Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.50' (ECDSA) to the list of known hosts. 2021/09/09 15:22:05 fuzzer started 2021/09/09 15:22:06 dialing manager at 10.128.0.169:46793 2021/09/09 15:22:08 syscalls: 3455 2021/09/09 15:22:08 code coverage: enabled 2021/09/09 15:22:08 comparison tracing: enabled 2021/09/09 15:22:08 extra coverage: enabled 2021/09/09 15:22:08 setuid sandbox: enabled 2021/09/09 15:22:08 namespace sandbox: enabled 2021/09/09 15:22:08 Android sandbox: /sys/fs/selinux/policy does not exist 2021/09/09 15:22:08 fault injection: enabled 2021/09/09 15:22:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/09/09 15:22:08 net packet injection: enabled 2021/09/09 15:22:08 net device setup: enabled 2021/09/09 15:22:08 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/09/09 15:22:08 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/09/09 15:22:08 USB emulation: enabled 2021/09/09 15:22:08 hci packet injection: enabled 2021/09/09 15:22:08 wifi device emulation: enabled 2021/09/09 15:22:08 802.15.4 emulation: enabled 2021/09/09 15:22:08 fetching corpus: 0, signal 0/2000 (executing program) 2021/09/09 15:22:09 fetching corpus: 50, signal 66207/69757 (executing program) 2021/09/09 15:22:09 fetching corpus: 100, signal 104121/109065 (executing program) 2021/09/09 15:22:09 fetching corpus: 149, signal 122650/129014 (executing program) 2021/09/09 15:22:09 fetching corpus: 199, signal 139047/146706 (executing program) 2021/09/09 15:22:09 fetching corpus: 249, signal 157840/166695 (executing program) 2021/09/09 15:22:09 fetching corpus: 299, signal 169692/179761 (executing program) 2021/09/09 15:22:10 fetching corpus: 349, signal 191942/202877 (executing program) 2021/09/09 15:22:10 fetching corpus: 399, signal 201566/213553 (executing program) 2021/09/09 15:22:10 fetching corpus: 449, signal 212035/225017 (executing program) 2021/09/09 15:22:10 fetching corpus: 499, signal 225676/239445 (executing program) 2021/09/09 15:22:10 fetching corpus: 549, signal 232700/247442 (executing program) 2021/09/09 15:22:10 fetching corpus: 599, signal 247505/262811 (executing program) 2021/09/09 15:22:11 fetching corpus: 649, signal 259113/275023 (executing program) 2021/09/09 15:22:11 fetching corpus: 699, signal 267161/283811 (executing program) 2021/09/09 15:22:11 fetching corpus: 747, signal 279137/296281 (executing program) 2021/09/09 15:22:11 fetching corpus: 797, signal 289023/306738 (executing program) 2021/09/09 15:22:12 fetching corpus: 846, signal 297969/316196 (executing program) 2021/09/09 15:22:12 fetching corpus: 892, signal 303831/322712 (executing program) 2021/09/09 15:22:12 fetching corpus: 941, signal 307040/326745 (executing program) 2021/09/09 15:22:12 fetching corpus: 990, signal 311503/331871 (executing program) 2021/09/09 15:22:12 fetching corpus: 1040, signal 316824/337800 (executing program) 2021/09/09 15:22:12 fetching corpus: 1090, signal 322921/344368 (executing program) 2021/09/09 15:22:13 fetching corpus: 1137, signal 330141/351949 (executing program) 2021/09/09 15:22:13 fetching corpus: 1187, signal 334061/356469 (executing program) 2021/09/09 15:22:13 fetching corpus: 1237, signal 339058/361983 (executing program) 2021/09/09 15:22:13 fetching corpus: 1285, signal 343024/366488 (executing program) 2021/09/09 15:22:13 fetching corpus: 1334, signal 348470/372228 (executing program) 2021/09/09 15:22:13 fetching corpus: 1384, signal 354717/378735 (executing program) 2021/09/09 15:22:13 fetching corpus: 1434, signal 358521/382967 (executing program) 2021/09/09 15:22:14 fetching corpus: 1483, signal 362293/387146 (executing program) 2021/09/09 15:22:14 fetching corpus: 1532, signal 366589/391785 (executing program) 2021/09/09 15:22:14 fetching corpus: 1578, signal 371431/396841 (executing program) 2021/09/09 15:22:15 fetching corpus: 1626, signal 376817/402367 (executing program) 2021/09/09 15:22:15 fetching corpus: 1676, signal 381719/407440 (executing program) 2021/09/09 15:22:15 fetching corpus: 1723, signal 384859/410891 (executing program) 2021/09/09 15:22:15 fetching corpus: 1771, signal 388310/414590 (executing program) 2021/09/09 15:22:15 fetching corpus: 1821, signal 391761/418320 (executing program) 2021/09/09 15:22:16 fetching corpus: 1871, signal 394512/421408 (executing program) 2021/09/09 15:22:16 fetching corpus: 1917, signal 400583/427370 (executing program) 2021/09/09 15:22:16 fetching corpus: 1966, signal 403290/430362 (executing program) 2021/09/09 15:22:16 fetching corpus: 2016, signal 406211/433485 (executing program) 2021/09/09 15:22:16 fetching corpus: 2065, signal 410219/437580 (executing program) 2021/09/09 15:22:17 fetching corpus: 2114, signal 414645/441987 (executing program) 2021/09/09 15:22:17 fetching corpus: 2163, signal 417250/444821 (executing program) 2021/09/09 15:22:17 fetching corpus: 2212, signal 421126/448704 (executing program) 2021/09/09 15:22:17 fetching corpus: 2262, signal 424111/451831 (executing program) 2021/09/09 15:22:17 fetching corpus: 2311, signal 427414/455204 (executing program) 2021/09/09 15:22:18 fetching corpus: 2359, signal 431090/458884 (executing program) 2021/09/09 15:22:18 fetching corpus: 2408, signal 434467/462230 (executing program) 2021/09/09 15:22:18 fetching corpus: 2457, signal 437970/465687 (executing program) 2021/09/09 15:22:18 fetching corpus: 2506, signal 441187/468917 (executing program) 2021/09/09 15:22:18 fetching corpus: 2556, signal 444910/472502 (executing program) 2021/09/09 15:22:18 fetching corpus: 2606, signal 447611/475263 (executing program) 2021/09/09 15:22:18 fetching corpus: 2655, signal 450906/478452 (executing program) 2021/09/09 15:22:19 fetching corpus: 2705, signal 455263/482463 (executing program) 2021/09/09 15:22:19 fetching corpus: 2754, signal 458719/485756 (executing program) 2021/09/09 15:22:19 fetching corpus: 2804, signal 460143/487392 (executing program) 2021/09/09 15:22:19 fetching corpus: 2854, signal 463423/490534 (executing program) 2021/09/09 15:22:19 fetching corpus: 2903, signal 466678/493562 (executing program) syzkaller login: [ 70.669321][ T1356] ieee802154 phy0 wpan0: encryption failed: -22 [ 70.675841][ T1356] ieee802154 phy1 wpan1: encryption failed: -22 2021/09/09 15:22:20 fetching corpus: 2953, signal 469595/496338 (executing program) 2021/09/09 15:22:20 fetching corpus: 3003, signal 472651/499135 (executing program) 2021/09/09 15:22:20 fetching corpus: 3051, signal 476173/502604 (executing program) 2021/09/09 15:22:20 fetching corpus: 3100, signal 478822/505194 (executing program) 2021/09/09 15:22:20 fetching corpus: 3149, signal 480369/506843 (executing program) 2021/09/09 15:22:20 fetching corpus: 3198, signal 482454/508819 (executing program) 2021/09/09 15:22:21 fetching corpus: 3248, signal 485742/511785 (executing program) 2021/09/09 15:22:21 fetching corpus: 3295, signal 489578/515177 (executing program) 2021/09/09 15:22:21 fetching corpus: 3342, signal 491951/517384 (executing program) 2021/09/09 15:22:21 fetching corpus: 3390, signal 494924/520054 (executing program) 2021/09/09 15:22:21 fetching corpus: 3440, signal 496934/521984 (executing program) 2021/09/09 15:22:21 fetching corpus: 3489, signal 500900/525378 (executing program) 2021/09/09 15:22:22 fetching corpus: 3539, signal 504340/528368 (executing program) 2021/09/09 15:22:22 fetching corpus: 3589, signal 506452/530296 (executing program) 2021/09/09 15:22:22 fetching corpus: 3639, signal 508662/532322 (executing program) 2021/09/09 15:22:22 fetching corpus: 3689, signal 511883/535082 (executing program) 2021/09/09 15:22:22 fetching corpus: 3738, signal 514314/537213 (executing program) 2021/09/09 15:22:23 fetching corpus: 3788, signal 516600/539236 (executing program) 2021/09/09 15:22:23 fetching corpus: 3836, signal 518464/540959 (executing program) 2021/09/09 15:22:23 fetching corpus: 3886, signal 523025/544569 (executing program) 2021/09/09 15:22:23 fetching corpus: 3935, signal 525171/546468 (executing program) 2021/09/09 15:22:23 fetching corpus: 3984, signal 527048/548135 (executing program) 2021/09/09 15:22:23 fetching corpus: 4031, signal 529828/550416 (executing program) 2021/09/09 15:22:24 fetching corpus: 4079, signal 531994/552189 (executing program) 2021/09/09 15:22:24 fetching corpus: 4129, signal 536528/555645 (executing program) 2021/09/09 15:22:24 fetching corpus: 4179, signal 538664/557401 (executing program) 2021/09/09 15:22:24 fetching corpus: 4229, signal 540384/558825 (executing program) 2021/09/09 15:22:24 fetching corpus: 4279, signal 542689/560648 (executing program) 2021/09/09 15:22:25 fetching corpus: 4328, signal 544770/562306 (executing program) 2021/09/09 15:22:25 fetching corpus: 4378, signal 547195/564242 (executing program) 2021/09/09 15:22:25 fetching corpus: 4427, signal 549499/565995 (executing program) 2021/09/09 15:22:25 fetching corpus: 4476, signal 552008/567920 (executing program) 2021/09/09 15:22:25 fetching corpus: 4526, signal 553390/569052 (executing program) 2021/09/09 15:22:26 fetching corpus: 4576, signal 556498/571346 (executing program) 2021/09/09 15:22:26 fetching corpus: 4625, signal 558521/572916 (executing program) 2021/09/09 15:22:26 fetching corpus: 4675, signal 560078/574175 (executing program) 2021/09/09 15:22:26 fetching corpus: 4724, signal 561716/575457 (executing program) 2021/09/09 15:22:26 fetching corpus: 4773, signal 563614/576907 (executing program) 2021/09/09 15:22:26 fetching corpus: 4820, signal 565562/578371 (executing program) 2021/09/09 15:22:26 fetching corpus: 4868, signal 566685/579224 (executing program) 2021/09/09 15:22:27 fetching corpus: 4917, signal 568422/580466 (executing program) 2021/09/09 15:22:27 fetching corpus: 4966, signal 569842/581536 (executing program) 2021/09/09 15:22:27 fetching corpus: 5016, signal 572290/583245 (executing program) 2021/09/09 15:22:27 fetching corpus: 5065, signal 573423/584121 (executing program) 2021/09/09 15:22:27 fetching corpus: 5115, signal 574687/585018 (executing program) 2021/09/09 15:22:28 fetching corpus: 5165, signal 576675/586392 (executing program) 2021/09/09 15:22:28 fetching corpus: 5215, signal 578496/587671 (executing program) 2021/09/09 15:22:28 fetching corpus: 5265, signal 580546/589119 (executing program) 2021/09/09 15:22:28 fetching corpus: 5315, signal 583695/591206 (executing program) 2021/09/09 15:22:28 fetching corpus: 5365, signal 585489/592398 (executing program) 2021/09/09 15:22:28 fetching corpus: 5415, signal 586892/593330 (executing program) 2021/09/09 15:22:29 fetching corpus: 5465, signal 588327/594289 (executing program) 2021/09/09 15:22:29 fetching corpus: 5515, signal 590685/595866 (executing program) 2021/09/09 15:22:29 fetching corpus: 5565, signal 592643/597121 (executing program) 2021/09/09 15:22:29 fetching corpus: 5615, signal 594019/598041 (executing program) 2021/09/09 15:22:29 fetching corpus: 5663, signal 595553/599006 (executing program) 2021/09/09 15:22:29 fetching corpus: 5712, signal 597749/600421 (executing program) 2021/09/09 15:22:29 fetching corpus: 5718, signal 598040/600647 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598145/600777 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598145/600795 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598145/600820 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598145/600846 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598145/600876 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598145/600904 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598145/600924 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/600956 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/600979 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601008 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601025 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601044 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601065 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601086 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601104 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601132 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601158 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601183 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601200 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601221 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601248 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601271 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601289 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601309 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601333 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601356 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601373 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601390 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601412 (executing program) 2021/09/09 15:22:29 fetching corpus: 5719, signal 598153/601426 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601443 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601468 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601487 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601508 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601537 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601563 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601583 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601599 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601622 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598153/601645 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598173/601677 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598173/601712 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598173/601737 (executing program) 2021/09/09 15:22:30 fetching corpus: 5719, signal 598173/601756 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598175/601782 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598175/601805 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598175/601825 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598175/601846 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598175/601871 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598175/601904 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/601922 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/601950 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/601971 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/601993 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602024 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602044 