corpus: 11785, signal 771171/882444 (executing program) 2021/01/14 17:23:31 fetching corpus: 11832, signal 772510/883577 (executing program) 2021/01/14 17:23:31 fetching corpus: 11882, signal 773326/884426 (executing program) 2021/01/14 17:23:31 fetching corpus: 11932, signal 774592/885599 (executing program) 2021/01/14 17:23:32 fetching corpus: 11982, signal 775800/886655 (executing program) 2021/01/14 17:23:32 fetching corpus: 12031, signal 776415/887450 (executing program) 2021/01/14 17:23:32 fetching corpus: 12081, signal 777023/888231 (executing program) 2021/01/14 17:23:32 fetching corpus: 12131, signal 777862/889161 (executing program) 2021/01/14 17:23:33 fetching corpus: 12180, signal 778831/890102 (executing program) 2021/01/14 17:23:33 fetching corpus: 12229, signal 779663/891037 (executing program) 2021/01/14 17:23:33 fetching corpus: 12278, signal 780833/892074 (executing program) 2021/01/14 17:23:33 fetching corpus: 12327, signal 781641/892922 (executing program) 2021/01/14 17:23:34 fetching corpus: 12377, signal 782403/893730 (executing program) 2021/01/14 17:23:34 fetching corpus: 12426, signal 783381/894664 (executing program) 2021/01/14 17:23:34 fetching corpus: 12475, signal 784443/895617 (executing program) 2021/01/14 17:23:34 fetching corpus: 12524, signal 785490/896579 (executing program) 2021/01/14 17:23:34 fetching corpus: 12573, signal 786532/897521 (executing program) 2021/01/14 17:23:35 fetching corpus: 12622, signal 787210/898290 (executing program) 2021/01/14 17:23:35 fetching corpus: 12671, signal 788932/899604 (executing program) 2021/01/14 17:23:35 fetching corpus: 12721, signal 789513/900310 (executing program) 2021/01/14 17:23:35 fetching corpus: 12771, signal 791460/901708 (executing program) 2021/01/14 17:23:36 fetching corpus: 12820, signal 792133/902462 (executing program) 2021/01/14 17:23:36 fetching corpus: 12869, signal 793456/903483 (executing program) 2021/01/14 17:23:36 fetching corpus: 12917, signal 794230/904290 (executing program) 2021/01/14 17:23:36 fetching corpus: 12967, signal 794989/905055 (executing program) 2021/01/14 17:23:37 fetching corpus: 13017, signal 795625/905821 (executing program) 2021/01/14 17:23:37 fetching corpus: 13067, signal 796654/906749 (executing program) 2021/01/14 17:23:37 fetching corpus: 13117, signal 797391/907508 (executing program) 2021/01/14 17:23:37 fetching corpus: 13167, signal 798337/908375 (executing program) 2021/01/14 17:23:37 fetching corpus: 13216, signal 799100/909175 (executing program) 2021/01/14 17:23:38 fetching corpus: 13265, signal 800178/910100 (executing program) 2021/01/14 17:23:38 fetching corpus: 13315, signal 801130/910953 (executing program) 2021/01/14 17:23:38 fetching corpus: 13365, signal 801811/911675 (executing program) 2021/01/14 17:23:38 fetching corpus: 13414, signal 802434/912397 (executing program) 2021/01/14 17:23:38 fetching corpus: 13462, signal 802893/913006 (executing program) 2021/01/14 17:23:39 fetching corpus: 13510, signal 803861/913817 (executing program) 2021/01/14 17:23:39 fetching corpus: 13559, signal 805266/914907 (executing program) 2021/01/14 17:23:39 fetching corpus: 13607, signal 806288/915784 (executing program) 2021/01/14 17:23:40 fetching corpus: 13655, signal 807180/916594 (executing program) 2021/01/14 17:23:40 fetching corpus: 13705, signal 808112/917446 (executing program) 2021/01/14 17:23:40 fetching corpus: 13755, signal 809705/918611 (executing program) 2021/01/14 17:23:40 fetching corpus: 13805, signal 810648/919423 (executing program) 2021/01/14 17:23:40 fetching corpus: 13854, signal 811302/920109 (executing program) 2021/01/14 17:23:41 fetching corpus: 13904, signal 812140/920895 (executing program) 2021/01/14 17:23:41 fetching corpus: 13954, signal 814342/922307 (executing program) 2021/01/14 17:23:41 fetching corpus: 14004, signal 815443/923157 (executing program) 2021/01/14 17:23:41 fetching corpus: 14053, signal 816393/924007 (executing program) 2021/01/14 17:23:42 fetching corpus: 14103, signal 817247/924754 (executing program) 2021/01/14 17:23:42 fetching corpus: 14153, signal 818006/925507 (executing program) 2021/01/14 17:23:42 fetching corpus: 14202, signal 819209/926410 (executing program) 2021/01/14 17:23:42 fetching corpus: 14251, signal 820031/927105 (executing program) 2021/01/14 17:23:43 fetching corpus: 14300, signal 820739/927796 (executing program) 2021/01/14 17:23:43 fetching corpus: 14348, signal 821405/928466 (executing program) 2021/01/14 17:23:43 fetching corpus: 14398, signal 822191/929159 (executing program) 2021/01/14 17:23:43 fetching corpus: 14447, signal 823163/929959 (executing program) 2021/01/14 17:23:44 fetching corpus: 14497, signal 823964/930678 (executing program) 2021/01/14 17:23:44 fetching corpus: 14547, signal 824665/931300 (executing program) 2021/01/14 17:23:44 fetching corpus: 14597, signal 825697/932130 (executing program) 2021/01/14 17:23:44 fetching corpus: 14645, signal 826668/932917 (executing program) 2021/01/14 17:23:44 fetching corpus: 14694, signal 827192/933530 (executing program) 2021/01/14 17:23:45 fetching corpus: 14744, signal 827853/934139 (executing program) 2021/01/14 17:23:45 fetching corpus: 14794, signal 828722/934859 (executing program) 2021/01/14 17:23:45 fetching corpus: 14843, signal 829446/935573 (executing program) 2021/01/14 17:23:45 fetching corpus: 14893, signal 830392/936328 (executing program) 2021/01/14 17:23:45 fetching corpus: 14943, signal 831875/937273 (executing program) 2021/01/14 17:23:46 fetching corpus: 14993, signal 832421/937818 (executing program) 2021/01/14 17:23:46 fetching corpus: 15042, signal 833499/938657 (executing program) 2021/01/14 17:23:46 fetching corpus: 15092, signal 834627/939456 (executing program) 2021/01/14 17:23:46 fetching corpus: 15140, signal 835060/940001 (executing program) 2021/01/14 17:23:46 fetching corpus: 15190, signal 835763/940655 (executing program) 2021/01/14 17:23:47 fetching corpus: 15239, signal 836577/941307 (executing program) 2021/01/14 17:23:47 fetching corpus: 15289, signal 837275/941903 (executing program) 2021/01/14 17:23:47 fetching corpus: 15339, signal 838194/942582 (executing program) 2021/01/14 17:23:47 fetching corpus: 15389, signal 838934/943198 (executing program) 2021/01/14 17:23:47 fetching corpus: 15437, signal 839440/943734 (executing program) 2021/01/14 17:23:48 fetching corpus: 15487, signal 840191/944361 (executing program) 2021/01/14 17:23:48 fetching corpus: 15537, signal 841278/945118 (executing program) 2021/01/14 17:23:48 fetching corpus: 15586, signal 841859/945649 (executing program) 2021/01/14 17:23:48 fetching corpus: 15636, signal 842579/946211 (executing program) 2021/01/14 17:23:49 fetching corpus: 15683, signal 843927/947065 (executing program) 2021/01/14 17:23:49 fetching corpus: 15733, signal 844751/947700 (executing program) 2021/01/14 17:23:49 fetching corpus: 15783, signal 845619/948319 (executing program) 2021/01/14 17:23:49 fetching corpus: 15831, signal 846312/948860 (executing program) 2021/01/14 17:23:50 fetching corpus: 15881, signal 846956/949423 (executing program) 2021/01/14 17:23:50 fetching corpus: 15931, signal 848169/950196 (executing program) 2021/01/14 17:23:50 fetching corpus: 15981, signal 848763/950716 (executing program) 2021/01/14 17:23:50 fetching corpus: 16031, signal 849616/951334 (executing program) 2021/01/14 17:23:51 fetching corpus: 16081, signal 850124/951823 (executing program) 2021/01/14 17:23:51 fetching corpus: 16129, signal 850875/952401 (executing program) 2021/01/14 17:23:51 fetching corpus: 16179, signal 852075/953110 (executing program) 2021/01/14 17:23:51 fetching corpus: 16229, signal 852770/953647 (executing program) 2021/01/14 17:23:51 fetching corpus: 16277, signal 853413/954165 (executing program) 2021/01/14 17:23:52 fetching corpus: 16326, signal 854889/954986 (executing program) 2021/01/14 17:23:52 fetching corpus: 16376, signal 857139/956031 (executing program) 2021/01/14 17:23:52 fetching corpus: 16425, signal 857996/956603 (executing program) 2021/01/14 17:23:52 fetching corpus: 16475, signal 859543/957421 (executing program) 2021/01/14 17:23:53 fetching corpus: 16523, signal 860333/957977 (executing program) 2021/01/14 17:23:53 fetching corpus: 16573, signal 861038/958507 (executing program) 2021/01/14 17:23:53 fetching corpus: 16622, signal 861859/959080 (executing program) 2021/01/14 17:23:53 fetching corpus: 16671, signal 862561/959610 (executing program) 2021/01/14 17:23:53 fetching corpus: 16721, signal 863007/960036 (executing program) 2021/01/14 17:23:54 fetching corpus: 16770, signal 863548/960501 (executing program) 2021/01/14 17:23:54 fetching corpus: 16819, signal 864455/961071 (executing program) 2021/01/14 17:23:54 fetching corpus: 16866, signal 865071/961531 (executing program) 2021/01/14 17:23:55 fetching corpus: 16913, signal 865592/961968 (executing program) 2021/01/14 17:23:55 fetching corpus: 16963, signal 866470/962546 (executing program) 2021/01/14 17:23:55 fetching corpus: 17011, signal 867019/963007 (executing program) 2021/01/14 17:23:55 fetching corpus: 17061, signal 867685/963512 (executing program) 2021/01/14 17:23:55 fetching corpus: 17108, signal 868705/964100 (executing program) 2021/01/14 17:23:56 fetching corpus: 17158, signal 869424/964595 (executing program) 2021/01/14 17:23:56 fetching corpus: 17206, signal 870025/965107 (executing program) 2021/01/14 17:23:56 fetching corpus: 17256, signal 870611/965540 (executing program) 2021/01/14 17:23:56 fetching corpus: 17306, signal 871426/966063 (executing program) 2021/01/14 17:23:57 fetching corpus: 17356, signal 871962/966488 (executing program) 2021/01/14 17:23:57 fetching corpus: 17406, signal 872463/966902 (executing program) 2021/01/14 17:23:57 fetching corpus: 17455, signal 873318/967498 (executing program) 2021/01/14 17:23:57 fetching corpus: 17504, signal 874130/968028 (executing program) 2021/01/14 17:23:58 fetching corpus: 17554, signal 875084/968598 (executing program) 2021/01/14 17:23:58 fetching corpus: 17604, signal 875824/969063 (executing program) 2021/01/14 17:23:58 fetching corpus: 17654, signal 876390/969498 (executing program) 2021/01/14 17:23:58 fetching corpus: 17704, signal 876883/969941 (executing program) 2021/01/14 17:23:59 fetching corpus: 17754, signal 877627/970387 (executing program) 2021/01/14 17:23:59 fetching corpus: 17804, signal 878465/970936 (executing program) 2021/01/14 17:23:59 fetching corpus: 17853, signal 878956/971346 (executing program) 2021/01/14 17:23:59 fetching corpus: 17903, signal 879386/971702 (executing program) 2021/01/14 17:23:59 fetching corpus: 17953, signal 879990/972108 (executing program) 2021/01/14 17:24:00 fetching corpus: 18003, signal 880695/972587 (executing program) 2021/01/14 17:24:00 fetching corpus: 18051, signal 881393/973036 (executing program) 2021/01/14 17:24:00 fetching corpus: 18100, signal 881953/973420 (executing program) 2021/01/14 17:24:00 fetching corpus: 18150, signal 882714/973885 (executing program) 2021/01/14 17:24:01 fetching corpus: 18200, signal 883078/974225 (executing program) 2021/01/14 17:24:01 fetching corpus: 18248, signal 883713/974684 (executing program) 2021/01/14 17:24:01 fetching corpus: 18298, signal 884263/975091 (executing program) 2021/01/14 17:24:01 fetching corpus: 18346, signal 885293/975674 (executing program) 2021/01/14 17:24:01 fetching corpus: 18394, signal 886176/976184 (executing program) 2021/01/14 17:24:02 fetching corpus: 18444, signal 886854/976634 (executing program) 2021/01/14 17:24:02 fetching corpus: 18494, signal 887315/976985 (executing program) 2021/01/14 17:24:02 fetching corpus: 18544, signal 887906/977375 (executing program) 2021/01/14 17:24:02 fetching corpus: 18593, signal 888461/977767 (executing program) 2021/01/14 17:24:02 fetching corpus: 18643, signal 888858/978132 (executing program) 2021/01/14 17:24:03 fetching corpus: 18693, signal 889489/978527 (executing program) 2021/01/14 17:24:03 fetching corpus: 18743, signal 890297/978964 (executing program) 2021/01/14 17:24:03 fetching corpus: 18793, signal 890832/979324 (executing program) 2021/01/14 17:24:03 fetching corpus: 18843, signal 891687/979775 (executing program) 2021/01/14 17:24:04 fetching corpus: 18893, signal 894273/980630 (executing program) 2021/01/14 17:24:04 fetching corpus: 18943, signal 894850/981024 (executing program) 2021/01/14 17:24:04 fetching corpus: 18993, signal 895147/981325 (executing program) 2021/01/14 17:24:04 fetching corpus: 19043, signal 895704/981675 (executing program) 2021/01/14 17:24:05 fetching corpus: 19093, signal 896264/982041 (executing program) 2021/01/14 17:24:05 fetching corpus: 19143, signal 896864/982378 (executing program) 2021/01/14 17:24:05 fetching corpus: 19192, signal 897421/982759 (executing program) 2021/01/14 17:24:05 fetching corpus: 19241, signal 898096/983196 (executing program) 2021/01/14 17:24:06 fetching corpus: 19291, signal 898620/983563 (executing program) 2021/01/14 17:24:06 fetching corpus: 19341, signal 899358/983918 (executing program) 2021/01/14 17:24:06 fetching corpus: 19390, signal 899824/984244 (executing program) 2021/01/14 17:24:06 fetching corpus: 19440, signal 901079/984764 (executing program) 2021/01/14 17:24:06 fetching corpus: 19490, signal 901816/985155 (executing program) 2021/01/14 17:24:07 fetching corpus: 19540, signal 902473/985519 (executing program) 2021/01/14 17:24:07 fetching corpus: 19590, signal 903075/985818 (executing program) 2021/01/14 17:24:07 fetching corpus: 19640, signal 903636/986126 (executing program) 2021/01/14 17:24:07 fetching corpus: 19689, signal 904114/986455 (executing program) 2021/01/14 17:24:08 fetching corpus: 19739, signal 904798/986790 (executing program) 2021/01/14 17:24:08 fetching corpus: 19789, signal 905316/987116 (executing program) 2021/01/14 17:24:08 fetching corpus: 19839, signal 905815/987425 (executing program) 2021/01/14 17:24:08 fetching corpus: 19887, signal 906362/987731 (executing program) 2021/01/14 17:24:09 fetching corpus: 19936, signal 906956/988049 (executing program) 2021/01/14 17:24:09 fetching corpus: 19986, signal 907312/988328 (executing program) 2021/01/14 17:24:09 fetching corpus: 20036, signal 908257/988726 (executing program) 2021/01/14 17:24:09 fetching corpus: 20086, signal 908853/989070 (executing program) 2021/01/14 17:24:10 fetching corpus: 20134, signal 909550/989380 (executing program) 2021/01/14 17:24:10 fetching corpus: 20183, signal 910136/989691 (executing program) 2021/01/14 17:24:10 fetching corpus: 20233, signal 910607/989963 (executing program) 2021/01/14 17:24:10 fetching corpus: 20281, signal 911282/990301 (executing program) 2021/01/14 17:24:11 fetching corpus: 20331, signal 911727/990558 (executing program) 2021/01/14 17:24:11 fetching corpus: 20379, signal 912092/990810 (executing program) 2021/01/14 17:24:11 fetching corpus: 20429, signal 912541/991096 (executing program) 2021/01/14 17:24:11 fetching corpus: 20478, signal 913185/991413 (executing program) 2021/01/14 17:24:12 fetching corpus: 20527, signal 914101/991758 (executing program) 2021/01/14 17:24:12 fetching corpus: 20576, signal 914433/992003 (executing program) 2021/01/14 17:24:12 fetching corpus: 20625, signal 915287/992355 (executing program) 2021/01/14 17:24:12 fetching corpus: 20674, signal 916120/992668 (executing program) 2021/01/14 17:24:12 fetching corpus: 20724, signal 916629/992968 (executing program) 2021/01/14 17:24:24 fetching corpus: 20774, signal 917056/993227 (executing program) 2021/01/14 17:24:24 fetching corpus: 20807, signal 917569/993560 (executing program) 2021/01/14 17:24:25 fetching corpus: 20857, signal 918789/993955 (executing program) 2021/01/14 17:24:25 fetching corpus: 20907, signal 919343/994219 (executing program) 2021/01/14 17:24:25 fetching corpus: 20957, signal 919767/994446 (executing program) 2021/01/14 17:24:25 fetching corpus: 21007, signal 920314/994715 (executing program) 2021/01/14 17:24:25 fetching corpus: 21056, signal 920844/995009 (executing program) 2021/01/14 17:24:26 fetching corpus: 21105, signal 921420/995267 (executing program) 2021/01/14 17:24:26 fetching corpus: 21153, signal 922160/995565 (executing program) 2021/01/14 17:24:26 fetching corpus: 21203, signal 922574/995810 (executing program) 2021/01/14 17:24:26 fetching corpus: 21253, signal 923453/996161 (executing program) 2021/01/14 17:24:26 fetching corpus: 21301, signal 923832/996432 (executing program) 2021/01/14 17:24:27 fetching corpus: 21349, signal 924545/996679 (executing program) 2021/01/14 17:24:27 fetching corpus: 21399, signal 925188/996944 (executing program) 2021/01/14 17:24:27 fetching corpus: 21449, signal 925662/997202 (executing program) 2021/01/14 17:24:27 fetching corpus: 21498, signal 926416/997459 (executing program) 2021/01/14 17:24:28 fetching corpus: 21546, signal 926894/997707 (executing program) 2021/01/14 17:24:28 fetching corpus: 21595, signal 928053/998040 (executing program) 2021/01/14 17:24:28 fetching corpus: 21641, signal 928726/998281 (executing program) 2021/01/14 17:24:28 fetching corpus: 21691, signal 929160/998491 (executing program) 2021/01/14 17:24:28 fetching corpus: 21739, signal 929886/998764 (executing program) 2021/01/14 17:24:29 fetching corpus: 21789, signal 930394/999034 (executing program) 2021/01/14 17:24:29 fetching corpus: 21839, signal 931140/999286 (executing program) 2021/01/14 17:24:29 fetching corpus: 21889, signal 931661/999515 (executing program) 2021/01/14 17:24:29 fetching corpus: 21939, signal 932264/999746 (executing program) 2021/01/14 17:24:29 fetching corpus: 21987, signal 932671/999967 (executing program) 2021/01/14 17:24:30 fetching corpus: 22036, signal 933102/1000162 (executing program) 2021/01/14 17:24:30 fetching corpus: 22086, signal 933559/1000370 (executing program) 2021/01/14 17:24:30 fetching corpus: 22135, signal 934087/1000603 (executing program) 2021/01/14 17:24:30 fetching corpus: 22184, signal 934479/1000793 (executing program) 2021/01/14 17:24:31 fetching corpus: 22234, signal 935211/1001011 (executing program) 2021/01/14 17:24:31 fetching corpus: 22283, signal 935811/1001217 (executing program) 2021/01/14 17:24:31 fetching corpus: 22331, signal 936477/1001437 (executing program) 2021/01/14 17:24:31 fetching corpus: 22378, signal 936913/1001633 (executing program) 2021/01/14 17:24:31 fetching corpus: 22427, signal 937862/1001888 (executing program) 2021/01/14 17:24:32 fetching corpus: 22477, signal 938227/1002066 (executing program) 2021/01/14 17:24:32 fetching corpus: 22527, signal 939147/1002310 (executing program) 2021/01/14 17:24:32 fetching corpus: 22575, signal 939699/1002520 (executing program) 2021/01/14 17:24:32 fetching corpus: 22624, signal 940255/1002717 (executing program) 2021/01/14 17:24:32 fetching corpus: 22674, signal 940945/1002932 (executing program) 2021/01/14 17:24:33 fetching corpus: 22724, signal 941403/1003137 (executing program) 2021/01/14 17:24:33 fetching corpus: 22771, signal 941769/1003296 (executing program) 2021/01/14 17:24:33 fetching corpus: 22821, signal 942332/1003470 (executing program) 2021/01/14 17:24:33 fetching corpus: 22870, signal 942973/1003672 (executing program) 2021/01/14 17:24:34 fetching corpus: 22920, signal 943446/1003854 (executing program) 2021/01/14 17:24:34 fetching corpus: 22970, signal 944122/1004035 (executing program) 2021/01/14 17:24:34 fetching corpus: 23019, signal 944760/1004275 (executing program) 2021/01/14 17:24:34 fetching corpus: 23068, signal 945190/1004443 (executing program) 2021/01/14 17:24:35 fetching corpus: 23117, signal 945653/1004633 (executing program) 2021/01/14 17:24:35 fetching corpus: 23167, signal 