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602065 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602089 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602106 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602137 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602157 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602183 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602208 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602229 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602250 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602280 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602314 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602331 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602353 (executing program) 2021/09/09 15:22:30 fetching corpus: 5720, signal 598177/602371 (executing program) 2021/09/09 15:22:30 fetching corpus: 5721, signal 598303/602464 (executing program) 2021/09/09 15:22:30 fetching corpus: 5721, signal 598303/602486 (executing program) 2021/09/09 15:22:30 fetching corpus: 5721, signal 598303/602511 (executing program) 2021/09/09 15:22:30 fetching corpus: 5721, signal 598303/602531 (executing program) 2021/09/09 15:22:30 fetching corpus: 5721, signal 598303/602558 (executing program) 2021/09/09 15:22:30 fetching corpus: 5721, signal 598303/602591 (executing program) 2021/09/09 15:22:30 fetching corpus: 5721, signal 598303/602620 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602660 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602683 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602708 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602730 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602749 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602777 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602802 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602830 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602851 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602872 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602895 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602924 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602951 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602974 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/602991 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603013 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603038 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603059 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603076 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603104 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603128 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603156 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603173 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603191 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603206 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603230 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603255 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603273 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603301 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603328 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603353 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603374 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603401 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603423 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603447 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603474 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603493 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603509 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603538 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603560 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598313/603583 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603614 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603635 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603656 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603684 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603710 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603739 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603762 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603794 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603812 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603833 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603854 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603876 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603894 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603913 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603939 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603956 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603973 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/603996 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604022 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604043 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604058 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604083 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604104 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604135 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604157 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604181 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604217 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604242 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604256 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604278 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604299 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604318 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604348 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604374 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598317/604396 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598318/604420 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598318/604441 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598318/604464 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598318/604492 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598318/604516 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598318/604532 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598318/604558 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598318/604579 (executing program) 2021/09/09 15:22:30 fetching corpus: 5722, signal 598318/604601 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604621 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604645 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604669 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604689 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604720 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604743 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604770 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604793 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604806 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604827 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604856 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604883 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604908 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604922 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604939 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604963 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/604981 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/605007 (executing program) 2021/09/09 15:22:30 fetching corpus: 5723, signal 598327/605039 (executing program) 2021/09/09 15:22:31 fetching corpus: 5724, signal 598333/605055 (executing program) 2021/09/09 15:22:31 fetching corpus: 5724, signal 598333/605085 (executing program) 2021/09/09 15:22:31 fetching corpus: 5724, signal 598333/605102 (executing program) 2021/09/09 15:22:31 fetching corpus: 5724, signal 598371/605113 (executing program) 2021/09/09 15:22:31 fetching corpus: 5724, signal 598378/605113 (executing program) 2021/09/09 15:22:31 fetching corpus: 5724, signal 598378/605114 (executing program) 2021/09/09 15:22:31 fetching corpus: 5724, signal 598378/605114 (executing program) 2021/09/09 15:22:32 starting 6 fuzzer processes 15:22:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) 15:22:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$packet(r0, &(0x7f0000000080)="37a197b48ab7f274000000000806", 0xe, 0x0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 15:22:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000004440), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000004540)={0x0, 0x0, &(0x7f0000004500)={&(0x7f0000004480)={0x14, r1, 0xf9e8160e8eea27bb, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 15:22:32 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) 15:22:33 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000040), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 15:22:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x2, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0xfffffffffffffeb1}, @NFACCT_FILTER_MASK={0x8}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_QUOTA={0xc}]}, 0x40}}, 0x0) [ 84.544929][ T6549] chnl_net:caif_netlink_parms(): no params data found [ 84.630849][ T6549] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.644264][ T6549] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.658683][ T6549] device bridge_slave_0 entered promiscuous mode [ 84.694609][ T6549] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.702326][ T6549] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.711405][ T6549] device bridge_slave_1 entered promiscuous mode [ 84.752342][ T6549] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.770378][ T6549] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.809133][ T6549] team0: Port device team_slave_0 added [ 84.817773][ T6549] team0: Port device team_slave_1 added [ 84.899455][ T6549] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 84.907222][ T6549] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.936013][ T6549] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.036684][ T6549] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.045129][ T6549] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.077020][ T6549] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.183288][ T6551] chnl_net:caif_netlink_parms(): no params data found [ 85.220238][ T6549] device hsr_slave_0 entered promiscuous mode [ 85.241146][ T6549] device hsr_slave_1 entered promiscuous mode [ 85.543262][ T6553] chnl_net:caif_netlink_parms(): no params data found [ 85.612836][ T6551] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.622922][ T6551] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.632149][ T6551] device bridge_slave_0 entered promiscuous mode [ 85.693194][ T6551] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.701251][ T6551] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.717515][ T6551] device bridge_slave_1 entered promiscuous mode [ 85.774719][ T6555] chnl_net:caif_netlink_parms(): no params data found [ 85.808048][ T6551] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.845317][ T6557] chnl_net:caif_netlink_parms(): no params data found [ 85.888292][ T6551] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.898466][ T6553] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.905730][ T6553] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.915195][ T6553] device bridge_slave_0 entered promiscuous mode [ 85.924087][ T6553] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.932204][ T6553] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.942170][ T6553] device bridge_slave_1 entered promiscuous mode [ 86.092786][ T6553] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.106748][ T6551] team0: Port device team_slave_0 added [ 86.133551][ T6555] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.143215][ T6555] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.152497][ T6555] device bridge_slave_0 entered promiscuous mode [ 86.162882][ T6555] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.170785][ T6555] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.179024][ T6555] device bridge_slave_1 entered promiscuous mode [ 86.187183][ T6553] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.205112][ T6551] team0: Port device team_slave_1 added [ 86.225888][ T6553] team0: Port device team_slave_0 added [ 86.249853][ T6549] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 86.269302][ T6553] team0: Port device team_slave_1 added [ 86.296826][ T6549] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 86.329348][ T6559] chnl_net:caif_netlink_parms(): no params data found [ 86.352868][ T6555] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.362475][ T6557] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.370304][ T6557] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.378363][ T6557] device bridge_slave_0 entered promiscuous mode [ 86.386266][ T6549] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 86.395688][ T6551] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 86.402868][ T6551] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.429723][ T6551] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 86.429760][ T20] Bluetooth: hci0: command 0x0409 tx timeout [ 86.458499][ T6555] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.470745][ T6557] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.479528][ T6557] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.487383][ T6557] device bridge_slave_1 entered promiscuous mode [ 86.496369][ T6549] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 86.505434][ T6551] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 86.513306][ T6551] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.540251][ T6551] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 86.551901][ T6553] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 86.559264][ T6553] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.585554][ T6553] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 86.599323][ T6553] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 86.606281][ T6553] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.632717][ T6553] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 86.669947][ T2990] Bluetooth: hci1: command 0x0409 tx timeout [ 86.773561][ T6551] device hsr_slave_0 entered promiscuous mode [ 86.781438][ T6551] device hsr_slave_1 entered promiscuous mode [ 86.789241][ T6551] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 86.797142][ T6551] Cannot create hsr debugfs directory [ 86.805228][ T6557] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.817055][ T6555] team0: Port device team_slave_0 added [ 86.839088][ T6557] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.848393][ T2990] Bluetooth: hci2: command 0x0409 tx timeout [ 86.850636][ T6555] team0: Port device team_slave_1 added [ 86.863337][ T6553] device hsr_slave_0 entered promiscuous mode [ 86.871532][ T6553] device hsr_slave_1 entered promiscuous mode [ 86.879023][ T6553] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 86.886600][ T6553] Cannot create hsr debugfs directory [ 86.987527][ T7836] Bluetooth: hci3: command 0x0409 tx timeout [ 87.010332][ T6557] team0: Port device team_slave_0 added [ 87.019990][ T6555] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 87.027118][ T6555] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.054547][ T6555] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 87.072912][ T6559] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.084034][ T6559] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.092891][ T6559] device bridge_slave_0 entered promiscuous mode [ 87.103537][ T6559] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.110829][ T6559] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.118843][ T6559] device bridge_slave_1 entered promiscuous mode [ 87.126612][ T6557] team0: Port device team_slave_1 added [ 87.139831][ T6555] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 87.147294][ T6555] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.147710][ T6834] Bluetooth: hci4: command 0x0409 tx timeout [ 87.185613][ T6555] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 87.282313][ T6559] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.294677][ T6559] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.312494][ T6555] device hsr_slave_0 entered promiscuous mode [ 87.315332][ T2990] Bluetooth: hci5: command 0x0409 tx timeout [ 87.324986][ T6555] device hsr_slave_1 entered promiscuous mode [ 87.332109][ T6555] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 87.341197][ T6555] Cannot create hsr debugfs directory [ 87.347056][ T6557] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 87.354342][ T6557] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.380602][ T6557] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 87.393229][ T6557] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 87.400960][ T6557] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.427109][ T6557] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 87.533348][ T6557] device hsr_slave_0 entered promiscuous mode [ 87.542759][ T6557] device hsr_slave_1 entered promiscuous mode [ 87.550599][ T6557] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 87.559033][ T6557] Cannot create hsr debugfs directory [ 87.567039][ T6559] team0: Port device team_slave_0 added [ 87.575770][ T6559] team0: Port device team_slave_1 added [ 87.658043][ T6549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.676112][ T6559] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 87.685043][ T6559] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.718070][ T6559] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 87.733335][ T6559] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 87.741334][ T6559] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.768861][ T6559] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 87.840480][ T6549] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.851281][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.861872][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.879303][ T6559] device hsr_slave_0 entered promiscuous mode [ 87.889741][ T6559] device hsr_slave_1 entered promiscuous mode [ 87.896599][ T6559] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 87.905357][ T6559] Cannot create hsr debugfs directory [ 87.930011][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.939387][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.948336][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.955936][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.996890][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.007045][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.016771][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.025560][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.032701][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.048165][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.056813][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.125029][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.142789][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.156219][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.166893][ T6553] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 88.197697][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.206478][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.215762][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.224861][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.237153][ T6553] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 88.285418][ T6553] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 88.298856][ T6549] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 88.317857][ T6549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 88.326981][ T6551] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 88.346543][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 88.356078][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.364652][ T6553] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 88.383882][ T6551] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 88.396673][ T6551] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 88.442135][ T6551] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 88.480193][ T6549] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.495907][ T6555] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 88.505352][ T6555] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 88.512843][ T2990] Bluetooth: hci0: command 0x041b tx timeout [ 88.523242][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 88.531444][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 88.551498][ T6555] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 88.564010][ T6555] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 88.608787][ T8507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 88.617291][ T8507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 88.648110][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 88.656600][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.681711][ T6549] device veth0_vlan entered promiscuous mode [ 88.693119][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.703208][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.719865][ T6557] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 88.745304][ T6557] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 88.757772][ T2990] Bluetooth: hci1: command 0x041b tx timeout [ 88.797956][ T6549] device veth1_vlan entered promiscuous mode [ 88.805187][ T6557] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 88.818700][ T6557] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 88.831623][ T6551] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.847200][ T6553] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.864916][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 88.873658][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 88.894041][ T6551] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.908022][ T2990] Bluetooth: hci2: command 0x041b tx timeout [ 88.920338][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.930450][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.944514][ T6553] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.965686][ T6549] device veth0_macvtap entered promiscuous mode [ 88.982177][ T6559] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 88.993045][ T6559] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 89.010484][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.019033][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.026828][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.038506][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.047045][ T6834] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.054137][ T6834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.061999][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 89.071548][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 89.077584][ T8529] Bluetooth: hci3: command 0x041b tx timeout [ 89.080422][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.093900][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 89.109124][ T6549] device veth1_macvtap entered promiscuous mode [ 89.134816][ T6559] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 89.152072][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 89.161390][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.172209][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.181098][ T2990] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.188193][ T2990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.196999][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.205837][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.215817][ T2990] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.223281][ T2990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.234072][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.243085][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.252817][ T2990] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.260960][ T2990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.270907][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.280077][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.297186][ T6555] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.306510][ T2990] Bluetooth: hci4: command 0x041b tx timeout [ 89.315491][ T6559] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 89.340512][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.349550][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.359722][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.369703][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.381710][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.398643][ T8529] Bluetooth: hci5: command 0x041b tx timeout [ 89.404805][ T6555] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.429096][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.437329][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.449777][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.460435][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.470424][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.481451][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.491146][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.514562][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.525185][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.539027][ T6549] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 89.562337][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.573916][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 89.582959][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 89.596032][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.604933][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.622738][ T6549] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 89.653274][ T6557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.664927][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.674435][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.686510][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 89.695315][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 89.704346][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.715112][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.727779][ T2990] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.734812][ T2990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.743107][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.751686][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.760282][ T2990] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.767333][ T2990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.775832][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.785443][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.794275][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.804139][ T6553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.821165][ T6551] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 89.833252][ T6551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.851083][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.861674][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.870655][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.880725][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.911409][ T6549] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.923288][ T6549] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.933274][ T6549] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.942499][ T6549] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.954918][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.965821][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.978172][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.986637][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.995601][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.003804][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.012163][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.020920][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.038836][ T6557] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.056762][ T6553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.086966][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.096664][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.106152][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.115332][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.123410][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.131285][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.139221][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.149901][ T6555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.170502][ T6551] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.193832][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.208626][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.217349][ T7836] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.224720][ T7836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.236846][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.245800][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.258347][ T7836] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.265501][ T7836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.279761][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.343100][ T6559] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.366960][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.388806][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.398058][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.406692][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.429227][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.448777][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.459037][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.534894][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.539036][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.544341][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.564619][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.576034][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.603132][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.620329][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 90.631937][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.643857][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.658424][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.666088][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.675128][ T25] Bluetooth: hci0: command 0x040f tx timeout [ 90.688590][ T6555] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.711555][ T6553] device veth0_vlan entered promiscuous mode [ 90.731342][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.746502][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.756222][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.766112][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.785176][ T6559] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.815492][ T6557] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 90.828110][ T6557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.838323][ T8530] Bluetooth: hci1: command 0x040f tx timeout [ 90.844394][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.853375][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.861729][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.870570][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.888650][ T8527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.897388][ T8527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.906362][ T8527] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.913607][ T8527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.921020][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.929673][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.934326][ T8527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.946615][ T8527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.956041][ T8527] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.963193][ T8527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.971579][ T8527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.980670][ T8527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.991147][ T6553] device veth1_vlan entered promiscuous mode [ 91.005739][ T25] Bluetooth: hci2: command 0x040f tx timeout [ 91.029697][ T6557] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.041438][ T6551] device veth0_vlan entered promiscuous mode [ 91.052064][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 91.060859][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.075226][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 91.083371][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.091548][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.099567][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.106960][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.114913][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 91.123575][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.132725][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.159853][ T8530] Bluetooth: hci3: command 0x040f tx timeout [ 91.178123][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.186774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.208861][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.229183][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.250709][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.264349][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.273955][ C1] hrtimer: interrupt took 30160 ns [ 91.275844][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.323248][ T6559] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.342458][ T6559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.352655][ T6551] device veth1_vlan entered promiscuous mode [ 91.395718][ T25] Bluetooth: hci4: command 0x040f tx timeout [ 91.421888][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.429802][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 91.439552][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.449669][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.459224][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.467998][ T2930] Bluetooth: hci5: command 0x040f tx timeout [ 91.468812][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.482342][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.492797][ T6555] device veth0_vlan entered promiscuous mode 15:22:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) [ 91.533583][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 91.554495][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.567876][ T6553] device veth0_macvtap entered promiscuous mode [ 91.584119][ T6555] device veth1_vlan entered promiscuous mode [ 91.624755][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 91.636765][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 91.656938][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 91.673209][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.683268][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 91.694521][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.758565][ T6553] device veth1_macvtap entered promiscuous mode [ 91.790240][ T6551] device veth0_macvtap entered promiscuous mode 15:22:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) [ 91.804527][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 91.805561][ T8590] syz-executor.0 (8590) used greatest stack depth: 22080 bytes left [ 91.813238][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 91.829599][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 91.843764][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.868160][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.880604][ T6559] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.897182][ T6555] device veth0_macvtap entered promiscuous mode [ 91.908253][ T6551] device veth1_macvtap entered promiscuous mode [ 91.925446][ T6553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 91.947881][ T6553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.964438][ T6553] batman_adv: batadv0: Interface activated: batadv_slave_0 15:22:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) [ 92.025300][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.040455][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 92.054571][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.088299][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.096888][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.108982][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 92.119959][ T6555] device veth1_macvtap entered promiscuous mode 15:22:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) sync() tkill(0x0, 0x0) [ 92.221488][ T6553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 92.232395][ T6553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.244109][ T6553] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 92.256515][ T6557] device veth0_vlan entered promiscuous mode [ 92.302732][ T6551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.323376][ T6551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.341377][ T6551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.352907][ T6551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.365566][ T6551] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 92.385074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 15:22:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) sync() tkill(0x0, 0x0) [ 92.402945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.425153][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 92.441033][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.451719][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.462679][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.483334][ T6553] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.495169][ T6553] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.504295][ T6553] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.514709][ T6553] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.542081][ T6555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 15:22:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) sync() tkill(0x0, 0x0) [ 92.557553][ T6555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.573279][ T6555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 15:22:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) sync() tkill(0x0, 0x0) [ 92.607835][ T6555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.618167][ T6555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.629846][ T6555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.659321][ T6555] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 92.680944][ T6551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 92.708144][ T6551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.732933][ T6551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 92.746463][ T6551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.762918][ T2990] Bluetooth: hci0: command 0x0419 tx timeout [ 92.772419][ T6551] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 92.787769][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.808254][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.838132][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.849995][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.859131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 92.875023][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.886448][ T6557] device veth1_vlan entered promiscuous mode [ 92.906800][ T6555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 92.908064][ T7836] Bluetooth: hci1: command 0x0419 tx timeout [ 92.923227][ T6555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.923292][ T6555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 92.943971][ T6555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.954232][ T6555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 92.964924][ T6555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.977418][ T6555] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 92.990249][ T6551] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.003982][ T6551] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.016009][ T6551] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.025865][ T6551] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.044403][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 93.052560][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 93.063081][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.073752][ T2930] Bluetooth: hci2: command 0x0419 tx timeout [ 93.082968][ T6555] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.097538][ T6555] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.106357][ T6555] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.121052][ T6555] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.158352][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 93.205098][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 93.215228][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.228346][ T25] Bluetooth: hci3: command 0x0419 tx timeout [ 93.279787][ T6559] device veth0_vlan entered promiscuous mode [ 93.307121][ T6557] device veth0_macvtap entered promiscuous mode [ 93.318345][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.326841][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.338216][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 93.346468][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.356471][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 93.366188][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.374801][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.390398][ T6559] device veth1_vlan entered promiscuous mode [ 93.418301][ T6557] device veth1_macvtap entered promiscuous mode [ 93.441515][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.451274][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.478117][ T2990] Bluetooth: hci4: command 0x0419 tx timeout [ 93.485253][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.504584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 93.513648][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 93.526017][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 93.541007][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.549823][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.578451][ T2990] Bluetooth: hci5: command 0x0419 tx timeout [ 93.583077][ T8531] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 93.608760][ T6557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.620962][ T6557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.632335][ T6557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.643615][ T6557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.654072][ T6557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.666360][ T6557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.676511][ T6557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.687583][ T6557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.699869][ T6557] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 93.712731][ T6557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.724363][ T6557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.735013][ T6557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.745823][ T6557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.757841][ T6557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.768924][ T6557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.779826][ T6557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.791427][ T6557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.802755][ T6557] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 93.821731][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 93.830759][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.843465][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 93.852753][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.865354][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.874660][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.888114][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.888922][ T6559] device veth0_macvtap entered promiscuous mode [ 93.896120][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.907817][ T6559] device veth1_macvtap entered promiscuous mode [ 93.930783][ T6557] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.940501][ T6557] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.959587][ T6557] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.968668][ T6557] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.993566][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 94.013359][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.022033][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 94.080316][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 94.084473][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.099022][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 94.107001][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.118564][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.136903][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.148141][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.159128][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.169696][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.180686][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.191155][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.201669][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.212867][ T6559] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 94.226100][ T8531] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 94.235819][ T8531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.245107][ T8531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.263857][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.276108][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.286770][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 94.287696][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.307559][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.317776][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.319243][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 94.328470][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.345562][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.361652][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.371730][ T6559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.382780][ T6559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.394009][ T6559] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 94.414505][ T1086] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 94.429148][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 94.439552][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.448752][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.455185][ T1086] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 94.485197][ T6559] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.509120][ T6559] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.534421][ T6559] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.560382][ T6559] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.583295][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:22:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x1, 0x40, 0x0, "0000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x0, 0x0, 0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0xd8) 15:22:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$packet(r0, &(0x7f0000000080)="37a197b48ab7f274000000000806", 0xe, 0x0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 94.677891][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 94.724822][ T256] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 94.743007][ T8746] device bridge_slave_1 left promiscuous mode [ 94.748341][ T256] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 94.761318][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 94.762628][ T8746] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.846462][ T8750] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.857949][ T8750] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.908928][ T8750] device bridge_slave_1 entered promiscuous mode [ 94.916470][ T8750] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.923637][ T8750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.934776][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 94.954344][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 94.977246][ T8750] device bridge_slave_1 left promiscuous mode [ 95.009374][ T8750] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.049859][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.057027][ T8754] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.086174][ T8754] device bridge_slave_1 entered promiscuous mode [ 95.116502][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.123689][ T8754] bridge0: port 2(bridge_slave_1) entered forwarding state 15:22:44 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) [ 95.205571][ T1086] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 95.224843][ T1086] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 95.299715][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 95.300304][ T256] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 95.331938][ T256] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 95.344562][ T8779] device bridge_slave_1 left promiscuous mode [ 95.358924][ T8779] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.448765][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 95.470759][ T8781] bridge0: port 2(bridge_slave_1) entered blocking state 15:22:44 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000040), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 95.495899][ T8781] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.506878][ T8781] device bridge_slave_1 entered promiscuous mode [ 95.515745][ T8781] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.522905][ T8781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.678046][ T8791] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 15:22:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x2, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0xfffffffffffffeb1}, @NFACCT_FILTER_MASK={0x8}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_QUOTA={0xc}]}, 0x40}}, 0x0) 15:22:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000004440), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000004540)={0x0, 0x0, &(0x7f0000004500)={&(0x7f0000004480)={0x14, r1, 0xf9e8160e8eea27bb, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 15:22:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x1, 0x40, 0x0, "0000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x0, 0x0, 0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0xd8) 15:22:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$packet(r0, &(0x7f0000000080)="37a197b48ab7f274000000000806", 0xe, 0x0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 15:22:45 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) [ 95.834624][ T8803] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 95.839399][ T8798] device bridge_slave_1 left promiscuous mode 15:22:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$packet(r0, &(0x7f0000000080)="37a197b48ab7f274000000000806", 0xe, 0x0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 15:22:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000004440), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000004540)={0x0, 0x0, &(0x7f0000004500)={&(0x7f0000004480)={0x14, r1, 0xf9e8160e8eea27bb, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 15:22:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x1, 0x40, 0x0, "0000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x0, 0x0, 0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0xd8) 15:22:45 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000040), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 15:22:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x2, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0xfffffffffffffeb1}, @NFACCT_FILTER_MASK={0x8}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_QUOTA={0xc}]}, 0x40}}, 0x0) [ 95.921089][ T8798] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.015060][ T8804] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.041873][ T8814] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 96.056528][ T8804] bridge0: port 2(bridge_slave_1) entered disabled state 15:22:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000004440), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000004540)={0x0, 0x0, &(0x7f0000004500)={&(0x7f0000004480)={0x14, r1, 0xf9e8160e8eea27bb, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 15:22:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000040), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 15:22:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x1, 0x40, 0x0, "0000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x0, 0x0, 0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0xd8) [ 96.126405][ T8804] device bridge_slave_1 entered promiscuous mode 15:22:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x2, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0xfffffffffffffeb1}, @NFACCT_FILTER_MASK={0x8}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_QUOTA={0xc}]}, 0x40}}, 0x0) [ 96.189950][ T8804] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.197155][ T8804] bridge0: port 2(bridge_slave_1) entered forwarding state 15:22:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) 15:22:45 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) 15:22:45 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) [ 96.371022][ T8825] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 15:22:45 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000040), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 96.483313][ T8827] device bridge_slave_1 left promiscuous mode 15:22:45 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) [ 96.525505][ T8827] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.604697][ T8831] device bridge_slave_1 left promiscuous mode [ 96.615551][ T8831] bridge0: port 2(bridge_slave_1) entered disabled state 15:22:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) 15:22:46 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000040), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 96.719868][ T8830] device bridge_slave_1 left promiscuous mode [ 96.726740][ T8830] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.808343][ T8838] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.818011][ T8838] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.872727][ T8838] device bridge_slave_1 entered promiscuous mode [ 96.913735][ T8838] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.921065][ T8838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.967963][ T8840] device bridge_slave_1 left promiscuous mode [ 96.981358][ T8840] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.026830][ T8839] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.037383][ T8839] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.075631][ T8839] device bridge_slave_1 entered promiscuous mode [ 97.095236][ T8839] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.102448][ T8839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.174840][ T8842] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.191103][ T8842] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.210942][ T8842] device bridge_slave_1 entered promiscuous mode [ 97.218861][ T8842] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.225948][ T8842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.238990][ T8850] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.247635][ T8850] bridge0: port 2(bridge_slave_1) entered disabled state 15:22:46 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) 15:22:46 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) 15:22:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x1, 0x40, 0x0, "0000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x0, 0x0, 0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0xd8) 15:22:46 executing program 3: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000440)="453dcd28001000000300000000000000436f6d7072657373656420524f4d465326336279000000000700000008000000436f6d70726573736564000000000000c041", 0x42}], 0x8008, &(0x7f0000000340)=ANY=[]) 15:22:46 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000040), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 97.270986][ T8850] device bridge_slave_1 entered promiscuous mode [ 97.289550][ T8850] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.297025][ T8850] bridge0: port 2(bridge_slave_1) entered forwarding state 15:22:46 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) [ 97.398206][ T8864] device bridge_slave_1 left promiscuous mode [ 97.415350][ T8866] loop3: detected capacity change from 0 to 32776 [ 97.426265][ T8864] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.481065][ T8866] cramfs: empty filesystem 15:22:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x1, 0x40, 0x0, "0000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x0, 0x0, 0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0xd8) [ 