947047/1004842 (executing program) 2021/01/14 17:24:35 fetching corpus: 23217, signal 947811/1005024 (executing program) 2021/01/14 17:24:35 fetching corpus: 23266, signal 948144/1005158 (executing program) 2021/01/14 17:24:35 fetching corpus: 23316, signal 948580/1005309 (executing program) 2021/01/14 17:24:36 fetching corpus: 23366, signal 949153/1005471 (executing program) 2021/01/14 17:24:36 fetching corpus: 23416, signal 949569/1005597 (executing program) 2021/01/14 17:24:36 fetching corpus: 23464, signal 949985/1005749 (executing program) 2021/01/14 17:24:36 fetching corpus: 23512, signal 950450/1005917 (executing program) 2021/01/14 17:24:36 fetching corpus: 23561, signal 950827/1006053 (executing program) 2021/01/14 17:24:37 fetching corpus: 23611, signal 951155/1006197 (executing program) 2021/01/14 17:24:37 fetching corpus: 23661, signal 951788/1006346 (executing program) 2021/01/14 17:24:37 fetching corpus: 23711, signal 952338/1006512 (executing program) 2021/01/14 17:24:37 fetching corpus: 23761, signal 953571/1006730 (executing program) 2021/01/14 17:24:37 fetching corpus: 23811, signal 953902/1006865 (executing program) 2021/01/14 17:24:38 fetching corpus: 23861, signal 954367/1007031 (executing program) 2021/01/14 17:24:38 fetching corpus: 23909, signal 954662/1007163 (executing program) 2021/01/14 17:24:38 fetching corpus: 23958, signal 955257/1007339 (executing program) 2021/01/14 17:24:38 fetching corpus: 24005, signal 955897/1007477 (executing program) 2021/01/14 17:24:39 fetching corpus: 24055, signal 956368/1007593 (executing program) 2021/01/14 17:24:39 fetching corpus: 24103, signal 956779/1007707 (executing program) 2021/01/14 17:24:39 fetching corpus: 24153, signal 957452/1007841 (executing program) 2021/01/14 17:24:39 fetching corpus: 24202, signal 957969/1007962 (executing program) 2021/01/14 17:24:39 fetching corpus: 24252, signal 958331/1008122 (executing program) 2021/01/14 17:24:40 fetching corpus: 24302, signal 959118/1008355 (executing program) 2021/01/14 17:24:40 fetching corpus: 24352, signal 959802/1008476 (executing program) 2021/01/14 17:24:40 fetching corpus: 24401, signal 960214/1008624 (executing program) 2021/01/14 17:24:40 fetching corpus: 24451, signal 960686/1008776 (executing program) 2021/01/14 17:24:40 fetching corpus: 24500, signal 961337/1008872 (executing program) 2021/01/14 17:24:41 fetching corpus: 24550, signal 961728/1008964 (executing program) 2021/01/14 17:24:41 fetching corpus: 24599, signal 962278/1009104 (executing program) 2021/01/14 17:24:41 fetching corpus: 24647, signal 962916/1009216 (executing program) 2021/01/14 17:24:41 fetching corpus: 24696, signal 963527/1009401 (executing program) 2021/01/14 17:24:42 fetching corpus: 24746, signal 964147/1009499 (executing program) 2021/01/14 17:24:42 fetching corpus: 24796, signal 964680/1009605 (executing program) 2021/01/14 17:24:42 fetching corpus: 24846, signal 965342/1009735 (executing program) 2021/01/14 17:24:42 fetching corpus: 24895, signal 965737/1009849 (executing program) 2021/01/14 17:24:43 fetching corpus: 24945, signal 966117/1009890 (executing program) 2021/01/14 17:24:43 fetching corpus: 24994, signal 966986/1009897 (executing program) 2021/01/14 17:24:43 fetching corpus: 25043, signal 967391/1009899 (executing program) 2021/01/14 17:24:43 fetching corpus: 25093, signal 967840/1009906 (executing program) 2021/01/14 17:24:43 fetching corpus: 25142, signal 968285/1009906 (executing program) 2021/01/14 17:24:44 fetching corpus: 25192, signal 968987/1009965 (executing program) 2021/01/14 17:24:44 fetching corpus: 25240, signal 969633/1009968 (executing program) 2021/01/14 17:24:44 fetching corpus: 25288, signal 970025/1010022 (executing program) 2021/01/14 17:24:44 fetching corpus: 25337, signal 971077/1010022 (executing program) 2021/01/14 17:24:44 fetching corpus: 25386, signal 971601/1010034 (executing program) 2021/01/14 17:24:45 fetching corpus: 25436, signal 972259/1010069 (executing program) 2021/01/14 17:24:45 fetching corpus: 25485, signal 972760/1010075 (executing program) 2021/01/14 17:24:45 fetching corpus: 25535, signal 973171/1010075 (executing program) 2021/01/14 17:24:45 fetching corpus: 25585, signal 973932/1010075 (executing program) 2021/01/14 17:24:46 fetching corpus: 25634, signal 974400/1010075 (executing program) 2021/01/14 17:24:46 fetching corpus: 25683, signal 975187/1010075 (executing program) 2021/01/14 17:24:46 fetching corpus: 25732, signal 975472/1010083 (executing program) 2021/01/14 17:24:46 fetching corpus: 25781, signal 975934/1010118 (executing program) 2021/01/14 17:24:46 fetching corpus: 25831, signal 976280/1010118 (executing program) 2021/01/14 17:24:47 fetching corpus: 25881, signal 976806/1010118 (executing program) 2021/01/14 17:24:47 fetching corpus: 25931, signal 977447/1010167 (executing program) 2021/01/14 17:24:47 fetching corpus: 25981, signal 977842/1010221 (executing program) 2021/01/14 17:24:47 fetching corpus: 26031, signal 978479/1010233 (executing program) 2021/01/14 17:24:47 fetching corpus: 26080, signal 978894/1010235 (executing program) 2021/01/14 17:24:48 fetching corpus: 26129, signal 979255/1010292 (executing program) 2021/01/14 17:24:48 fetching corpus: 26177, signal 979825/1010299 (executing program) 2021/01/14 17:24:48 fetching corpus: 26227, signal 980346/1010325 (executing program) 2021/01/14 17:24:48 fetching corpus: 26276, signal 980997/1010325 (executing program) 2021/01/14 17:24:49 fetching corpus: 26325, signal 981610/1010327 (executing program) 2021/01/14 17:24:49 fetching corpus: 26374, signal 982267/1010327 (executing program) 2021/01/14 17:24:49 fetching corpus: 26424, signal 982583/1010397 (executing program) 2021/01/14 17:24:49 fetching corpus: 26474, signal 983138/1010397 (executing program) 2021/01/14 17:24:50 fetching corpus: 26523, signal 983493/1010414 (executing program) 2021/01/14 17:24:50 fetching corpus: 26573, signal 983856/1010414 (executing program) 2021/01/14 17:24:50 fetching corpus: 26623, signal 984209/1010446 (executing program) 2021/01/14 17:24:50 fetching corpus: 26673, signal 984635/1010446 (executing program) 2021/01/14 17:24:50 fetching corpus: 26723, signal 985073/1010446 (executing program) 2021/01/14 17:24:51 fetching corpus: 26772, signal 985589/1010480 (executing program) 2021/01/14 17:24:51 fetching corpus: 26822, signal 986112/1010480 (executing program) 2021/01/14 17:24:51 fetching corpus: 26872, signal 986526/1010480 (executing program) 2021/01/14 17:24:51 fetching corpus: 26921, signal 987091/1010480 (executing program) 2021/01/14 17:24:52 fetching corpus: 26971, signal 987514/1010675 (executing program) 2021/01/14 17:24:52 fetching corpus: 27020, signal 987785/1010675 (executing program) 2021/01/14 17:24:52 fetching corpus: 27070, signal 988246/1010675 (executing program) 2021/01/14 17:24:52 fetching corpus: 27120, signal 989120/1010697 (executing program) 2021/01/14 17:24:52 fetching corpus: 27170, signal 989512/1010740 (executing program) 2021/01/14 17:24:52 fetching corpus: 27220, signal 990013/1010846 (executing program) 2021/01/14 17:24:53 fetching corpus: 27269, signal 990490/1010852 (executing program) 2021/01/14 17:24:53 fetching corpus: 27318, signal 990924/1010852 (executing program) 2021/01/14 17:24:53 fetching corpus: 27367, signal 991406/1010906 (executing program) 2021/01/14 17:24:53 fetching corpus: 27417, signal 991807/1010912 (executing program) 2021/01/14 17:24:53 fetching corpus: 27467, signal 992532/1010912 (executing program) 2021/01/14 17:24:54 fetching corpus: 27517, signal 993059/1010930 (executing program) 2021/01/14 17:24:54 fetching corpus: 27567, signal 993544/1010932 (executing program) 2021/01/14 17:24:54 fetching corpus: 27617, signal 994045/1011026 (executing program) 2021/01/14 17:24:54 fetching corpus: 27667, signal 994363/1011026 (executing program) 2021/01/14 17:24:55 fetching corpus: 27717, signal 994650/1011026 (executing program) 2021/01/14 17:24:55 fetching corpus: 27767, signal 995091/1011026 (executing program) 2021/01/14 17:24:55 fetching corpus: 27817, signal 995588/1011038 (executing program) 2021/01/14 17:24:55 fetching corpus: 27867, signal 996307/1011041 (executing program) 2021/01/14 17:24:55 fetching corpus: 27916, signal 996537/1011042 (executing program) 2021/01/14 17:24:56 fetching corpus: 27965, signal 997066/1011068 (executing program) 2021/01/14 17:24:56 fetching corpus: 28015, signal 997626/1011088 (executing program) 2021/01/14 17:24:56 fetching corpus: 28064, signal 998190/1011099 (executing program) 2021/01/14 17:24:56 fetching corpus: 28114, signal 998678/1011100 (executing program) 2021/01/14 17:24:57 fetching corpus: 28164, signal 999212/1011181 (executing program) 2021/01/14 17:24:57 fetching corpus: 28214, signal 999560/1011181 (executing program) 2021/01/14 17:24:57 fetching corpus: 28263, signal 1000007/1011181 (executing program) 2021/01/14 17:24:57 fetching corpus: 28313, signal 1000350/1011181 (executing program) 2021/01/14 17:24:58 fetching corpus: 28363, signal 1000913/1011181 (executing program) 2021/01/14 17:24:58 fetching corpus: 28412, signal 1001196/1011181 (executing program) 2021/01/14 17:24:58 fetching corpus: 28462, signal 1002017/1011187 (executing program) 2021/01/14 17:24:58 fetching corpus: 28512, signal 1002357/1011212 (executing program) 2021/01/14 17:24:58 fetching corpus: 28552, signal 1002789/1011212 (executing program) 2021/01/14 17:24:58 fetching corpus: 28554, signal 1002850/1011212 (executing program) 2021/01/14 17:24:58 fetching corpus: 28554, signal 1002850/1011212 (executing program) 2021/01/14 17:25:00 starting 6 fuzzer processes 17:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000000080)={0x4c, 0x26, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x300, 0x0, [0x0, 0xffffffff]}}}, 0x4c}}, 0x0) 17:25:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) 17:25:01 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c00170100000000011700080000000008007809140b2a3a08020000010000010a00660069006c00650030", 0xa3, 0x8b000}], 0x0, &(0x7f0000000340)) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) fcntl$setflags(r0, 0x2, 0x0) dup(0xffffffffffffffff) ioctl$CHAR_RAW_REPORTZONE(r1, 0xc0101282, &(0x7f0000000b80)={0xffffffffffffff65, 0x3, 0x0, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x6}, {0x3800, 0x0, 0x65fd, 0x5, 0x0, 0x0, 0x81}]}) 17:25:01 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000380), 0x4) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 17:25:02 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f0000000040)=0x7, 0x4) 17:25:02 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) syzkaller login: [ 210.232523][ T8480] IPVS: ftp: loaded support on port[0] = 21 [ 210.471226][ T8482] IPVS: ftp: loaded support on port[0] = 21 [ 210.488464][ T8480] chnl_net:caif_netlink_parms(): no params data found [ 210.735023][ T8484] IPVS: ftp: loaded support on port[0] = 21 [ 210.772281][ T8480] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.780355][ T8480] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.788933][ T8480] device bridge_slave_0 entered promiscuous mode [ 210.813329][ T8480] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.822854][ T8480] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.836294][ T8480] device bridge_slave_1 entered promiscuous mode [ 210.970300][ T8486] IPVS: ftp: loaded support on port[0] = 21 [ 211.003619][ T8480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.089272][ T8480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.147080][ T8482] chnl_net:caif_netlink_parms(): no params data found [ 211.163290][ T8488] IPVS: ftp: loaded support on port[0] = 21 [ 211.178846][ T8480] team0: Port device team_slave_0 added [ 211.213947][ T8480] team0: Port device team_slave_1 added [ 211.334248][ T8480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 211.341661][ T8480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.368405][ T8480] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 211.403277][ T8480] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 211.410325][ T8480] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.438238][ T8480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 211.575044][ T8480] device hsr_slave_0 entered promiscuous mode [ 211.584286][ T8480] device hsr_slave_1 entered promiscuous mode [ 211.604755][ T8482] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.612736][ T8482] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.621475][ T8482] device bridge_slave_0 entered promiscuous mode [ 211.631633][ T8484] chnl_net:caif_netlink_parms(): no params data found [ 211.667668][ T8482] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.674786][ T8482] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.684049][ T8482] device bridge_slave_1 entered promiscuous mode [ 211.888415][ T8482] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.998209][ T8482] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.026363][ T8486] chnl_net:caif_netlink_parms(): no params data found [ 212.095456][ T8646] IPVS: ftp: loaded support on port[0] = 21 [ 212.121903][ T8488] chnl_net:caif_netlink_parms(): no params data found [ 212.142063][ T8484] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.149777][ T8484] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.159150][ T8484] device bridge_slave_0 entered promiscuous mode [ 212.174075][ T8484] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.181788][ T8484] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.190731][ T8484] device bridge_slave_1 entered promiscuous mode [ 212.221535][ T8482] team0: Port device team_slave_0 added [ 212.234173][ T8482] team0: Port device team_slave_1 added [ 212.257960][ T3218] Bluetooth: hci0: command 0x0409 tx timeout [ 212.336049][ T8484] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.370319][ T8482] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 212.384815][ T8482] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.413705][ T8482] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 212.425040][ T3822] Bluetooth: hci1: command 0x0409 tx timeout [ 212.439847][ T8486] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.447313][ T8486] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.455229][ T8486] device bridge_slave_0 entered promiscuous mode [ 212.470107][ T8484] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.490114][ T8482] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 212.497418][ T8482] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.524119][ T8482] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 212.537491][ T8486] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.545198][ T8486] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.553719][ T8486] device bridge_slave_1 entered promiscuous mode [ 212.639656][ T8484] team0: Port device team_slave_0 added [ 212.656661][ T20] Bluetooth: hci2: command 0x0409 tx timeout [ 212.690752][ T8484] team0: Port device team_slave_1 added [ 212.699792][ T8488] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.707380][ T8488] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.715807][ T8488] device bridge_slave_0 entered promiscuous mode [ 212.733828][ T8482] device hsr_slave_0 entered promiscuous mode [ 212.741590][ T8482] device hsr_slave_1 entered promiscuous mode [ 212.750270][ T8482] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 212.758650][ T8482] Cannot create hsr debugfs directory [ 212.766276][ T8486] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.791966][ T8488] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.800485][ T8488] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.809292][ T8488] device bridge_slave_1 entered promiscuous mode [ 212.831073][ T8486] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.898102][ T3822] Bluetooth: hci3: command 0x0409 tx timeout [ 212.908897][ T8484] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 212.915979][ T8484] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.945180][ T8484] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 212.966235][ T8484] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 212.975936][ T8484] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.002802][ T8484] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.064068][ T8480] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 213.076301][ T8488] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.090889][ T8488] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.127883][ T8486] team0: Port device team_slave_0 added [ 213.136251][ T8480] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 213.136705][ T3822] Bluetooth: hci4: command 0x0409 tx timeout [ 213.165741][ T8480] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 213.185276][ T8646] chnl_net:caif_netlink_parms(): no params data found [ 213.199292][ T8486] team0: Port device team_slave_1 added [ 213.220535][ T8480] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 213.269190][ T8488] team0: Port device team_slave_0 added [ 213.284565][ T8484] device hsr_slave_0 entered promiscuous mode [ 213.292592][ T8484] device hsr_slave_1 entered promiscuous mode [ 213.302348][ T8484] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.310915][ T8484] Cannot create hsr debugfs directory [ 213.335001][ T8486] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.342782][ T8486] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.370118][ T8486] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.387203][ T8488] team0: Port device team_slave_1 added [ 213.418647][ T8486] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.425663][ T8486] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.455520][ T8486] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.531488][ T8488] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.538663][ T8488] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.569801][ T8488] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.626177][ T8488] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.636035][ T8488] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.662735][ T8488] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.707276][ T8486] device hsr_slave_0 entered promiscuous mode [ 213.714616][ T8486] device hsr_slave_1 entered promiscuous mode [ 213.722341][ T8486] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.731155][ T8486] Cannot create hsr debugfs directory [ 213.808166][ T8646] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.815309][ T8646] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.826252][ T8646] device bridge_slave_0 entered promiscuous mode [ 213.842048][ T8646] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.849312][ T8646] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.857494][ T5] Bluetooth: hci5: command 0x0409 tx timeout [ 213.858839][ T8646] device bridge_slave_1 entered promiscuous mode [ 213.908740][ T8488] device hsr_slave_0 entered promiscuous mode [ 213.916303][ T8488] device hsr_slave_1 entered promiscuous mode [ 213.924016][ T8488] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.932435][ T8488] Cannot create hsr debugfs directory [ 213.999162][ T8646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.030629][ T8646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.105668][ T8646] team0: Port device team_slave_0 added [ 214.144393][ T8646] team0: Port device team_slave_1 added [ 214.206237][ T8482] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 214.283361][ T8482] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 214.334130][ T8646] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 214.336628][ T20] Bluetooth: hci0: command 0x041b tx timeout [ 214.348659][ T8646] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.375195][ T8646] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 214.389882][ T8646] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 214.397760][ T8646] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.426045][ T8646] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 214.439828][ T8482] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 214.450392][ T8482] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 214.497205][ T3822] Bluetooth: hci1: command 0x041b tx timeout [ 214.537012][ T8484] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 214.562827][ T8484] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 214.599904][ T8646] device hsr_slave_0 entered promiscuous mode [ 214.607196][ T8646] device hsr_slave_1 entered promiscuous mode [ 214.613896][ T8646] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 214.622398][ T8646] Cannot create hsr debugfs directory [ 214.646871][ T8484] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 214.701682][ T8484] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 214.737255][ T8670] Bluetooth: hci2: command 0x041b tx timeout [ 214.748079][ T8480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.808322][ T8488] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 214.842307][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.852641][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.867308][ T8480] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.874506][ T8488] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 214.921038][ T8488] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 214.976569][ T3822] Bluetooth: hci3: command 0x041b tx timeout [ 214.995417][ T8488] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 215.015970][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.033872][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.043914][ T3218] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.051426][ T3218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.064746][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.078506][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.088278][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.098115][ T3218] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.105401][ T3218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.149753][ T8486] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 215.186875][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.196222][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.221747][ T3822] Bluetooth: hci4: command 0x041b tx timeout [ 215.228718][ T8486] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 215.252655][ T8482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.273851][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.287987][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.305202][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.315524][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.329942][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.341354][ T8486] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 215.352127][ T8486] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 215.376786][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.385255][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.433259][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.445276][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.459204][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.468817][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.482511][ T8482] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.498179][ T8484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.519042][ T8480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.559777][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.569627][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.580182][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.588181][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.597676][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.625095][ T8484] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.636282][ T8646] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 215.651723][ T8646] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 215.671922][ T8646] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 215.688226][ T8646] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 215.718117][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.735194][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.761855][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.775577][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.785381][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.793146][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.842226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.852767][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.861658][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.869999][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.879850][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.887829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.922097][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.931564][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.937084][ T3822] Bluetooth: hci5: command 0x041b tx timeout [ 215.942692][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.957935][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.968071][ T9786] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.975237][ T9786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.983531][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.016689][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.035970][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.056815][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.092536][ T8480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.113126][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.123529][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.154605][ T8488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.169952][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.179809][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.192335][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.202208][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.211442][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.221886][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.247622][ T8486] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.286604][ T8484] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.302189][ T8484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.314768][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.323541][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.333806][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.343297][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.354217][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.364098][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.373595][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.383499][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.393022][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.413447][ T8486] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.425644][ T8670] Bluetooth: hci0: command 0x040f tx timeout [ 216.441072][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.456995][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.465533][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.474252][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.483118][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.514925][ T8488] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.525215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.537969][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.547114][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.554490][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.577030][ T8670] Bluetooth: hci1: command 0x040f tx timeout [ 216.607724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.616225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.630087][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.641742][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.648974][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.658287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.668249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.678844][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.689884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.699239][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.706593][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.715851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.726166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.733941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.766329][ T8484] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.801481][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.810859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.821829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.825244][ T20] Bluetooth: hci2: command 0x040f tx timeout [ 216.832159][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.843953][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.853593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.865335][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.875575][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.885656][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.895723][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.906030][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.918417][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.927701][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.935982][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.962998][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.987886][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.998133][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.008443][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.018824][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.029006][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.049886][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.057289][ T20] Bluetooth: hci3: command 0x040f tx timeout [ 217.067480][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.078731][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.110376][ T8480] device veth0_vlan entered promiscuous mode [ 217.161929][ T8482] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.175287][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.188622][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.202469][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.212648][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.222719][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.258886][ T8646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.289024][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.297373][ T20] Bluetooth: hci4: command 0x040f tx timeout [ 217.315412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.324604][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.335012][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.344409][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.354870][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.363571][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.401069][ T8484] device veth0_vlan entered promiscuous mode [ 217.424113][ T8480] device veth1_vlan entered promiscuous mode [ 217.433723][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.444019][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.453762][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.462680][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.473066][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.488412][ T8646] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.509307][ T8484] device veth1_vlan entered promiscuous mode [ 217.538537][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.547642][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.555277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.564686][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.574257][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.584188][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.594698][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.607374][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.614901][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.627797][ T8486] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.667234][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.684083][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.693478][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.702732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.712102][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.721611][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.732507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.742752][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.750774][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.771499][ T8488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.797973][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.870256][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.881490][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.890784][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.902553][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.912731][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.922987][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.933009][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.942391][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.950439][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.960984][ T8484] device veth0_macvtap entered promiscuous mode [ 217.978868][ T8482] device veth0_vlan entered promiscuous mode [ 217.994823][ T8488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.007412][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.016088][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.024916][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.035446][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.057206][ T20] Bluetooth: hci5: command 0x040f tx timeout [ 218.059358][ T8484] device veth1_macvtap entered promiscuous mode [ 218.097157][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.105639][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.118477][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.128961][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.140271][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.150337][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.160360][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.170794][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.194831][ T8482] device veth1_vlan entered promiscuous mode [ 218.222082][ T8480] device veth0_macvtap entered promiscuous mode [ 218.258797][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.271212][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.282125][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.292262][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.303158][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.318563][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.335796][ T8484] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.349748][ T8480] device veth1_macvtap entered promiscuous mode [ 218.359603][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.375453][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.386177][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.403205][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.413844][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.426359][ T8486] device veth0_vlan entered promiscuous mode [ 218.477811][ T8480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.490789][ T8480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.505148][ T3822] Bluetooth: hci0: command 0x0419 tx timeout [ 218.513441][ T8480] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.527064][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.536001][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.545695][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.555437][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.568569][ T8484] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.584365][ T8486] device veth1_vlan entered promiscuous mode [ 218.613895][ T8480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.626274][ T8480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.639628][ T8480] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.650259][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 218.660277][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.670469][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.680544][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.690882][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.701305][ T20] Bluetooth: hci1: command 0x0419 tx timeout [ 218.702300][ T8482] device veth0_macvtap entered promiscuous mode [ 218.738766][ T8484] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.750705][ T8484] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.760325][ T8484] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.772567][ T8484] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.795584][ T8480] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.806956][ T8480] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.821459][ T8480] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.830637][ T8480] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.847841][ T8482] device veth1_macvtap entered promiscuous mode [ 218.859992][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 218.869576][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.879090][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.888318][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.899598][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.909846][ T20] Bluetooth: hci2: command 0x0419 tx timeout [ 218.934725][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 218.943775][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 218.995904][ T8646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.051659][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.062283][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.073058][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.084300][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.123224][ T8486] device veth0_macvtap entered promiscuous mode [ 219.145734][ T9788] Bluetooth: hci3: command 0x0419 tx timeout [ 219.187031][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.196345][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.213107][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.227887][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.240185][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.251791][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.264773][ T8482] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 219.274221][ T8488] device veth0_vlan entered promiscuous mode [ 219.296320][ T8488] device veth1_vlan