97.501794][ T8865] device bridge_slave_1 left promiscuous mode [ 97.514063][ T8865] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.635631][ T8868] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.653336][ T8868] bridge0: port 2(bridge_slave_1) entered disabled state 15:22:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x1, 0x40, 0x0, "0000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x0, 0x0, 0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0xd8) [ 97.688825][ T8868] device bridge_slave_1 entered promiscuous mode [ 97.723667][ T8868] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.730968][ T8868] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.773415][ T8871] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.812735][ T8871] bridge0: port 2(bridge_slave_1) entered disabled state 15:22:47 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) 15:22:47 executing program 3: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000440)="453dcd28001000000300000000000000436f6d7072657373656420524f4d465326336279000000000700000008000000436f6d70726573736564000000000000c041", 0x42}], 0x8008, &(0x7f0000000340)=ANY=[]) 15:22:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000d, 0x12, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt(r1, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) 15:22:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000d40)=@newtaction={0x4c, 0x1d, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_tunnel_key={0x34, 0x0, 0x0, 0x0, {{0xf}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x0) [ 97.835615][ T8871] device bridge_slave_1 entered promiscuous mode [ 97.849669][ T8871] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.856909][ T8871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.873942][ T8873] device bridge_slave_1 left promiscuous mode 15:22:47 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000020"]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="040000000000000020"]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x890}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x8000}}, {{0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)="bfdeb9a9e838ee5d8965cc8fdcce3cba84bee0f2eb847864f6cdbba75ef9b0e54347b4802f6eec1752a53495489b1d8d4d7a4ae0f847f36f7c5b82596dc8d0edea0ed9c97aafea633ef3ea1f81b20c", 0x4f}], 0x4, 0x0, 0x98, 0x44}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000045}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000014}}], 0x5, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) [ 97.912403][ T8873] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.936977][ T8891] loop3: detected capacity change from 0 to 32776 [ 97.986811][ T8891] cramfs: empty filesystem [ 98.003907][ T8877] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.015891][ T8877] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.042752][ T8877] device bridge_slave_1 entered promiscuous mode [ 98.057993][ T8877] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.065166][ T8877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.090021][ T8893] device bridge_slave_1 left promiscuous mode [ 98.120505][ T8893] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.165813][ T8900] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.185602][ T8900] bridge0: port 2(bridge_slave_1) entered disabled state 15:22:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000d, 0x12, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt(r1, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) 15:22:47 executing program 3: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000440)="453dcd28001000000300000000000000436f6d7072657373656420524f4d465326336279000000000700000008000000436f6d70726573736564000000000000c041", 0x42}], 0x8008, &(0x7f0000000340)=ANY=[]) 15:22:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000d40)=@newtaction={0x4c, 0x1d, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_tunnel_key={0x34, 0x0, 0x0, 0x0, {{0xf}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x0) [ 98.252366][ T8900] device bridge_slave_1 entered promiscuous mode 15:22:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000d, 0x12, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt(r1, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) [ 98.296384][ T8900] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.303667][ T8900] bridge0: port 2(bridge_slave_1) entered forwarding state 15:22:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) [ 98.341278][ T8914] loop3: detected capacity change from 0 to 32776 [ 98.368372][ T8901] device bridge_slave_1 left promiscuous mode [ 98.393081][ T8901] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.408087][ T8914] cramfs: empty filesystem 15:22:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140), r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000001880)={0x14, r1, 0x1}, 0x14}}, 0x0) 15:22:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000d, 0x12, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt(r1, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) 15:22:47 executing program 3: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000440)="453dcd28001000000300000000000000436f6d7072657373656420524f4d465326336279000000000700000008000000436f6d70726573736564000000000000c041", 0x42}], 0x8008, &(0x7f0000000340)=ANY=[]) [ 98.472730][ T8903] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.492497][ T8903] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.523510][ T8903] device bridge_slave_1 entered promiscuous mode [ 98.539764][ T8903] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.548021][ T8903] bridge0: port 2(bridge_slave_1) entered forwarding state 15:22:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20004091, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000007c0)="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", 0x209}], 0x1}}, {{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="5982f577df17e13093de418745198faa49ec1fa1931140f9584c4e2f111cc89a371a4499ebb05cfdfd23579de13290091d04168b", 0x34}, {&(0x7f0000000180)="978bb6ff3b4355df272f81963a816e499071fbca9b42207c445ed8bfe7dc766a169c56fcbd2db3d6", 0x28}], 0x2}}], 0x2, 0x40d0) 15:22:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000d40)=@newtaction={0x4c, 0x1d, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_tunnel_key={0x34, 0x0, 0x0, 0x0, {{0xf}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x0) 15:22:47 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000002c0)=0xfffffffffffffffe, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040)=0x1, 0x4) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x9, 0x80, 0x3f, 0xf7}]}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba7860ac5cf65ac608ded8974895abaff4b4834ff930b3f1e0b02bd67aa03059bcecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf908097503a6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @broadcast}}, 0x20) 15:22:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140), r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000001880)={0x14, r1, 0x1}, 0x14}}, 0x0) 15:22:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) [ 98.700192][ T8936] loop3: detected capacity change from 0 to 32776 [ 98.735575][ T8936] cramfs: empty filesystem 15:22:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000d40)=@newtaction={0x4c, 0x1d, 0x1, 0x0, 0x0, {}, [{0x38, 0x1, [@m_tunnel_key={0x34, 0x0, 0x0, 0x0, {{0xf}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x0) 15:22:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140), r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000001880)={0x14, r1, 0x1}, 0x14}}, 0x0) 15:22:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) 15:22:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) 15:22:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140), r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000001880)={0x14, r1, 0x1}, 0x14}}, 0x0) 15:22:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) 15:22:48 executing program 1: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:22:48 executing program 5: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) 15:22:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) [ 99.460288][ T8992] ======================================================= [ 99.460288][ T8992] WARNING: The mand mount option has been deprecated and [ 99.460288][ T8992] and is ignored by this kernel. Remove the mand [ 99.460288][ T8992] option from the mount to silence this warning. [ 99.460288][ T8992] ======================================================= 15:22:48 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000002c0)=0xfffffffffffffffe, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040)=0x1, 0x4) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x9, 0x80, 0x3f, 0xf7}]}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba7860ac5cf65ac608ded8974895abaff4b4834ff930b3f1e0b02bd67aa03059bcecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf908097503a6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @broadcast}}, 0x20) 15:22:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) 15:22:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) 15:22:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) 15:22:49 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000002c0)=0xfffffffffffffffe, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040)=0x1, 0x4) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x9, 0x80, 0x3f, 0xf7}]}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba7860ac5cf65ac608ded8974895abaff4b4834ff930b3f1e0b02bd67aa03059bcecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf908097503a6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @broadcast}}, 0x20) 15:22:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x1c}}, 0x0) 15:22:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000040)=[{}], 0x1, 0x8000, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0x603) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) 15:22:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x1c}}, 0x0) 15:22:49 executing program 5: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) 15:22:49 executing program 1: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="0500000006000000010080010000800000000000158be430a3fa743e81a3631e7500000006000000000000000100010000000000000000000000000100000000000000000000040000000000000002000000000000000048016efe636619a197c17e9400000000000001000000000000000500000000000040000000000009000000000000000000000000000000000000ff77ffefffffffff80000000002000000800000000000200000000000000c47f00000000000000000000080400000000000000000000000000001800019ec80000000000d70900000000000006000000000000000000000000070000008f040000000000000000000000000000000000000000000002000000b0600d3b39991749637d9416655a5957e2925300f9ecf327a4f4cb08f200000000a00000000000007e075a2829f36c740008000000000000000000000000000008040000d600000000000000c6ccecc0123c3200000000044000000000000005000000000000000180000001000000000000000000000000000000000000000902000000000000000000c7814922b8285218f25e03578c31a14dc0718eae01b580a50000000002f8ffff74308cad70cfcabeb4a4d6abf120f1050af7d5694803563b2b815fd4632dbc21c9b3a184a347e38079af6b4e3fe8758179e01c66d9144bdc859128eda88541c5533c066c29136482bcd03cb731064212b68860dfdf21348a087bfdb9efdbd408bdff9e04218ea05a1a1d30d8c6bb3b000000000000000621efd001b443934074b80c197679a6d7856f836636485e917501b93f876de78e496debcf663b12fd189fe29a03ae3f8bc1bd9cfe794ab7a6b0b6ba048269fc602a26e2de1439be2745e28ef8ce2e1b8fe73b365885d7aba575d6a1c46afb1b239c75ca1cb64bb16adc2703d885c69a52f6a700000000000000000000230000bfe6657197b8939a8a91977dedd6570431303e316a7ef263"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:22:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x1c}}, 0x0) 15:22:49 executing program 4: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:22:49 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000002c0)=0xfffffffffffffffe, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040)=0x1, 0x4) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x9, 0x80, 0x3f, 0xf7}]}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba7860ac5cf65ac608ded8974895abaff4b4834ff930b3f1e0b02bd67aa03059bcecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf908097503a6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @broadcast}}, 0x20) 15:22:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x1c}}, 0x0) 15:22:50 executing program 2: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="0500000006000000010080010000800000000000158be430a3fa743e81a3631e7500000006000000000000000100010000000000000000000000000100000000000000000000040000000000000002000000000000000048016efe636619a197c17e9400000000000001000000000000000500000000000040000000000009000000000000000000000000000000000000ff77ffefffffffff80000000002000000800000000000200000000000000c47f00000000000000000000080400000000000000000000000000001800019ec80000000000d70900000000000006000000000000000000000000070000008f040000000000000000000000000000000000000000000002000000b0600d3b39991749637d9416655a5957e2925300f9ecf327a4f4cb08f200000000a00000000000007e075a2829f36c740008000000000000000000000000000008040000d600000000000000c6ccecc0123c3200000000044000000000000005000000000000000180000001000000000000000000000000000000000000000902000000000000000000c7814922b8285218f25e03578c31a14dc0718eae01b580a50000000002f8ffff74308cad70cfcabeb4a4d6abf120f1050af7d5694803563b2b815fd4632dbc21c9b3a184a347e38079af6b4e3fe8758179e01c66d9144bdc859128eda88541c5533c066c29136482bcd03cb731064212b68860dfdf21348a087bfdb9efdbd408bdff9e04218ea05a1a1d30d8c6bb3b000000000000000621efd001b443934074b80c197679a6d7856f836636485e917501b93f876de78e496debcf663b12fd189fe29a03ae3f8bc1bd9cfe794ab7a6b0b6ba048269fc602a26e2de1439be2745e28ef8ce2e1b8fe73b365885d7aba575d6a1c46afb1b239c75ca1cb64bb16adc2703d885c69a52f6a700000000000000000000230000bfe6657197b8939a8a91977dedd6570431303e316a7ef263"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:22:50 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000002c0)=0xfffffffffffffffe, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040)=0x1, 0x4) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x9, 0x80, 0x3f, 0xf7}]}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba7860ac5cf65ac608ded8974895abaff4b4834ff930b3f1e0b02bd67aa03059bcecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf908097503a6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @broadcast}}, 0x20) 15:22:50 executing program 5: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) 