entered promiscuous mode [ 219.360386][ T8486] device veth1_macvtap entered promiscuous mode [ 219.386183][ T8670] Bluetooth: hci4: command 0x0419 tx timeout [ 219.401021][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 219.416300][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.434276][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.458123][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.474759][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.488991][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.500271][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.519121][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.532298][ T8482] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 219.589893][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.605630][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.621836][ T8482] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.634766][ T8482] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.645234][ T8482] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.656464][ T8482] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.725466][ T8486] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.747645][ T8486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.759285][ T8486] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.771240][ T8486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.785151][ T8486] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.796840][ T8486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.809225][ T8486] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 219.855435][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.855792][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 219.876176][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 219.881912][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.894984][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.904575][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.914165][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 219.934071][ T8486] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.949885][ T8486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.961424][ T8486] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.974169][ T8486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.985543][ T8486] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.996600][ T8486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.008852][ T8486] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 220.054702][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.056170][ T111] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 220.064886][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.082791][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.093128][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.097318][ T9802] Bluetooth: hci5: command 0x0419 tx timeout [ 220.110184][ T111] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 220.113664][ T8486] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.135656][ T8486] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.145123][ T8486] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.166861][ T8486] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.195953][ T8488] device veth0_macvtap entered promiscuous mode [ 220.226794][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 220.252507][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 220.279937][ T8488] device veth1_macvtap entered promiscuous mode [ 220.321207][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.331558][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.345077][ T8646] device veth0_vlan entered promiscuous mode [ 220.378010][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 220.386399][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 220.424582][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.442628][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.452698][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 220.477084][ T8488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.491370][ T8488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.503861][ T8488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.516210][ T8488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.530402][ T8488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.541800][ T8488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.551978][ T8488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.562778][ T8488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.574934][ T8488] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 220.609771][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.638261][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.690382][ T8488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.715188][ T8488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.728690][ T8488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.743614][ T8488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.754718][ T8488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.768626][ T8488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.787666][ T9851] loop2: detected capacity change from 2224 to 0 [ 220.797805][ T8488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.824808][ T8488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.847441][ T8488] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 220.867075][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 17:25:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x17e}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x17e}) [ 220.902949][ T8646] device veth1_vlan entered promiscuous mode [ 220.910118][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 220.929588][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 220.939299][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.949750][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.960207][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 220.982166][ T8488] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.996227][ T8488] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.013823][ T8488] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.027529][ T8488] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.103228][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 221.135477][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 221.157098][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 221.213337][ T111] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 221.252953][ T111] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 221.291111][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 221.319151][ T9876] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 221.349094][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 221.366983][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 221.380511][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 17:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000000080)={0x4c, 0x26, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x300, 0x0, [0x0, 0xffffffff]}}}, 0x4c}}, 0x0) [ 221.410977][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 221.419070][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.443743][ T8646] device veth0_macvtap entered promiscuous mode 17:25:13 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f00000038c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 221.521656][ T8646] device veth1_macvtap entered promiscuous mode [ 221.555030][ T9895] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 221.580477][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 221.604213][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.619612][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000000080)={0x4c, 0x26, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x300, 0x0, [0x0, 0xffffffff]}}}, 0x4c}}, 0x0) [ 221.716285][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 221.732181][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 221.766738][ C1] hrtimer: interrupt took 74646 ns [ 221.876405][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 221.919021][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 221.934221][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.974822][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 222.054000][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.057034][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 222.142571][ T9916] IPVS: ftp: loaded support on port[0] = 21 [ 222.155052][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.255423][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.285116][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.313509][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.335369][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.389922][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.434432][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.470300][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.483971][ T8646] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 222.496481][ T9915] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 222.518395][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 17:25:14 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f00000038c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 17:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000000080)={0x4c, 0x26, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x300, 0x0, [0x0, 0xffffffff]}}}, 0x4c}}, 0x0) [ 222.543589][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.584837][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.653999][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.683283][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.700627][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.720807][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.745655][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.768025][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.790969][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.803701][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 222.809932][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.863768][ T9929] IPVS: ftp: loaded support on port[0] = 21 [ 222.876234][ T8646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.909791][ T8646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.931960][ T8646] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 222.989244][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.001735][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.023333][ T8646] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.044501][ T8646] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.065910][ T8646] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.086461][ T8646] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.133766][ T9943] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 223.162550][ T235] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 223.212495][ T235] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:25:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) [ 223.338614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 223.445050][ T9969] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 223.716629][ T111] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 223.744186][ T111] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 223.766467][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 223.849143][ T55] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 223.900455][ T55] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 223.925491][ T9786] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 224.127583][T10021] ptrace attach of "/root/syz-executor.5"[10019] was attempted by "/root/syz-executor.5"[10021] 17:25:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) 17:25:18 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000380), 0x4) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 17:25:18 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f00000038c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 17:25:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) 17:25:18 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f0000000040)=0x7, 0x4) 17:25:18 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 17:25:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) 17:25:19 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f0000000040)=0x7, 0x4) [ 226.786413][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 226.933337][T10043] IPVS: ftp: loaded support on port[0] = 21 17:25:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) 17:25:19 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f00000038c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07ad6706000002000000070600000ee60000bf2500000000000063350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad300100000000008400000000000000050000000000000095000000000000006e8ad524a56601a5984e4dc87ca658e5f2e9407e5c2501d119febf3a1b93db85604036883647b1fb3f1403b816f511c8c56e56e40b00dcf22cf648bc0c78a8a79720095505f8a89dae4293b1263631b25fc9f189084c7fddccff01361d355fa1d5f29b98371efc726cce8ec2abcdf1bc9040daef2cfa2046e234659c11091e269f4734ffa55eb2d4e8d62098698808b365b46bd54c68cd30139a8c3827a7dd6d6e2b5fea3906f8456b"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 17:25:19 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f0000000040)=0x7, 0x4) 17:25:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) [ 227.426724][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:25:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) 17:25:19 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000380), 0x4) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 17:25:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) 17:25:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) [ 227.694007][T10081] IPVS: ftp: loaded support on port[0] = 21 [ 227.721074][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 227.820065][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 227.953348][T10088] IPVS: ftp: loaded support on port[0] = 21 [ 228.158473][T10112] IPVS: ftp: loaded support on port[0] = 21 [ 228.383596][T10085] IPVS: ftp: loaded support on port[0] = 21 17:25:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) [ 228.797557][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 229.139610][T10179] IPVS: ftp: loaded support on port[0] = 21 17:25:21 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 17:25:21 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000380), 0x4) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 17:25:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) 17:25:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) 17:25:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) [ 229.789693][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 229.791805][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:25:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) [ 229.866273][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 229.963046][T10221] IPVS: ftp: loaded support on port[0] = 21 [ 230.299987][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 230.331551][T10217] IPVS: ftp: loaded support on port[0] = 21 17:25:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000700)=@filter={'filter\x00', 0xe, 0x4, 0x320, 0x198, 0x98, 0x1f0, 0x98, 0x0, 0x230, 0x288, 0x288, 0x288, 0x230, 0x4, 0x0, {[{{@ip={@multicast1, @multicast2, 0x0, 0x0, 'ip_vti0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0x130, 0x158, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "3b959eac5d84c743692a0fea97b731b7387ee5ffbde33d329fad7b33b3293dd238a02501c19014fb8c1073a60cc0fa43fd80aaa91e3631d576e2dfd44634b9684ceb4bb727a59e468ebf8920fcd3eaed0ea8efa633d3eec5d08eb38b0a552ac8b34fcde5e3bc246d9e87f76e6c47e03371b00e279d7297f9632deaeca8ebcd92", 0x1d, 0x2}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@multicast2, @private, 0x0, 0x0, 'syzkaller0\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x380) [ 230.621447][T10218] IPVS: ftp: loaded support on port[0] = 21 17:25:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) [ 230.781825][T10229] IPVS: ftp: loaded support on port[0] = 21 [ 230.920672][T10279] x_tables: duplicate underflow at hook 2 [ 230.982950][T10279] x_tables: duplicate underflow at hook 2 [ 231.081185][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:25:23 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000400)={'trans=unix,', {[{@privport='privport'}, {@version_L='version=9p2000.L'}, {@version_9p2000='version=9p2000'}], [{@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, '+\'@.\x15'}}]}}) [ 231.544032][T10312] 9pnet: p9_fd_create_unix (10312): problem connecting socket: ./file0: -111 [ 231.597045][T10287] IPVS: ftp: loaded support on port[0] = 21 17:25:24 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000400)={'trans=unix,', {[{@privport='privport'}, {@version_L='version=9p2000.L'}, {@version_9p2000='version=9p2000'}], [{@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, '+\'@.\x15'}}]}}) [ 232.181155][T10340] 9pnet: p9_fd_create_unix (10340): problem connecting socket: ./file0: -111 17:25:24 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000400)={'trans=unix,', {[{@privport='privport'}, {@version_L='version=9p2000.L'}, {@version_9p2000='version=9p2000'}], [{@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, '+\'@.\x15'}}]}}) 17:25:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0x10) [ 232.575282][T10367] 9pnet: p9_fd_create_unix (10367): problem connecting socket: ./file0: -111 17:25:25 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 17:25:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0x10) 17:25:25 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000400)={'trans=unix,', {[{@privport='privport'}, {@version_L='version=9p2000.L'}, {@version_9p2000='version=9p2000'}], [{@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, '+\'@.\x15'}}]}}) [ 233.121791][T10376] 9pnet: p9_fd_create_unix (10376): problem connecting socket: ./file0: -111 17:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup2(r0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/159) [ 236.535612][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 236.742782][T10387] IPVS: ftp: loaded support on port[0] = 21 17:25:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0x10) 17:25:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 17:25:29 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000140)=0xffffffffffffff9a) 17:25:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0x10) 17:25:29 executing program 1: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 17:25:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 17:25:29 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x101441) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000700)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000003c00018038000400200001000a0000000000000020010000000000000000000000000000000000001400020002000000ff"], 0x50}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xbb8) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/11) 17:25:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4020aeb2, &(0x7f0000000000)) 17:25:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000040)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'none\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x60, &(0x7f0000000000)={0x0, @broadcast, 0x0, 0x0, 'sed\x00', 0x0, 0x0, 0x4000}, 0x2c) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 237.458232][T10412] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:25:29 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x101441) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000700)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000003c00018038000400200001000a0000000000000020010000000000000000000000000000000000001400020002000000ff"], 0x50}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xbb8) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/11) 17:25:29 executing program 1: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 17:25:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 17:25:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x101441) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000700)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000003c00018038000400200001000a0000000000000020010000000000000000000000000000000000001400020002000000ff"], 0x50}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xbb8) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/11) 17:25:33 executing program 1: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 17:25:33 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x101441) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000700)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000003c00018038000400200001000a0000000000000020010000000000000000000000000000000000001400020002000000ff"], 0x50}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xbb8) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/11) 17:25:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000040)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'none\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x60, &(0x7f0000000000)={0x0, @broadcast, 0x0, 0x0, 'sed\x00', 0x0, 0x0, 0x4000}, 0x2c) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:25:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/424]}, 0x220) 17:25:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x101441) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000700)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000003c00018038000400200001000a0000000000000020010000000000000000000000000000000000001400020002000000ff"], 0x50}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xbb8) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/11) 17:25:33 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x101441) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000700)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000003c00018038000400200001000a0000000000000020010000000000000000000000000000000000001400020002000000ff"], 0x50}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xbb8) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/11) 17:25:33 executing program 1: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 17:25:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 17:25:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/424]}, 0x220) 17:25:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x101441) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000700)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000003c00018038000400200001000a0000000000000020010000000000000000000000000000000000001400020002000000ff"], 0x50}}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xbb8) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/11) 17:25:33 executing program 5: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)='\x00NSR03', 0x6, 0x8800}, {&(0x7f0000011100)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011300)="000103006e0001003a1ef001200000007810e4070913142c1643092d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011400)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000600000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000000000000000000000000000000000002000040", 0xf5, 0xa80e0}, {&(0x7f0000012800)="0100030079000100cbf1f001c00700000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xf8000}, {&(0x7f0000012900)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xf80c0}, {&(0x7f0000012a00)="000000000000000001000000000000000000000000000000000000000000000006000300c8000100fd10e801c107000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xf81e0}, {&(0x7f0000012b00)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xf82c0}, {&(0x7f0000012c00)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e007000000000000000000000000000000000000050003009a000100cd0af001c20700000500000001000000002b4e535230330000000000000000000000000000000000000000000000000000000000000000000002", 0xa2, 0xf83a0}, {&(0x7f0000012d00)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xf84a0}, {&(0x7f0000012e00)="07000300a30001009d092800c30700000600000004000000002600004d00000000b60000a5000000003e00000101000000340000e507", 0x36, 0xf8600}, {&(0x7f0000012f00)="040003005d0001003168f001c407000004000000002a554446204c5620496e666f00000000000000000000000102040500000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xf8800}, {&(0x7f0000013000)="0000000000000000000000000000000000000009084c696e7578206d6b756466667320322e32000000000000000000000000000000000012084c696e757820756466746f6f6c7320322e3200000000000000000000000000000000130868747470733a2f2f6769746875622e636f6d2f70616c692f756466746f6f6c732f0022002a4c696e757820554446465300000000000000000000000405", 0x9a, 0xf88e0}, {&(0x7f0000013100)="08000300c90001000000f001c507", 0xe, 0xf8a00}], 0x0, &(0x7f0000013500)) 17:25:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/424]}, 0x220) 17:25:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_SSID={0x5, 0x34, @random="87"}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BSS_BASIC_RATES={0x4}]}, 0x30}}, 0x0) 17:25:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newnexthop={0x18, 0x68, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x2}}, 0x18}}, 0x0) [ 241.643889][T10501] loop5: detected capacity change from 3978 to 0 [ 241.663552][T10501] UDF-fs: error (device loop5): udf_process_sequence: Primary Volume Descriptor not found! [ 241.677330][T10501] UDF-fs: warning (device loop5): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount [ 241.743996][T10501] loop5: detected capacity change from 3978 to 0 [ 241.765626][T10501] UDF-fs: error (device loop5): udf_process_sequence: Primary Volume Descriptor not found! [ 241.823259][T10501] UDF-fs: warning (device loop5): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount 17:25:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000040)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'none\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x60, &(0x7f0000000000)={0x0, @broadcast, 0x0, 0x0, 'sed\x00', 0x0, 0x0, 0x4000}, 0x2c) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:25:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/424]}, 0x220) 17:25:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_SSID={0x5, 0x34, @random="87"}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BSS_BASIC_RATES={0x4}]}, 0x30}}, 0x0) 17:25:36 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/215, 0x72}], 0x1) 17:25:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newnexthop={0x18, 0x68, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x2}}, 0x18}}, 0x0) 17:25:36 executing program 5: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)='\x00NSR03', 0x6, 0x8800}, {&(0x7f0000011100)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011300)="000103006e0001003a1ef001200000007810e4070913142c1643092d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011400)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000600000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000000000000000000000000000000000002000040", 0xf5, 0xa80e0}, {&(0x7f0000012800)="0100030079000100cbf1f001c00700000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xf8000}, {&(0x7f0000012900)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xf80c0}, {&(0x7f0000012a00)="000000000000000001000000000000000000000000000000000000000000000006000300c8000100fd10e801c107000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xf81e0}, {&(0x7f0000012b00)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xf82c0}, {&(0x7f0000012c00)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e007000000000000000000000000000000000000050003009a000100cd0af001c20700000500000001000000002b4e535230330000000000000000000000000000000000000000000000000000000000000000000002", 0xa2, 0xf83a0}, {&(0x7f0000012d00)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xf84a0}, {&(0x7f0000012e00)="07000300a30001009d092800c30700000600000004000000002600004d00000000b60000a5000000003e00000101000000340000e507", 0x36, 0xf8600}, {&(0x7f0000012f00)="040003005d0001003168f001c407000004000000002a554446204c5620496e666f00000000000000000000000102040500000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xf8800}, {&(0x7f0000013000)="0000000000000000000000000000000000000009084c696e7578206d6b756466667320322e32000000000000000000000000000000000012084c696e757820756466746f6f6c7320322e3200000000000000000000000000000000130868747470733a2f2f6769746875622e636f6d2f70616c692f756466746f6f6c732f0022002a4c696e757820554446465300000000000000000000000405", 0x9a, 0xf88e0}, {&(0x7f0000013100)="08000300c90001000000f001c507", 0xe, 0xf8a00}], 0x0, &(0x7f0000013500)) 17:25:36 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:25:36 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/215, 0x72}], 0x1) 17:25:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newnexthop={0x18, 0x68, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x2}}, 0x18}}, 0x0) [ 244.201864][T10534] loop5: detected capacity change from 3978 to 0 [ 244.223791][T10534] UDF-fs: error (device loop5): udf_process_sequence: Primary Volume Descriptor not found! [ 244.240920][T10534] UDF-fs: warning (device loop5): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount 17:25:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_SSID={0x5, 0x34, @random="87"}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BSS_BASIC_RATES={0x4}]}, 0x30}}, 0x0) 17:25:36 executing program 5: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)='\x00NSR03', 0x6, 0x8800}, {&(0x7f0000011100)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011300)="000103006e0001003a1ef001200000007810e4070913142c1643092d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011400)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000600000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000000000000000000000000000000000002000040", 0xf5, 0xa80e0}, {&(0x7f0000012800)="0100030079000100cbf1f001c00700000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xf8000}, {&(0x7f0000012900)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xf80c0}, {&(0x7f0000012a00)="000000000000000001000000000000000000000000000000000000000000000006000300c8000100fd10e801c107000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xf81e0}, {&(0x7f0000012b00)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xf82c0}, {&(0x7f0000012c00)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e007000000000000000000000000000000000000050003009a000100cd0af001c20700000500000001000000002b4e535230330000000000000000000000000000000000000000000000000000000000000000000002", 0xa2, 0xf83a0}, {&(0x7f0000012d00)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xf84a0}, {&(0x7f0000012e00)="07000300a30001009d092800c30700000600000004000000002600004d00000000b60000a5000000003e00000101000000340000e507", 0x36, 0xf8600}, {&(0x7f0000012f00)="040003005d0001003168f001c407000004000000002a554446204c5620496e666f00000000000000000000000102040500000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xf8800}, {&(0x7f0000013000)="0000000000000000000000000000000000000009084c696e7578206d6b756466667320322e32000000000000000000000000000000000012084c696e757820756466746f6f6c7320322e3200000000000000000000000000000000130868747470733a2f2f6769746875622e636f6d2f70616c692f756466746f6f6c732f0022002a4c696e757820554446465300000000000000000000000405", 0x9a, 0xf88e0}, {&(0x7f0000013100)="08000300c90001000000f001c507", 0xe, 0xf8a00}], 0x0, &(0x7f0000013500)) 17:25:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newnexthop={0x18, 0x68, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x2}}, 0x18}}, 0x0) [ 244.486113][T10546] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) [ 244.538430][T10552] loop5: detected capacity change from 3978 to 0 [ 244.567388][T10552] UDF-fs: error (device loop5): udf_process_sequence: Primary Volume Descriptor not found! [ 244.614074][T10552] UDF-fs: warning (device loop5): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount [ 244.724704][T10546] device syzkaller1 entered promiscuous mode 17:25:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_SSID={0x5, 0x34, @random="87"}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BSS_BASIC_RATES={0x4}]}, 0x30}}, 0x0) 17:25:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:25:39 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/215, 0x72}], 0x1) 17:25:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000040)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'none\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x60, &(0x7f0000000000)={0x0, @broadcast, 0x0, 0x0, 'sed\x00', 0x0, 0x0, 0x4000}, 0x2c) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:25:39 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0xfffffffffffffffd) 17:25:39 executing program 5: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)='\x00NSR03', 0x6, 0x8800}, {&(0x7f0000011100)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011300)="000103006e0001003a1ef001200000007810e4070913142c1643092d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011400)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000600000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000000000000000000000000000000000002000040", 0xf5, 0xa80e0}, {&(0x7f0000012800)="0100030079000100cbf1f001c00700000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xf8000}, {&(0x7f0000012900)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xf80c0}, {&(0x7f0000012a00)="000000000000000001000000000000000000000000000000000000000000000006000300c8000100fd10e801c107000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xf81e0}, {&(0x7f0000012b00)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xf82c0}, {&(0x7f0000012c00)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e007000000000000000000000000000000000000050003009a000100cd0af001c20700000500000001000000002b4e535230330000000000000000000000000000000000000000000000000000000000000000000002", 0xa2, 0xf83a0}, {&(0x7f0000012d00)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xf84a0}, {&(0x7f0000012e00)="07000300a30001009d092800c30700000600000004000000002600004d00000000b60000a5000000003e00000101000000340000e507", 0x36, 0xf8600}, {&(0x7f0000012f00)="040003005d0001003168f001c407000004000000002a554446204c5620496e666f00000000000000000000000102040500000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xf8800}, {&(0x7f0000013000)="0000000000000000000000000000000000000009084c696e7578206d6b756466667320322e32000000000000000000000000000000000012084c696e757820756466746f6f6c7320322e3200000000000000000000000000000000130868747470733a2f2f6769746875622e636f6d2f70616c692f756466746f6f6c732f0022002a4c696e757820554446465300000000000000000000000405", 0x9a, 0xf88e0}, {&(0x7f0000013100)="08000300c90001000000f001c507", 0xe, 0xf8a00}], 0x0, &(0x7f0000013500)) [ 247.323003][T10597] loop5: detected capacity change from 3978 to 0 [ 247.355724][T10597] UDF-fs: error (device loop5): udf_process_sequence: Primary Volume Descriptor not found! 17:25:39 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/215, 0x72}], 0x1) [ 247.408852][T10594] device syzkaller1 entered promiscuous mode [ 247.438524][T10597] UDF-fs: warning (device loop5): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount 17:25:39 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0xfffffffffffffffd) 17:25:39 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0xfffffffffffffffd) 17:25:40 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0xfffffffffffffffd) 17:25:40 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0xfffffffffffffffd) 17:25:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:25:40 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x18100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80, 0xdc1fea9b024c988a) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000600)) fcntl$addseals(r2, 0x409, 0x6) setresgid(0xee00, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x750, {}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x0, @multicast2}, 0x45, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x6, 0x4000000000000000}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) unshare(0x60000000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') pipe(&(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002abd7008fcdbdd257c00000008000300", @ANYRES32=r4, @ANYBLOB="0a00060008021100000100000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a0006000802110000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x24044010) r5 = socket$inet_icmp(0x2, 0x2, 0x1) getsockname(r5, &(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000440)=0xc2) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') setxattr$trusted_overlay_upper(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fb6507ff77df4aa5a117c0ed805af6e7d01d5c684a833e68ccb9d95ac409152d433b20eaf8d1010000869c77a6be15444b321a8b953255bfbd5e0b612b6beb6f38b8fc6b"], 0x45, 0x1) preadv(r6, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/68, 0x44}, {&(0x7f00000001c0)=""/44, 0x2c}], 0x2, 0x48, 0xfffffffe) [ 248.073189][T10629] IPVS: ftp: loaded support on port[0] = 21 [ 248.181697][T10623] device syzkaller1 entered promiscuous mode 17:25:42 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x18100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80, 0xdc1fea9b024c988a) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000600)) fcntl$addseals(r2, 0x409, 0x6) setresgid(0xee00, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x750, {}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x0, @multicast2}, 0x45, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x6, 0x4000000000000000}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) unshare(0x60000000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') pipe(&(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002abd7008fcdbdd257c00000008000300", @ANYRES32=r4, @ANYBLOB="0a00060008021100000100000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a0006000802110000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x24044010) r5 = socket$inet_icmp(0x2, 0x2, 0x1) getsockname(r5, &(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000440)=0xc2) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') setxattr$trusted_overlay_upper(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fb6507ff77df4aa5a117c0ed805af6e7d01d5c684a833e68ccb9d95ac409152d433b20eaf8d1010000869c77a6be15444b321a8b953255bfbd5e0b612b6beb6f38b8fc6b"], 0x45, 0x1) preadv(r6, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/68, 0x44}, {&(0x7f00000001c0)=""/44, 0x2c}], 0x2, 0x48, 0xfffffffe) 17:25:42 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x18100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80, 0xdc1fea9b024c988a) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000600)) fcntl$addseals(r2, 0x409, 0x6) setresgid(0xee00, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x750, {}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x0, @multicast2}, 