15:22:50 executing program 1: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:22:51 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000002c0)=0xfffffffffffffffe, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040)=0x1, 0x4) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x9, 0x80, 0x3f, 0xf7}]}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba7860ac5cf65ac608ded8974895abaff4b4834ff930b3f1e0b02bd67aa03059bcecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf908097503a6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @broadcast}}, 0x20) 15:22:51 executing program 2: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:22:51 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000002c0)=0xfffffffffffffffe, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040)=0x1, 0x4) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0xf0ffffff7f0000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x9, 0x80, 0x3f, 0xf7}]}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba7860ac5cf65ac608ded8974895abaff4b4834ff930b3f1e0b02bd67aa03059bcecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf908097503a6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @broadcast}}, 0x20) 15:22:51 executing program 5: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) 15:22:51 executing program 1: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="0500000006000000010080010000800000000000158be430a3fa743e81a3631e7500000006000000000000000100010000000000000000000000000100000000000000000000040000000000000002000000000000000048016efe636619a197c17e9400000000000001000000000000000500000000000040000000000009000000000000000000000000000000000000ff77ffefffffffff80000000002000000800000000000200000000000000c47f00000000000000000000080400000000000000000000000000001800019ec80000000000d70900000000000006000000000000000000000000070000008f040000000000000000000000000000000000000000000002000000b0600d3b39991749637d9416655a5957e2925300f9ecf327a4f4cb08f200000000a00000000000007e075a2829f36c740008000000000000000000000000000008040000d600000000000000c6ccecc0123c3200000000044000000000000005000000000000000180000001000000000000000000000000000000000000000902000000000000000000c7814922b8285218f25e03578c31a14dc0718eae01b580a50000000002f8ffff74308cad70cfcabeb4a4d6abf120f1050af7d5694803563b2b815fd4632dbc21c9b3a184a347e38079af6b4e3fe8758179e01c66d9144bdc859128eda88541c5533c066c29136482bcd03cb731064212b68860dfdf21348a087bfdb9efdbd408bdff9e04218ea05a1a1d30d8c6bb3b000000000000000621efd001b443934074b80c197679a6d7856f836636485e917501b93f876de78e496debcf663b12fd189fe29a03ae3f8bc1bd9cfe794ab7a6b0b6ba048269fc602a26e2de1439be2745e28ef8ce2e1b8fe73b365885d7aba575d6a1c46afb1b239c75ca1cb64bb16adc2703d885c69a52f6a700000000000000000000230000bfe6657197b8939a8a91977dedd6570431303e316a7ef263"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:22:54 executing program 2: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:22:54 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) io_submit(0x0, 0x3, &(0x7f0000000680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000200)="db92a5bb1b86a5f0420725fdb3c183622909783928524968ea98be51499d0078b4e9db9218362983a502e6d52b8a3fa929b1", 0x32, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000440)="a8b26ade1627340fda9e4227383f5272df37c79f8a72488f7e900144bf39efdf5cd1041098c66f01abbf16075a5afb1e2f00cab52ed9b3046a9f9df9c1dc2d7d30ab55a4335cebb3aa94f14fbb4ecde37fd083643d0ad2f0a52a75f55884e67013fa1d0fdcdbe3", 0x67, 0x3, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0xffff, 0xffffffffffffffff, &(0x7f0000000500)="4ced316a55efbd74828d4d3f5e42e96aa5a1cec341350fcf6336822e8c0c7d893cc64e3be9796c92ef452ca9a02c72e6f9e688e33edfae8b2e2dfb91697d76e9738beefeabe6371469a155856796c0441362c53a993de701c94463b652144760a6498a5b06ff97f178c4123d95d67c2e5e51ebd49bfe52075a1fbaa866fc78e7f39b3415258217b58140304796002fab5ff63ac99ae1efac039e7be5d60d6f0a5f8b218a9767133279f98290848c4cc516d0901df6c73a675d44213d065e3410aaece8ee4d2f4d9912826eefc165dbc3c68eaff346", 0xd5, 0x9}]) r2 = socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r2, 0x0, 0x9}) setfsuid(0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001082dbd7000f2ff000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff9e08001b0000000000"], 0x28}}, 0x0) 15:22:54 executing program 0: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) 15:22:54 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) write$evdev(r1, &(0x7f0000000040), 0x373) r2 = dup3(r0, r1, 0x80000) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) signalfd(r1, &(0x7f0000000040)={[0x10000]}, 0x8) 15:22:54 executing program 4: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:22:54 executing program 3: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) 15:22:55 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) write$evdev(r1, &(0x7f0000000040), 0x373) r2 = dup3(r0, r1, 0x80000) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) signalfd(r1, &(0x7f0000000040)={[0x10000]}, 0x8) 15:22:55 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) write$evdev(r1, &(0x7f0000000040), 0x373) r2 = dup3(r0, r1, 0x80000) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) signalfd(r1, &(0x7f0000000040)={[0x10000]}, 0x8) 15:22:55 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) write$evdev(r1, &(0x7f0000000040), 0x373) r2 = dup3(r0, r1, 0x80000) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) signalfd(r1, &(0x7f0000000040)={[0x10000]}, 0x8) 15:22:55 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) write$evdev(r1, &(0x7f0000000040), 0x373) r2 = dup3(r0, r1, 0x80000) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) signalfd(r1, &(0x7f0000000040)={[0x10000]}, 0x8) 15:22:55 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) write$evdev(r1, &(0x7f0000000040), 0x373) r2 = dup3(r0, r1, 0x80000) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) signalfd(r1, &(0x7f0000000040)={[0x10000]}, 0x8) 15:22:55 executing program 3: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) [ 118.583350][ T9282] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.590647][ T9282] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.967827][ T9282] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 132.108357][ T1356] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.115053][ T1356] ieee802154 phy1 wpan1: encryption failed: -22 [ 132.268930][ T9282] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 143.316754][ T9282] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 143.327447][ T9282] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 143.336777][ T9282] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 143.345945][ T9282] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.297418][ T9282] syz-executor.1 (9282) used greatest stack depth: 21936 bytes left 15:23:38 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) write$evdev(r1, &(0x7f0000000040), 0x373) r2 = dup3(r0, r1, 0x80000) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x121041) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000280)={0x1, 0x2c, &(0x7f00000001c0)="10f26171991effaed8982355dfe2f2625696e8ac199787026b68d66c18eaaf190ca9ddd924bc1ac84813fdf5"}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) signalfd(r1, &(0x7f0000000040)={[0x10000]}, 0x8) 15:23:38 executing program 4: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x115) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000680)=0xe8) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xdc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "82b2c51640bee0fc85c13f8b9b839a03f4bf1d457e925b331cbbf254777116668f3ff7dcee3859778c5092dd5ab9d2c9f62a56fb833198b911528a934240a8711908dc3b3a553cb2a309dcb7f7ba6f76b71aee3e55b470db2cc1e6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x41}, 0x20048090) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) unshare(0x60000000) 15:23:38 executing program 0: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) 15:23:38 executing program 3: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) 15:23:38 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) io_submit(0x0, 0x3, &(0x7f0000000680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000200)="db92a5bb1b86a5f0420725fdb3c183622909783928524968ea98be51499d0078b4e9db9218362983a502e6d52b8a3fa929b1", 0x32, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000440)="a8b26ade1627340fda9e4227383f5272df37c79f8a72488f7e900144bf39efdf5cd1041098c66f01abbf16075a5afb1e2f00cab52ed9b3046a9f9df9c1dc2d7d30ab55a4335cebb3aa94f14fbb4ecde37fd083643d0ad2f0a52a75f55884e67013fa1d0fdcdbe3", 0x67, 0x3, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0xffff, 0xffffffffffffffff, &(0x7f0000000500)="4ced316a55efbd74828d4d3f5e42e96aa5a1cec341350fcf6336822e8c0c7d893cc64e3be9796c92ef452ca9a02c72e6f9e688e33edfae8b2e2dfb91697d76e9738beefeabe6371469a155856796c0441362c53a993de701c94463b652144760a6498a5b06ff97f178c4123d95d67c2e5e51ebd49bfe52075a1fbaa866fc78e7f39b3415258217b58140304796002fab5ff63ac99ae1efac039e7be5d60d6f0a5f8b218a9767133279f98290848c4cc516d0901df6c73a675d44213d065e3410aaece8ee4d2f4d9912826eefc165dbc3c68eaff346", 0xd5, 0x9}]) r2 = socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r2, 0x0, 0x9}) setfsuid(0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001082dbd7000f2ff000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff9e08001b0000000000"], 0x28}}, 0x0) 15:23:38 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) io_submit(0x0, 0x3, &(0x7f0000000680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000200)="db92a5bb1b86a5f0420725fdb3c183622909783928524968ea98be51499d0078b4e9db9218362983a502e6d52b8a3fa929b1", 0x32, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000440)="a8b26ade1627340fda9e4227383f5272df37c79f8a72488f7e900144bf39efdf5cd1041098c66f01abbf16075a5afb1e2f00cab52ed9b3046a9f9df9c1dc2d7d30ab55a4335cebb3aa94f14fbb4ecde37fd083643d0ad2f0a52a75f55884e67013fa1d0fdcdbe3", 0x67, 0x3, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0xffff, 0xffffffffffffffff, &(0x7f0000000500)="4ced316a55efbd74828d4d3f5e42e96aa5a1cec341350fcf6336822e8c0c7d893cc64e3be9796c92ef452ca9a02c72e6f9e688e33edfae8b2e2dfb91697d76e9738beefeabe6371469a155856796c0441362c53a993de701c94463b652144760a6498a5b06ff97f178c4123d95d67c2e5e51ebd49bfe52075a1fbaa866fc78e7f39b3415258217b58140304796002fab5ff63ac99ae1efac039e7be5d60d6f0a5f8b218a9767133279f98290848c4cc516d0901df6c73a675d44213d065e3410aaece8ee4d2f4d9912826eefc165dbc3c68eaff346", 0xd5, 0x9}]) r2 = socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r2, 0x0, 0x9}) setfsuid(0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001082dbd7000f2ff000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff9e08001b0000000000"], 0x28}}, 0x0) 15:23:38 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) io_submit(0x0, 0x3, &(0x7f0000000680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000200)="db92a5bb1b86a5f0420725fdb3c183622909783928524968ea98be51499d0078b4e9db9218362983a502e6d52b8a3fa929b1", 0x32, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000440)="a8b26ade1627340fda9e4227383f5272df37c79f8a72488f7e900144bf39efdf5cd1041098c66f01abbf16075a5afb1e2f00cab52ed9b3046a9f9df9c1dc2d7d30ab55a4335cebb3aa94f14fbb4ecde37fd083643d0ad2f0a52a75f55884e67013fa1d0fdcdbe3", 0x67, 0x3, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0xffff, 0xffffffffffffffff, &(0x7f0000000500)="4ced316a55efbd74828d4d3f5e42e96aa5a1cec341350fcf6336822e8c0c7d893cc64e3be9796c92ef452ca9a02c72e6f9e688e33edfae8b2e2dfb91697d76e9738beefeabe6371469a155856796c0441362c53a993de701c94463b652144760a6498a5b06ff97f178c4123d95d67c2e5e51ebd49bfe52075a1fbaa866fc78e7f39b3415258217b58140304796002fab5ff63ac99ae1efac039e7be5d60d6f0a5f8b218a9767133279f98290848c4cc516d0901df6c73a675d44213d065e3410aaece8ee4d2f4d9912826eefc165dbc3c68eaff346", 0xd5, 0x9}]) r2 = socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r2, 0x0, 0x9}) setfsuid(0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001082dbd7000f2ff000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff9e08001b0000000000"], 0x28}}, 0x0) 15:23:40 executing program 0: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xf0ffff, 0x0) 15:23:40 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) io_submit(0x0, 0x3, &(0x7f0000000680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000200)="db92a5bb1b86a5f0420725fdb3c183622909783928524968ea98be51499d0078b4e9db9218362983a502e6d52b8a3fa929b1", 0x32, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000440)="a8b26ade1627340fda9e4227383f5272df37c79f8a72488f7e900144bf39efdf5cd1041098c66f01abbf16075a5afb1e2f00cab52ed9b3046a9f9df9c1dc2d7d30ab55a4335cebb3aa94f14fbb4ecde37fd083643d0ad2f0a52a75f55884e67013fa1d0fdcdbe3", 0x67, 0x3, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0xffff, 0xffffffffffffffff, &(0x7f0000000500)="4ced316a55efbd74828d4d3f5e42e96aa5a1cec341350fcf6336822e8c0c7d893cc64e3be9796c92ef452ca9a02c72e6f9e688e33edfae8b2e2dfb91697d76e9738beefeabe6371469a155856796c0441362c53a993de701c94463b652144760a6498a5b06ff97f178c4123d95d67c2e5e51ebd49bfe52075a1fbaa866fc78e7f39b3415258217b58140304796002fab5ff63ac99ae1efac039e7be5d60d6f0a5f8b218a9767133279f98290848c4cc516d0901df6c73a675d44213d065e3410aaece8ee4d2f4d9912826eefc165dbc3c68eaff346", 0xd5, 0x9}]) r2 = socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r2, 0x0, 0x9}) setfsuid(0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001082dbd7000f2ff000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff9e08001b0000000000"], 0x28}}, 0x0) 15:23:41 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) io_submit(0x0, 0x3, &(0x7f0000000680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000200)="db92a5bb1b86a5f0420725fdb3c183622909783928524968ea98be51499d0078b4e9db9218362983a502e6d52b8a3fa929b1", 0x32, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000440)="a8b26ade1627340fda9e4227383f5272df37c79f8a72488f7e900144bf39efdf5cd1041098c66f01abbf16075a5afb1e2f00cab52ed9b3046a9f9df9c1dc2d7d30ab55a4335cebb3aa94f14fbb4ecde37fd083643d0ad2f0a52a75f55884e67013fa1d0fdcdbe3", 0x67, 0x3, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0xffff, 0xffffffffffffffff, &(0x7f0000000500)="4ced316a55efbd74828d4d3f5e42e96aa5a1cec341350fcf6336822e8c0c7d893cc64e3be9796c92ef452ca9a02c72e6f9e688e33edfae8b2e2dfb91697d76e9738beefeabe6371469a155856796c0441362c53a993de701c94463b652144760a6498a5b06ff97f178c4123d95d67c2e5e51ebd49bfe52075a1fbaa866fc78e7f39b3415258217b58140304796002fab5ff63ac99ae1efac039e7be5d60d6f0a5f8b218a9767133279f98290848c4cc516d0901df6c73a675d44213d065e3410aaece8ee4d2f4d9912826eefc165dbc3c68eaff346", 