0x45, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x6, 0x4000000000000000}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) unshare(0x60000000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') pipe(&(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002abd7008fcdbdd257c00000008000300", @ANYRES32=r4, @ANYBLOB="0a00060008021100000100000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a0006000802110000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x24044010) r5 = socket$inet_icmp(0x2, 0x2, 0x1) getsockname(r5, &(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000440)=0xc2) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') setxattr$trusted_overlay_upper(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fb6507ff77df4aa5a117c0ed805af6e7d01d5c684a833e68ccb9d95ac409152d433b20eaf8d1010000869c77a6be15444b321a8b953255bfbd5e0b612b6beb6f38b8fc6b"], 0x45, 0x1) preadv(r6, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/68, 0x44}, {&(0x7f00000001c0)=""/44, 0x2c}], 0x2, 0x48, 0xfffffffe) 17:25:42 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0xfffffffffffffffd) 17:25:42 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0xfffffffffffffffd) 17:25:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:25:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:25:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2, 0x7}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000000c0)=@alg, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 250.694880][T10678] device syzkaller1 entered promiscuous mode [ 250.729082][T10693] IPVS: ftp: loaded support on port[0] = 21 17:25:43 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) write(r0, &(0x7f0000000080)="24000000580001000000f4f99085b3a85c91fddf080001000201009f08300360af0b0000", 0x24) [ 250.861783][T10681] IPVS: ftp: loaded support on port[0] = 21 [ 250.874972][T10697] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 17:25:43 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) write(r0, &(0x7f0000000080)="24000000580001000000f4f99085b3a85c91fddf080001000201009f08300360af0b0000", 0x24) 17:25:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2, 0x7}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000000c0)=@alg, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 251.123730][T10704] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 17:25:43 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) write(r0, &(0x7f0000000080)="24000000580001000000f4f99085b3a85c91fddf080001000201009f08300360af0b0000", 0x24) [ 251.285871][T10709] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 17:25:43 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) write(r0, &(0x7f0000000080)="24000000580001000000f4f99085b3a85c91fddf080001000201009f08300360af0b0000", 0x24) [ 251.571497][T10713] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 251.931937][T10673] device syzkaller1 entered promiscuous mode 17:25:46 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x18100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80, 0xdc1fea9b024c988a) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000600)) fcntl$addseals(r2, 0x409, 0x6) setresgid(0xee00, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x750, {}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x0, @multicast2}, 0x45, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x6, 0x4000000000000000}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) unshare(0x60000000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') pipe(&(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002abd7008fcdbdd257c00000008000300", @ANYRES32=r4, @ANYBLOB="0a00060008021100000100000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a0006000802110000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x24044010) r5 = socket$inet_icmp(0x2, 0x2, 0x1) getsockname(r5, &(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000440)=0xc2) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') setxattr$trusted_overlay_upper(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fb6507ff77df4aa5a117c0ed805af6e7d01d5c684a833e68ccb9d95ac409152d433b20eaf8d1010000869c77a6be15444b321a8b953255bfbd5e0b612b6beb6f38b8fc6b"], 0x45, 0x1) preadv(r6, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/68, 0x44}, {&(0x7f00000001c0)=""/44, 0x2c}], 0x2, 0x48, 0xfffffffe) 17:25:46 executing program 4: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_da_reserve_space\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:25:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2, 0x7}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000000c0)=@alg, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:25:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:25:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:25:46 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x18100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80, 0xdc1fea9b024c988a) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000600)) fcntl$addseals(r2, 0x409, 0x6) setresgid(0xee00, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x750, {}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x0, @multicast2}, 0x45, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x6, 0x4000000000000000}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) unshare(0x60000000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') pipe(&(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002abd7008fcdbdd257c00000008000300", @ANYRES32=r4, @ANYBLOB="0a00060008021100000100000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a0006000802110000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x24044010) r5 = socket$inet_icmp(0x2, 0x2, 0x1) getsockname(r5, &(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000440)=0xc2) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') setxattr$trusted_overlay_upper(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fb6507ff77df4aa5a117c0ed805af6e7d01d5c684a833e68ccb9d95ac409152d433b20eaf8d1010000869c77a6be15444b321a8b953255bfbd5e0b612b6beb6f38b8fc6b"], 0x45, 0x1) preadv(r6, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/68, 0x44}, {&(0x7f00000001c0)=""/44, 0x2c}], 0x2, 0x48, 0xfffffffe) [ 254.743768][T10756] IPVS: ftp: loaded support on port[0] = 21 [ 254.796172][T10757] device syzkaller1 entered promiscuous mode [ 254.830291][T10755] device syzkaller1 entered promiscuous mode [ 254.949754][T10776] IPVS: ftp: loaded support on port[0] = 21 17:25:47 executing program 4: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_da_reserve_space\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:25:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2, 0x7}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000000c0)=@alg, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:25:48 executing program 4: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_da_reserve_space\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:25:48 executing program 1: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_da_reserve_space\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:25:49 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x0, 0x40}}, 0x10) 17:25:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x84, 0x8, 0x0, 0x0) 17:25:52 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x18100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80, 0xdc1fea9b024c988a) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000600)) fcntl$addseals(r2, 0x409, 0x6) setresgid(0xee00, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x750, {}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x0, @multicast2}, 0x45, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x6, 0x4000000000000000}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) unshare(0x60000000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') pipe(&(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002abd7008fcdbdd257c00000008000300", @ANYRES32=r4, @ANYBLOB="0a00060008021100000100000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a0006000802110000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x24044010) r5 = socket$inet_icmp(0x2, 0x2, 0x1) getsockname(r5, &(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000440)=0xc2) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') setxattr$trusted_overlay_upper(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fb6507ff77df4aa5a117c0ed805af6e7d01d5c684a833e68ccb9d95ac409152d433b20eaf8d1010000869c77a6be15444b321a8b953255bfbd5e0b612b6beb6f38b8fc6b"], 0x45, 0x1) preadv(r6, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/68, 0x44}, {&(0x7f00000001c0)=""/44, 0x2c}], 0x2, 0x48, 0xfffffffe) 17:25:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x84, 0x8, 0x0, 0x0) 17:25:52 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x0, 0x40}}, 0x10) 17:25:52 executing program 4: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_da_reserve_space\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:25:52 executing program 1: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_da_reserve_space\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:25:52 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x18100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80, 0xdc1fea9b024c988a) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000600)) fcntl$addseals(r2, 0x409, 0x6) setresgid(0xee00, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x750, {}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x0, @multicast2}, 0x45, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x6, 0x4000000000000000}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) unshare(0x60000000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') pipe(&(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002abd7008fcdbdd257c00000008000300", @ANYRES32=r4, @ANYBLOB="0a00060008021100000100000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a00060008021100000100000a0006000802110000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x24044010) r5 = socket$inet_icmp(0x2, 0x2, 0x1) getsockname(r5, &(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000440)=0xc2) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') setxattr$trusted_overlay_upper(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fb6507ff77df4aa5a117c0ed805af6e7d01d5c684a833e68ccb9d95ac409152d433b20eaf8d1010000869c77a6be15444b321a8b953255bfbd5e0b612b6beb6f38b8fc6b"], 0x45, 0x1) preadv(r6, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/68, 0x44}, {&(0x7f00000001c0)=""/44, 0x2c}], 0x2, 0x48, 0xfffffffe) 17:25:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x84, 0x8, 0x0, 0x0) 17:25:52 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x0, 0x40}}, 0x10) [ 260.331311][T10874] IPVS: ftp: loaded support on port[0] = 21 [ 260.475044][T10879] IPVS: ftp: loaded support on port[0] = 21 17:25:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x84, 0x8, 0x0, 0x0) 17:25:53 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x0, 0x40}}, 0x10) 17:25:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_DATA={0x10, 0x5, 0x0, 0x1, [{0xa}]}]}}}]}, 0x44}}, 0x0) 17:25:53 executing program 1: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_da_reserve_space\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:25:56 executing program 0: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab7711321000000"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xa805}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 17:25:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newtaction={0x60, 0x30, 0xffff, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0xffff}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x60}}, 0x0) 17:25:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f00000000c0)=0x10000) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0x500e, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$SOUND_PCM_READ_BITS(0xffffffffffffffff, 0x80045005, &(0x7f0000000040)) read$dsp(r0, &(0x7f0000000180)=""/102375, 0x18fe7) 17:25:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_DATA={0x10, 0x5, 0x0, 0x1, [{0xa}]}]}}}]}, 0x44}}, 0x0) 17:25:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) 17:25:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20060880, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000004080)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="02", 0x1}], 0x1}}], 0x1, 0x60c9800) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 264.114312][T10963] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:25:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_DATA={0x10, 0x5, 0x0, 0x1, [{0xa}]}]}}}]}, 0x44}}, 0x0) 17:25:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newtaction={0x60, 0x30, 0xffff, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0xffff}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x60}}, 0x0) 17:25:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_DATA={0x10, 0x5, 0x0, 0x1, [{0xa}]}]}}}]}, 0x44}}, 0x0) 17:25:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x8864, @icmp={{0x5, 0x4, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @parameter_prob={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @broadcast}}}}}}, 0x0) 17:25:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20060880, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000004080)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="02", 0x1}], 0x1}}], 0x1, 0x60c9800) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 17:25:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newtaction={0x60, 0x30, 0xffff, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0xffff}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x60}}, 0x0) 17:25:57 executing program 0: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab7711321000000"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xa805}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 17:25:57 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x400000) 17:25:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x8864, @icmp={{0x5, 0x4, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @parameter_prob={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @broadcast}}}}}}, 0x0) 17:25:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newtaction={0x60, 0x30, 0xffff, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0xffff}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x60}}, 0x0) 17:25:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) 17:25:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x8864, @icmp={{0x5, 0x4, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @parameter_prob={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @broadcast}}}}}}, 0x0) 17:25:58 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x400000) 17:25:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20060880, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000004080)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="02", 0x1}], 0x1}}], 0x1, 0x60c9800) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 17:25:58 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x400000) 17:25:58 executing program 0: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab7711321000000"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xa805}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 17:25:58 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x400000) 17:25:58 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x400000) 17:25:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x8864, @icmp={{0x5, 0x4, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @parameter_prob={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @broadcast}}}}}}, 0x0) 17:25:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20060880, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000004080)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="02", 0x1}], 0x1}}], 0x1, 0x60c9800) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 17:25:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) 17:25:59 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x400000) 17:25:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) 17:25:59 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x400000) 17:25:59 executing program 0: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab7711321000000"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xa805}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 17:25:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) 17:25:59 executing program 4: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab7711321000000"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xa805}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 17:25:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x85097, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0x10}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [0x0, 0x0, 0xff, 0x0, 0x0, 0x7], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_genetlink_get_family_id$netlbl_cipso(0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000200)) r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setitimer(0x1, &(0x7f0000000040)={{0x0, 0xea60}}, &(0x7f0000000140)) openat$vsock(0xffffff9c, 0x0, 0xa0000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[], 0x2c}}, 0x4) 17:26:00 executing program 4: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab7711321000000"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xa805}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 17:26:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000400)=0xbf3, 0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) getpid() migrate_pages(0x0, 0x6, &(0x7f0000000200)=0x3f, &(0x7f0000000240)=0x2800000000000001) setns(r0, 0x0) r1 = memfd_create(0x0, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0x9) ftruncate(r1, 0x3) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c11010000000000000000", 0x96, 0x8800}], 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="678070cab45f00c1890e0544914466980100000000000300f8ffffffd97f003d58092ee0b6b65e61cd4b13e09c02"], 0x56) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, 0x0, 0x2004404) 17:26:00 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x85097, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0x10}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [0x0, 0x0, 0xff, 0x0, 0x0, 0x7], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_genetlink_get_family_id$netlbl_cipso(0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000200)) r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setitimer(0x1, &(0x7f0000000040)={{0x0, 0xea60}}, &(0x7f0000000140)) openat$vsock(0xffffff9c, 0x0, 0xa0000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[], 0x2c}}, 0x4) [ 268.682681][T11058] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1375 [ 268.719201][T11058] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 11058, name: syz-executor.0 [ 268.755582][T11059] loop0: detected capacity change from 136 to 0 [ 268.885602][T11058] 1 lock held by syz-executor.0/11058: [ 269.013333][T11058] #0: ffffffff8b374160 (rcu_read_lock){....}-{1:2}, at: kernel_migrate_pages+0xed/0x6d0 [ 269.076569][T11058] Preemption disabled at: [ 269.076665][T11058] [] irq_enter_rcu+0xb/0xe0 [ 269.104506][T11058] CPU: 1 PID: 11058 Comm: syz-executor.0 Not tainted 5.11.0-rc3-next-20210114-syzkaller #0 [ 269.114559][T11058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.124649][T11058] Call Trace: [ 269.127963][T11058] dump_stack+0x107/0x163 [ 269.132417][T11058] ? irq_enter_rcu+0xb/0xe0 [ 269.137003][T11058] ___might_sleep.cold+0x1f1/0x237 [ 269.142205][T11058] down_read_killable+0x77/0x480 [ 269.147258][T11058] ? lock_release+0x710/0x710 [ 269.152095][T11058] ? down_read+0x440/0x440 [ 269.156572][T11058] ? kernel_migrate_pages+0xe8/0x6d0 [ 269.161914][T11058] mm_access+0x48/0x150 [ 269.166123][T11058] kernel_migrate_pages+0x1f8/0x6d0 [ 269.171374][T11058] ? do_migrate_pages+0x420/0x420 [ 269.176454][T11058] ? trace_hardirqs_on+0x38/0x1c0 [ 269.181623][T11058] __x64_sys_migrate_pages+0x93/0xf0 [ 269.186962][T11058] do_syscall_64+0x2d/0x70 [ 269.191487][T11058] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.197434][T11058] RIP: 0033:0x45e219 [ 269.201382][T11058] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.221038][T11058] RSP: 002b:00007ff7b6978c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000100 [ 269.229486][T11058] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 269.237486][T11058] RDX: 0000000020000200 RSI: 0000000000000006 RDI: 0000000000000000 [ 269.245508][T11058] RBP: 000000000119bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 269.253528][T11058] R10: 0000000020000240 R11: 0000000000000246 R12: 000000000119bf8c [ 269.261528][T11058] R13: 00007ffdac152b8f R14: 00007ff7b69799c0 R15: 000000000119bf8c 17:26:01 executing program 4: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab7711321000000"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xa805}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) [ 269.406245][T11058] [ 269.408896][T11058] ============================= [ 269.413871][T11058] [ BUG: Invalid wait context ] [ 269.418812][T11058] 5.11.0-rc3-next-20210114-syzkaller #0 Tainted: G W [ 269.426827][T11058] ----------------------------- [ 269.431692][T11058] syz-executor.0/11058 is trying to lock: [ 269.437420][T11058] ffff8880694e8c58 (&sig->exec_update_lock){++++}-{3:3}, at: mm_access+0x48/0x150 [ 269.446691][T11058] other info that might help us debug this: [ 269.452603][T11058] context-{4:4} [ 269.456077][T11058] 1 lock held by syz-executor.0/11058: [ 269.461565][T11058] #0: ffffffff8b374160 (rcu_read_lock){....}-{1:2}, at: kernel_migrate_pages+0xed/0x6d0 [ 269.471454][T11058] stack backtrace: [ 269.475199][T11058] CPU: 1 PID: 11058 Comm: syz-executor.0 Tainted: G W 5.11.0-rc3-next-20210114-syzkaller #0 [ 269.487016][T11058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.497223][T11058] Call Trace: [ 269.500647][T11058] dump_stack+0x107/0x163 [ 269.505010][T11058] __lock_acquire.cold+0x304/0x39e [ 269.510531][T11058] ? io_schedule_timeout+0x140/0x140 [ 269.515851][T11058] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 269.521884][T11058] ? preempt_schedule_irq+0x82/0x90 [ 269.527123][T11058] lock_acquire+0x1a8/0x720 [ 269.531656][T11058] ? mm_access+0x48/0x150 [ 269.536018][T11058] ? lock_release+0x710/0x710 [ 269.540728][T11058] ? dump_stack+0x157/0x163 [ 269.545264][T11058] ? dump_stack+0x15a/0x163 [ 269.550079][T11058] down_read_killable+0x98/0x480 [ 269.555061][T11058] ? mm_access+0x48/0x150 [ 269.559418][T11058] ? lock_release+0x710/0x710 [ 269.564123][T11058] ? down_read+0x440/0x440 [ 269.568567][T11058] ? kernel_migrate_pages+0xe8/0x6d0 [ 269.573886][T11058] mm_access+0x48/0x150 [ 269.578080][T11058] kernel_migrate_pages+0x1f8/0x6d0 [ 269.583313][T11058] ? do_migrate_pages+0x420/0x420 [ 269.588387][T11058] ? trace_hardirqs_on+0x38/0x1c0 [ 269.593444][T11058] __x64_sys_migrate_pages+0x93/0xf0 [ 269.599382][T11058] do_syscall_64+0x2d/0x70 [ 269.603831][T11058] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.609756][T11058] RIP: 0033:0x45e219 [ 269.614633][T11058] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.635130][T11058] RSP: 002b:00007ff7b6978c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000100 [ 269.643574][T11058] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 17:26:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) 17:26:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) 17:26:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) [ 269.651580][T11058] RDX: 0000000020000200 RSI: 0000000000000006 RDI: 0000000000000000 [ 269.659567][T11058] RBP: 000000000119bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 269.667576][T11058] R10: 0000000020000240 R11: 0000000000000246 R12: 000000000119bf8c [ 269.675572][T11058] R13: 00007ffdac152b8f R14: 00007ff7b69799c0 R15: 000000000119bf8c 17:26:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x85097, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0x10}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [0x0, 0x0, 0xff, 0x0, 0x0, 0x7], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_genetlink_get_family_id$netlbl_cipso(0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000200)) r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setitimer(0x1, &(0x7f0000000040)={{0x0, 0xea60}}, &(0x7f0000000140)) openat$vsock(0xffffff9c, 0x0, 0xa0000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[], 0x2c}}, 0x4) [ 269.733578][T11059] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1375 [ 269.748508][T11059] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 11059, name: syz-executor.0 [ 269.758898][T11059] INFO: lockdep is turned off. [ 269.766870][T11059] Preemption disabled at: [ 269.766888][T11059] [] schedule+0xc8/0x270 [ 269.788323][T11059] CPU: 1 PID: 11059 Comm: syz-executor.0 Tainted: G W 5.11.0-rc3-next-20210114-syzkaller #0 [ 269.799759][T11059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.809833][T11059] Call Trace: [ 269.813161][T11059] dump_stack+0x107/0x163 [ 269.819698][T11059] ? schedule+0xc8/0x270 [ 269.823995][T11059] ___might_sleep.cold+0x1f1/0x237 [ 269.829423][T11059] down_read_killable+0x77/0x480 [ 269.834577][T11059] ? lock_release+0x710/0x710 [ 269.839315][T11059] ? down_read+0x440/0x440 [ 269.843790][T11059] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 269.850130][T11059] ? _copy_from_user+0x5d/0x180 [ 269.855070][T11059] mm_access+0x48/0x150 [ 269.859266][T11059] kernel_migrate_pages+0x1f8/0x6d0 [ 269.864517][T11059] ? do_migrate_pages+0x420/0x420 [ 269.869582][T11059] ? __ia32_sys_clock_settime+0x280/0x280 [ 269.875427][T11059] __x64_sys_migrate_pages+0x93/0xf0 [ 269.880751][T11059] ? syscall_enter_from_user_mode+0x1d/0x50 [ 269.886678][T11059] do_syscall_64+0x2d/0x70 [ 269.891154][T11059] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.897093][T11059] RIP: 0033:0x45e219 [ 269.901013][T11059] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.920827][T11059] RSP: 002b:00007ff7b6957c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000100 [ 269.929276][T11059] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 269.937293][T11059] RDX: 0000000020000200 RSI: 0000000000000006 RDI: 0000000000000000 [ 269.945552][T11059] RBP: 000000000119c070 R08: 0000000000000000 R09: 0000000000000000 [ 269.953690][T11059] R10: 0000000020000240 R11: 0000000000000246 R12: 000000000119c034 [ 269.961710][T11059] R13: 00007ffdac152b8f R14: 00007ff7b69589c0 R15: 000000000119c034 17:26:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x85097, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0x10}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [0x0, 0x0, 0xff, 0x0, 0x0, 0x7], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_genetlink_get_family_id$netlbl_cipso(0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000200)) r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setitimer(0x1, &(0x7f0000000040)={{0x0, 0xea60}}, &(0x7f0000000140)) openat$vsock(0xffffff9c, 0x0, 0xa0000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[], 0x2c}}, 0x4) 17:26:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000400)=0xbf3, 0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) getpid() migrate_pages(0x0, 0x6, &(0x7f0000000200)=0x3f, &(0x7f0000000240)=0x2800000000000001) setns(r0, 0x0) r1 = memfd_create(0x0, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0x9) ftruncate(r1, 0x3) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c11010000000000000000", 0x96, 0x8800}], 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="678070cab45f00c1890e0544914466980100000000000300f8ffffffd97f003d58092ee0b6b65e61cd4b13e09c02"], 0x56) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, 0x0, 0x2004404) 17:26:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) 17:26:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000400)=0xbf3, 0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) getpid() migrate_pages(0x0, 0x6, &(0x7f0000000200)=0x3f, &(0x7f0000000240)=0x2800000000000001) setns(r0, 0x0) r1 = memfd_create(0x0, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0x9) ftruncate(r1, 0x3) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c11010000000000000000", 0x96, 0x8800}], 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="678070cab45f00c1890e0544914466980100000000000300f8ffffffd97f003d58092ee0b6b65e61cd4b13e09c02"], 0x56) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, 0x0, 0x2004404) 17:26:02 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x200044) wait4(0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) llistxattr(&(0x7f0000000140)='.\x00', 0x0, 0x0) 17:26:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000000c0)={0xffffffff}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x115483, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x101) r3 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xd513, 0xfffffffffffffffe, 0x1000000000000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) open$dir(0x0, 0x0, 0x50) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r4, 0x0, r4) bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000000) write$bt_hci(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0143200a000000aaaaaaaaaa000043c4c72c63ed1e40c7d1150463bedf61937405fd9a4d4408774bb1e7b2199f650613ec3f828ee7b05b9db175942a9bfda32694323fb447f4755b565b45e1681abf9f80125a4837bfff44b325dae1cfcc79773e1ee3f3f64b845cf2c82052af253ec53de7b086fe8966df40ed56d655b785fcd72ec39f97d495aac2a51941f47bc8a957db66f3dd35e460a0196e821a2ac24fab929b3d7424c0eda5500b8c82dcb6338bdfc639cbd8475b9b24ea0feb9f844d731d2031c0f68272c63761252cb322467b8d2b7818b0eb"], 0xe) 17:26:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000500)=@ipv6_delroute={0x3c, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x14, 0x5, @private1}]}, 0x3c}}, 0x0) [ 270.424687][T11088] loop0: detected capacity change from 136 to 0 17:26:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x64, 0x0, 0x1, 0x409, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1=0xe0000011}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 17:26:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000400)=0xbf3, 0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) getpid() migrate_pages(0x0, 0x6, &(0x7f0000000200)=0x3f, &(0x7f0000000240)=0x2800000000000001) setns(r0, 0x0) r1 = memfd_create(0x0, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0x9) ftruncate(r1, 0x3) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c11010000000000000000", 0x96, 0x8800}], 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="678070cab45f00c1890e0544914466980100000000000300f8ffffffd97f003d58092ee0b6b65e61cd4b13e09c02"], 0x56) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, 0x0, 0x2004404) 17:26:02 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x200044) wait4(0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) llistxattr(&(0x7f0000000140)='.\x00', 0x0, 0x0) 17:26:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x64, 0x0, 0x1, 0x409, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1=0xe0000011}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 17:26:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000500)=@ipv6_delroute={0x3c, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x14, 0x5, @private1}]}, 0x3c}}, 0x0) 17:26:03 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x200044) wait4(0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) llistxattr(&(0x7f0000000140)='.\x00', 0x0, 0x0) 17:26:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000500)=@ipv6_delroute={0x3c, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x14, 0x5, @private1}]}, 0x3c}}, 0x0) 17:26:03 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x64, 0x0, 0x1, 0x409, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1=0xe0000011}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) [ 270.727836][T11104] loop4: detected capacity change from 136 to 0 17:26:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000400)=0xbf3, 0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) getpid() migrate_pages(0x0, 0x6, &(0x7f0000000200)=0x3f, &(0x7f0000000240)=0x2800000000000001) setns(r0, 0x0) r1 = memfd_create(0x0, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0x9) ftruncate(r1, 0x3) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c11010000000000000000", 0x96, 0x8800}], 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="678070cab45f00c1890e0544914466980100000000000300f8ffffffd97f003d58092ee0b6b65e61cd4b13e09c02"], 0x56) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, 0x0, 0x2004404) 17:26:03 executing program 2: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 270.853733][T11115] loop0: detected capacity change from 136 to 0 17:26:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000500)=@ipv6_delroute={0x3c, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x14, 0x5, @private1}]}, 0x3c}}, 0x0) [ 270.896980][ T36] audit: type=1326 audit(1610645163.201:2): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11127 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 17:26:03 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 17:26:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000400)=0xbf3, 0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) getpid() migrate_pages(0x0, 0x6, &(0x7f0000000200)=0x3f, &(0x7f0000000240)=0x2800000000000001) setns(r0, 0x0) r1 = memfd_create(0x0, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0x9) ftruncate(r1, 0x3) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c11010000000000000000", 0x96, 0x8800}], 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="678070cab45f00c1890e0544914466980100000000000300f8ffffffd97f003d58092ee0b6b65e61cd4b13e09c02"], 0x56) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, 0x0, 0x2004404) 17:26:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 17:26:03 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x64, 0x0, 0x1, 0x409, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1=0xe0000011}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) [ 271.043270][T11144] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1375 [ 271.098085][T11144] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 11144, name: syz-executor.4 [ 271.121830][T11144] INFO: lockdep is turned off. [ 271.126682][T11144] Preemption disabled at: [ 271.126712][T11144] [] irq_enter_rcu+0xb/0xe0 [ 271.137394][T11144] CPU: 1 PID: 11144 Comm: syz-executor.4 Tainted: G W 5.11.0-rc3-next-20210114-syzkaller #0 [ 271.148793][T11144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.158863][T11144] Call Trace: [ 271.162149][T11144] dump_stack+0x107/0x163 [ 271.166519][T11144] ? irq_enter_rcu+0xb/0xe0 [ 271.171098][T11144] ___might_sleep.cold+0x1f1/0x237 [ 271.176441][T11144] down_read_killable+0x77/0x480 [ 271.181826][T11144] ? lock_release+0x710/0x710 [ 271.186532][T11144] ? down_read+0x440/0x440 [ 271.190967][T11144] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 271.197263][T11144] ? _copy_from_user+0x5d/0x180 [ 271.202133][T11144] mm_access+0x48/0x150 [ 271.206328][T11144] kernel_migrate_pages+0x1f8/0x6d0 [ 271.211550][T11144] ? do_migrate_pages+0x420/0x420 [ 271.216625][T11144] ? trace_hardirqs_on+0x38/0x1c0 [ 271.222272][T11144] __x64_sys_migrate_pages+0x93/0xf0 [ 271.227615][T11144] do_syscall_64+0x2d/0x70 [ 271.232088][T11144] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.238014][T11144] RIP: 0033:0x45e219 [ 271.241940][T11144] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.261568][T11144] RSP: 002b:00007fb83c09ec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000100 [ 271.270006][T11144] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 271.278276][T11144] RDX: 0000000020000200 RSI: 0000000000000006 RDI: 0000000000000000 [ 271.286286][T11144] RBP: 000000000119bfc8 R08: 0000000000000000 R09: 0000000000000000 17:26:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 17:26:03 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0xfed3}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x200003f8, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 271.294623][T11144] R10: 0000000020000240 R11: 0000000000000246 R12: 000000000119bf8c [ 271.302621][T11144] R13: 00007ffdf2e71b5f R14: 00007fb83c09f9c0 R15: 000000000119bf8c [ 271.390144][T11152] loop4: detected capacity change from 136 to 0 17:26:04 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x200044) wait4(0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) llistxattr(&(0x7f0000000140)='.\x00', 0x0, 0x0) 17:26:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 17:26:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000400)=0xbf3, 0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) getpid() migrate_pages(0x0, 0x6, &(0x7f0000000200)=0x3f, &(0x7f0000000240)=0x2800000000000001) setns(r0, 0x0) r1 = memfd_create(0x0, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0x9) ftruncate(r1, 0x3) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c11010000000000000000", 0x96, 0x8800}], 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="678070cab45f00c1890e0544914466980100000000000300f8ffffffd97f003d58092ee0b6b65e61cd4b13e09c02"], 0x56) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, 0x0, 0x2004404) 17:26:04 executing program 2: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 17:26:04 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0xfed3}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x200003f8, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 17:26:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) [ 271.725205][T11173] loop0: detected capacity change from 136 to 0 17:26:04 executing program 0: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 17:26:04 executing program 5: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 17:26:04 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:04 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x76, &(0x7f0000000000)={r2}, 0x8) 17:26:04 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0xfed3}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x200003f8, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 271.846064][T11183] loop4: detected capacity change from 136 to 0 17:26:04 executing program 2: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 17:26:04 executing program 0: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 17:26:04 executing program 5: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 17:26:04 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0xfed3}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x200003f8, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 17:26:04 executing program 2: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 17:26:04 executing program 0: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 17:26:05 executing program 5: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x1f7, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 17:26:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:05 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:05 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x2, 0x340) semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@loopback}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @XFRMA_SET_MARK={0x8}, @XFRMA_SET_MARK_MASK={0x8}]}, 0x148}, 0x1, 0x1400000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000380)) r1 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:26:05 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x20000430, 0xe8, 0x1d0, 0x1d0, 0x2b8, 0x2b8, 0x2b8, 0x4, 0x0, {[{{@arp={@loopback, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipvlan0\x00', 'geneve1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0xe8}, @unspec=@MARK={0x28, 'MARK\x00'}}, {{@arp={@dev, @dev, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'bond0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x3f0) 17:26:05 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x76, &(0x7f0000000000)={r2}, 0x8) 17:26:05 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x2, 0x340) semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@loopback}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @XFRMA_SET_MARK={0x8}, @XFRMA_SET_MARK_MASK={0x8}]}, 0x148}, 0x1, 0x1400000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000380)) r1 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:26:05 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x20000430, 0xe8, 0x1d0, 0x1d0, 0x2b8, 0x2b8, 0x2b8, 0x4, 0x0, {[{{@arp={@loopback, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipvlan0\x00', 'geneve1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0xe8}, @unspec=@MARK={0x28, 'MARK\x00'}}, {{@arp={@dev, @dev, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'bond0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x3f0) 17:26:05 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x20000430, 0xe8, 0x1d0, 0x1d0, 0x2b8, 0x2b8, 0x2b8, 0x4, 0x0, {[{{@arp={@loopback, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipvlan0\x00', 'geneve1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0xe8}, @unspec=@MARK={0x28, 'MARK\x00'}}, {{@arp={@dev, @dev, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'bond0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x3f0) 17:26:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x2, 0x340) semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@loopback}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @XFRMA_SET_MARK={0x8}, @XFRMA_SET_MARK_MASK={0x8}]}, 0x148}, 0x1, 0x1400000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000380)) r1 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:26:06 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x20000430, 0xe8, 0x1d0, 0x1d0, 0x2b8, 0x2b8, 0x2b8, 0x4, 0x0, {[{{@arp={@loopback, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipvlan0\x00', 'geneve1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0xe8}, @unspec=@MARK={0x28, 'MARK\x00'}}, {{@arp={@dev, @dev, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'bond0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x3f0) 17:26:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x2, 0x340) semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@loopback}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @XFRMA_SET_MARK={0x8}, @XFRMA_SET_MARK_MASK={0x8}]}, 0x148}, 0x1, 0x1400000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000380)) r1 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:26:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:06 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x2, 0x340) semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@loopback}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @XFRMA_SET_MARK={0x8}, @XFRMA_SET_MARK_MASK={0x8}]}, 0x148}, 0x1, 0x1400000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000380)) r1 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:26:06 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x76, &(0x7f0000000000)={r2}, 0x8) 17:26:06 executing program 2: r0 = getpgid(0x0) r1 = pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, &(0x7f0000002380)={0x0, 0x0, 0xfffffff9}, 0x0) 17:26:06 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:06 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:06 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x2, 0x340) semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@loopback}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @XFRMA_SET_MARK={0x8}, @XFRMA_SET_MARK_MASK={0x8}]}, 0x148}, 0x1, 0x1400000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000380)) r1 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:26:06 executing program 2: r0 = getpgid(0x0) r1 = pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, &(0x7f0000002380)={0x0, 0x0, 0xfffffff9}, 0x0) 17:26:06 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x2, 0x340) semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@loopback}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @XFRMA_SET_MARK={0x8}, @XFRMA_SET_MARK_MASK={0x8}]}, 0x148}, 0x1, 0x1400000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000380)) r1 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:26:07 executing program 2: r0 = getpgid(0x0) r1 = pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, &(0x7f0000002380)={0x0, 0x0, 0xfffffff9}, 0x0) 17:26:07 executing program 1: r0 = getpgid(0x0) r1 = pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, &(0x7f0000002380)={0x0, 0x0, 0xfffffff9}, 0x0) 17:26:07 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0xc008561b, &(0x7f0000000100)={0x980001, 0x0, 0x0}) 17:26:07 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002480)=[{0x0}, {0x0}, {&(0x7f0000002400)=""/69, 0x45}], 0x3, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000600)=""/166, 0xa6}, {0x0}, {0x0}], 0x3) r3 = dup(r2) shutdown(r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x20000000) 17:26:07 executing program 5: setgroups(0x421b, &(0x7f0000000000)=[0x0]) 17:26:07 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x76, &(0x7f0000000000)={r2}, 0x8) 17:26:07 executing program 2: r0 = getpgid(0x0) r1 = pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, &(0x7f0000002380)={0x0, 0x0, 0xfffffff9}, 0x0) 17:26:07 executing program 1: r0 = getpgid(0x0) r1 = pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, &(0x7f0000002380)={0x0, 0x0, 0xfffffff9}, 0x0) 17:26:07 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0xc008561b, &(0x7f0000000100)={0x980001, 0x0, 0x0}) 17:26:07 executing program 2: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x5000000) 17:26:07 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0xc008561b, &(0x7f0000000100)={0x980001, 0x0, 0x0}) 17:26:07 executing program 1: r0 = getpgid(0x0) r1 = pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, &(0x7f0000002380)={0x0, 0x0, 0xfffffff9}, 0x0) 17:26:07 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0xc008561b, &(0x7f0000000100)={0x980001, 0x0, 0x0}) 17:26:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r7, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0xfff3}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_skbedit={0x30, 0x0, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) 17:26:07 executing program 5: setgroups(0x421b, &(0x7f0000000000)=[0x0]) [ 275.591121][T11396] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 275.676656][T11399] HTB: quantum of class FFFF0004 is big. Consider r2q change. [ 275.693825][T11396] HTB: quantum of class FFFFFFF3 is big. Consider r2q change. [ 275.730114][T11404] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 17:26:08 executing program 5: setgroups(0x421b, &(0x7f0000000000)=[0x0]) 17:26:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 275.954422][T11409] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 276.008129][T11409] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 276.070888][T11409] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready 17:26:08 executing program 5: setgroups(0x421b, &(0x7f0000000000)=[0x0]) 17:26:08 executing program 2: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x5000000) 17:26:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r7, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0xfff3}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_skbedit={0x30, 0x0, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) 17:26:08 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xcc4f0100, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 17:26:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4) [ 276.127611][T11409] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 276.215371][T11409] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 276.265244][T11409] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready 17:26:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 276.312477][T11409] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready 17:26:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x84, 0x24, 0x0, &(0x7f0000000640)) [ 276.594478][T11422] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 17:26:09 executing program 2: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x5000000) 17:26:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x84, 0x24, 0x0, &(0x7f0000000640)) 17:26:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r7, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0xfff3}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_skbedit={0x30, 0x0, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) [ 276.668832][T11428] HTB: quantum of class FFFF0004 is big. Consider r2q change. [ 276.693988][T11429] HTB: quantum of class FFFFFFF3 is big. Consider r2q change. 17:26:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xcc4f0100, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) [ 276.860134][T11441] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 17:26:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x84, 0x24, 0x0, &(0x7f0000000640)) [ 276.946368][T11441] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 276.976816][T11441] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready 17:26:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x84, 0x24, 0x0, &(0x7f0000000640)) [ 277.007826][T11441] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 277.028985][T11441] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready 17:26:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4) [ 277.051541][T11441] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 277.071821][T11441] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 277.085337][T11455] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 17:26:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:26:09 executing program 2: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x5000000) 17:26:09 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000300)=0x1, 0x4) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x4c054) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0x80, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)=""/144, &(0x7f00000002c0)=0x90) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='team_slave_0\x00', 0x10) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x42042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r2, 0x0, 0x200042) 17:26:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xcc4f0100, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) [ 277.147464][T11463] HTB: quantum of class FFFF0004 is big. Consider r2q change. [ 277.169861][T11452] HTB: quantum of class FFFFFFF3 is big. Consider r2q change. 17:26:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r7, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0xfff3}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_skbedit={0x30, 0x0, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) 17:26:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4) [ 277.294581][T11482] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 277.329665][T11485] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 17:26:09 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000300)=0x1, 0x4) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x4c054) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0x80, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)=""/144, &(0x7f00000002c0)=0x90) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='team_slave_0\x00', 0x10) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x42042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r2, 0x0, 0x200042) [ 277.415751][T11485] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 277.454939][T11485] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 277.476454][T11485] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 277.492990][T11485] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 277.508628][T11485] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready 17:26:09 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000300)=0x1, 0x4) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x4c054) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0x80, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)=""/144, &(0x7f00000002c0)=0x90) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='team_slave_0\x00', 0x10) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x42042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r2, 0x0, 0x200042) [ 277.556107][T11485] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 277.588126][T11492] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 17:26:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = open(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xcc4f0100, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) [ 277.646780][T11499] HTB: quantum of class FFFF0004 is big. Consider r2q change. 17:26:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:26:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4) [ 277.687208][T11501] HTB: quantum of class FFFFFFF3 is big. Consider r2q change. 17:26:10 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000300)=0x1, 0x4) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x4c054) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0x80, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)=""/144, &(0x7f00000002c0)=0x90) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='team_slave_0\x00', 0x10) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x42042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r2, 0x0, 0x200042) 17:26:10 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000600)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) [ 277.747885][T11510] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:26:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) preadv(r0, &(0x7f00000017c0), 0x1c3, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) 17:26:10 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000600)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 17:26:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000300)=0x1, 0x4) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x4c054) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0x80, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)=""/144, &(0x7f00000002c0)=0x90) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='team_slave_0\x00', 0x10) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x42042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r2, 0x0, 0x200042) 17:26:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) preadv(r0, &(0x7f00000017c0), 0x1c3, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) 17:26:10 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000300)=0x1, 0x4) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x4c054) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0x80, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)=""/144, &(0x7f00000002c0)=0x90) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='team_slave_0\x00', 0x10) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x42042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r2, 0x0, 0x200042) [ 277.922751][T11521] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 278.031030][T11521] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready 17:26:10 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000600)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) [ 278.077467][T11521] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 278.148902][T11521] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready 17:26:10 executing program 5: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4d, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x923901) write$char_usb(r0, &(0x7f0000000040)="e2", 0x4098) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) poll(&(0x7f0000000200)=[{}, {r0}, {r1}], 0x3, 0x20) 17:26:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) preadv(r0, &(0x7f00000017c0), 0x1c3, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) [ 278.211811][T11521] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 278.242347][T11521] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 278.290406][T11521] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready 17:26:10 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000600)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 17:26:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000300)=0x1, 0x4) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x4c054) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0x80, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)=""/144, &(0x7f00000002c0)=0x90) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='team_slave_0\x00', 0x10) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x42042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r2, 0x0, 0x200042) 17:26:10 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x5, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x437) r2 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:26:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) preadv(r0, &(0x7f00000017c0), 0x1c3, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) 17:26:10 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x1}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @multicast1}, 0x2}}, 0x2e) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast1}, 0x4}}, 0x2e) 17:26:10 executing program 5: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4d, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x923901) write$char_usb(r0, &(0x7f0000000040)="e2", 0x4098) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) poll(&(0x7f0000000200)=[{}, {r0}, {r1}], 0x3, 0x20) 17:26:10 executing program 1: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4d, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x923901) write$char_usb(r0, &(0x7f0000000040)="e2", 0x4098) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) poll(&(0x7f0000000200)=[{}, {r0}, {r1}], 0x3, 0x20) [ 278.516562][ T2050] block nbd4: Receive control failed (result -107) [ 278.524936][T11557] nbd4: detected capacity change from 2158 to 0 17:26:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) uname(&(0x7f0000000140)=""/85) 17:26:11 executing program 5: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4d, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x923901) write$char_usb(r0, &(0x7f0000000040)="e2", 0x4098) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) poll(&(0x7f0000000200)=[{}, {r0}, {r1}], 0x3, 0x20) 17:26:11 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x1}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @multicast1}, 0x2}}, 0x2e) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast1}, 0x4}}, 0x2e)