0xd5, 0x9}]) r2 = socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r2, 0x0, 0x9}) setfsuid(0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001082dbd7000f2ff000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff9e08001b0000000000"], 0x28}}, 0x0) [ 157.147772][ T9268] Bluetooth: hci1: command 0x0409 tx timeout [ 159.256867][ T25] Bluetooth: hci1: command 0x041b tx timeout [ 162.461118][ T20] Bluetooth: hci1: command 0x040f tx timeout [ 163.568147][ T9401] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.575644][ T9401] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.507687][ T9269] Bluetooth: hci1: command 0x0419 tx timeout [ 175.925793][ T9401] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 177.121386][ T9401] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 187.876759][ T9401] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.886195][ T9401] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.895578][ T9401] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.904847][ T9401] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 15:24:19 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) io_submit(0x0, 0x3, &(0x7f0000000680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000200)="db92a5bb1b86a5f0420725fdb3c183622909783928524968ea98be51499d0078b4e9db9218362983a502e6d52b8a3fa929b1", 0x32, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000440)="a8b26ade1627340fda9e4227383f5272df37c79f8a72488f7e900144bf39efdf5cd1041098c66f01abbf16075a5afb1e2f00cab52ed9b3046a9f9df9c1dc2d7d30ab55a4335cebb3aa94f14fbb4ecde37fd083643d0ad2f0a52a75f55884e67013fa1d0fdcdbe3", 0x67, 0x3, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0xffff, 0xffffffffffffffff, &(0x7f0000000500)="4ced316a55efbd74828d4d3f5e42e96aa5a1cec341350fcf6336822e8c0c7d893cc64e3be9796c92ef452ca9a02c72e6f9e688e33edfae8b2e2dfb91697d76e9738beefeabe6371469a155856796c0441362c53a993de701c94463b652144760a6498a5b06ff97f178c4123d95d67c2e5e51ebd49bfe52075a1fbaa866fc78e7f39b3415258217b58140304796002fab5ff63ac99ae1efac039e7be5d60d6f0a5f8b218a9767133279f98290848c4cc516d0901df6c73a675d44213d065e3410aaece8ee4d2f4d9912826eefc165dbc3c68eaff346", 0xd5, 0x9}]) r2 = socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r2, 0x0, 0x9}) setfsuid(0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001082dbd7000f2ff000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff9e08001b0000000000"], 0x28}}, 0x0) [ 193.548925][ T1356] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.555628][ T1356] ieee802154 phy1 wpan1: encryption failed: -22 [ 202.448378][ T9403] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.455618][ T9403] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.195680][ T9268] Bluetooth: hci0: command 0x0406 tx timeout [ 211.202435][ T9268] Bluetooth: hci2: command 0x0406 tx timeout [ 211.209947][ T9268] Bluetooth: hci3: command 0x0406 tx timeout [ 211.216042][ T9268] Bluetooth: hci4: command 0x0406 tx timeout [ 214.657914][ T9403] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 215.857951][ T9403] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 226.568529][ T9403] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 226.577763][ T9403] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 226.586998][ T9403] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 226.596679][ T9403] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 15:25:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) io_submit(0x0, 0x3, &(0x7f0000000680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000200)="db92a5bb1b86a5f0420725fdb3c183622909783928524968ea98be51499d0078b4e9db9218362983a502e6d52b8a3fa929b1", 0x32, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000440)="a8b26ade1627340fda9e4227383f5272df37c79f8a72488f7e900144bf39efdf5cd1041098c66f01abbf16075a5afb1e2f00cab52ed9b3046a9f9df9c1dc2d7d30ab55a4335cebb3aa94f14fbb4ecde37fd083643d0ad2f0a52a75f55884e67013fa1d0fdcdbe3", 0x67, 0x3, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0xffff, 0xffffffffffffffff, &(0x7f0000000500)="4ced316a55efbd74828d4d3f5e42e96aa5a1cec341350fcf6336822e8c0c7d893cc64e3be9796c92ef452ca9a02c72e6f9e688e33edfae8b2e2dfb91697d76e9738beefeabe6371469a155856796c0441362c53a993de701c94463b652144760a6498a5b06ff97f178c4123d95d67c2e5e51ebd49bfe52075a1fbaa866fc78e7f39b3415258217b58140304796002fab5ff63ac99ae1efac039e7be5d60d6f0a5f8b218a9767133279f98290848c4cc516d0901df6c73a675d44213d065e3410aaece8ee4d2f4d9912826eefc165dbc3c68eaff346", 0xd5, 0x9}]) r2 = socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r2, 0x0, 0x9}) setfsuid(0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001082dbd7000f2ff000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff9e08001b0000000000"], 0x28}}, 0x0) [ 241.345727][ T9424] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.353747][ T9424] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.387682][ T9267] Bluetooth: hci2: command 0x0409 tx timeout [ 247.474457][ T9267] Bluetooth: hci2: command 0x041b tx timeout [ 249.547670][ T9269] Bluetooth: hci2: command 0x040f tx timeout [ 251.934538][ T9264] Bluetooth: hci2: command 0x0419 tx timeout [ 253.934449][ T9424] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 254.998559][ T1356] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.005334][ T1356] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.189179][ T9424] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 265.911529][ T9424] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.920839][ T9424] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.936175][ T9424] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.947976][ T9424] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 279.383483][ T9269] Bluetooth: hci1: command 0x0406 tx timeout [ 280.555176][ T9432] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.564120][ T9432] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.775170][ T9432] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 293.944972][ T9432] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 304.483432][ T9432] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 304.492495][ T9432] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 304.507851][ T9432] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 304.527795][ T9432] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 304.907751][ T27] INFO: task kworker/1:2:1050 blocked for more than 143 seconds. [ 304.943905][ T27] Not tainted 5.14.0-syzkaller #0 [ 304.950640][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 304.987596][ T27] task:kworker/1:2 state:D stack:26064 pid: 1050 ppid: 2 flags:0x00004000 [ 304.997204][ T27] Workqueue: events_power_efficient reg_check_chans_work [ 305.017554][ T27] Call Trace: [ 305.020963][ T27] __schedule+0x940/0x26f0 [ 305.025489][ T27] ? io_schedule_timeout+0x140/0x140 [ 305.047554][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 305.053410][ T27] ? lockdep_hardirqs_on+0x79/0x100 [ 305.067555][ T27] schedule+0xd3/0x270 [ 305.071651][ T27] schedule_preempt_disabled+0xf/0x20 [ 305.077020][ T27] __mutex_lock+0xa34/0x12f0 [ 305.097562][ T27] ? reg_check_chans_work+0x83/0xe10 [ 305.102904][ T27] ? mutex_lock_io_nested+0x1150/0x1150 [ 305.117551][ T27] reg_check_chans_work+0x83/0xe10 [ 305.122893][ T27] ? lock_release+0x720/0x720 [ 305.137537][ T27] ? regulatory_pre_cac_allowed+0x400/0x400 [ 305.143446][ T27] ? do_raw_spin_lock+0x120/0x2b0 [ 305.157153][ T27] process_one_work+0x9bf/0x16b0 [ 305.162619][ T27] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 305.168295][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 305.173409][ T27] ? _raw_spin_lock_irq+0x41/0x50 [ 305.179052][ T27] worker_thread+0x658/0x11f0 [ 305.183740][ T27] ? process_one_work+0x16b0/0x16b0 [ 305.189269][ T27] kthread+0x3e5/0x4d0 [ 305.193431][ T27] ? set_kthread_struct+0x130/0x130 [ 305.198917][ T27] ret_from_fork+0x1f/0x30 [ 305.203789][ T27] INFO: task kworker/u4:4:1086 blocked for more than 143 seconds. [ 305.226145][ T27] Not tainted 5.14.0-syzkaller #0 [ 305.232137][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 305.241334][ T27] task:kworker/u4:4 state:D stack:25936 pid: 1086 ppid: 2 flags:0x00004000 [ 305.250902][ T27] Workqueue: netns cleanup_net [ 305.255781][ T27] Call Trace: [ 305.259752][ T27] __schedule+0x940/0x26f0 [ 305.264194][ T27] ? io_schedule_timeout+0x140/0x140 [ 305.270221][ T27] schedule+0xd3/0x270 [ 305.274319][ T27] schedule_preempt_disabled+0xf/0x20 [ 305.280214][ T27] __mutex_lock+0xa34/0x12f0 [ 305.285177][ T27] ? gate_exit_net+0x22/0x370 [ 305.290424][ T27] ? mutex_lock_io_nested+0x1150/0x1150 [ 305.296002][ T27] ? iput+0x58/0x70 [ 305.300276][ T27] ? sock_release+0x15a/0x1b0 [ 305.304975][ T27] ? tcf_gate_init+0x1e20/0x1e20 [ 305.310874][ T27] gate_exit_net+0x22/0x370 [ 305.315411][ T27] ? tcf_gate_init+0x1e20/0x1e20 [ 305.320712][ T27] ops_exit_list+0x10d/0x160 [ 305.325584][ T27] cleanup_net+0x4ea/0xb00 [ 305.333432][ T27] ? unregister_pernet_device+0x70/0x70 [ 305.342487][ T27] process_one_work+0x9bf/0x16b0 [ 305.351047][ T27] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 305.356463][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 305.365141][ T27] ? _raw_spin_lock_irq+0x41/0x50 [ 305.373779][ T27] worker_thread+0x658/0x11f0 [ 305.382161][ T27] ? process_one_work+0x16b0/0x16b0 [ 305.387487][ T27] kthread+0x3e5/0x4d0 [ 305.402730][ T27] ? set_kthread_struct+0x130/0x130 [ 305.411467][ T27] ret_from_fork+0x1f/0x30 [ 305.416261][ T27] INFO: task syz-executor.1:9434 blocked for more than 143 seconds. [ 305.427953][ T27] Not tainted 5.14.0-syzkaller #0 [ 305.433525][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 305.448156][ T27] task:syz-executor.1 state:D stack:28152 pid: 9434 ppid: 1 flags:0x00000004 [ 305.463358][ T27] Call Trace: [ 305.467110][ T27] __schedule+0x940/0x26f0 [ 305.475130][ T27] ? io_schedule_timeout+0x140/0x140 [ 305.487465][ T27] schedule+0xd3/0x270 [ 305.492136][ T27] schedule_preempt_disabled+0xf/0x20 [ 305.504559][ T27] __mutex_lock+0xa34/0x12f0 [ 305.509649][ T27] ? rtnetlink_rcv_msg+0x3be/0xb80 [ 305.514810][ T27] ? mutex_lock_io_nested+0x1150/0x1150 [ 305.526934][ T27] ? rtnetlink_rcv_msg+0x388/0xb80 [ 305.532693][ T27] rtnetlink_rcv_msg+0x3be/0xb80 [ 305.538014][ T27] ? rtnl_newlink+0xa0/0xa0 [ 305.542538][ T27] netlink_rcv_skb+0x153/0x420 [ 305.547301][ T27] ? rtnl_newlink+0xa0/0xa0 [ 305.559128][ T27] ? netlink_ack+0xa60/0xa60 [ 305.563816][ T27] ? netlink_deliver_tap+0x1a2/0xc30 [ 305.569491][ T27] ? netlink_deliver_tap+0x1b1/0xc30 [ 305.574791][ T27] ? _copy_from_iter+0x12b/0x1320 [ 305.580261][ T27] netlink_unicast+0x533/0x7d0 [ 305.585038][ T27] ? netlink_attachskb+0x890/0x890 [ 305.590531][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 305.597315][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 305.604319][ T27] ? __phys_addr_symbol+0x2c/0x70 [ 305.609791][ T27] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 305.615524][ T27] ? __check_object_size+0x16e/0x3f0 [ 305.621394][ T27] netlink_sendmsg+0x86d/0xdb0 [ 305.626177][ T27] ? netlink_unicast+0x7d0/0x7d0 [ 305.631762][ T27] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 305.644615][ T27] ? netlink_unicast+0x7d0/0x7d0 [ 305.649813][ T27] sock_sendmsg+0xcf/0x120 [ 305.654326][ T27] __sys_sendto+0x21c/0x320 [ 305.666501][ T27] ? __ia32_sys_getpeername+0xb0/0xb0 [ 305.672727][ T27] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 305.685621][ T27] ? __context_tracking_exit+0xb8/0xe0 [ 305.691522][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 305.696395][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 305.708293][ T27] __x64_sys_sendto+0xdd/0x1b0 [ 305.713092][ T27] ? lockdep_hardirqs_on+0x79/0x100 [ 305.718881][ T27] ? syscall_enter_from_user_mode+0x21/0x70 [ 305.724807][ T27] do_syscall_64+0x35/0xb0 [ 305.730115][ T27] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.736674][ T27] RIP: 0033:0x41958c [ 305.741949][ T27] RSP: 002b:00007ffd92aaf920 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 305.751183][ T27] RAX: ffffffffffffffda RBX: 00000000014a4320 RCX: 000000000041958c [ 305.760224][ T27] RDX: 0000000000000028 RSI: 00000000014a4370 RDI: 0000000000000003 [ 305.769266][ T27] RBP: 0000000000000000 R08: 00007ffd92aaf974 R09: 000000000000000c [ 305.777254][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 305.787202][ T27] R13: 00000000014a4370 R14: 0000000000000003 R15: 0000000000000000 [ 305.796114][ T27] [ 305.796114][ T27] Showing all locks held in the system: [ 305.804999][ T27] 3 locks held by kworker/1:0/20: [ 305.810863][ T27] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x8a3/0x16b0 [ 305.822170][ T27] #1: ffffc90000da7db0 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x8d7/0x16b0 [ 305.833694][ T27] #2: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 305.845625][ T27] 3 locks held by kworker/1:1/25: [ 305.851888][ T27] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x8a3/0x16b0 [ 305.867461][ T27] #1: ffffc90000dffdb0 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x8d7/0x16b0 [ 305.886862][ T27] #2: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xb/0x60 [ 305.898773][ T27] 1 lock held by khungtaskd/27: [ 305.903719][ T27] #0: ffffffff8b97fd60 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 305.921853][ T27] 3 locks held by kworker/1:2/1050: [ 305.930789][ T27] #0: ffff888010c65d38 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x8a3/0x16b0 [ 305.948801][ T27] #1: ffffc90004bf7db0 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x8d7/0x16b0 [ 305.967092][ T27] #2: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x83/0xe10 [ 305.977668][ T27] 4 locks held by kworker/u4:4/1086: [ 305.983387][ T27] #0: ffff8881445ab138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x8a3/0x16b0 [ 306.001152][ T27] #1: ffffc90004cefdb0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x8d7/0x16b0 [ 306.014472][ T27] #2: ffffffff8d0d10d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xb00 [ 306.029477][ T27] #3: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: gate_exit_net+0x22/0x370 [ 306.043984][ T27] 1 lock held by in:imklog/6222: [ 306.052184][ T27] #0: ffff88801dd354f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 306.067114][ T27] 1 lock held by syz-executor.5/6559: [ 306.077764][ T27] #0: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x180 [ 306.094884][ T27] 3 locks held by kworker/1:8/8530: [ 306.102905][ T27] #0: ffff888024f0f138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x8a3/0x16b0 [ 306.118090][ T27] #1: ffffc900186f7db0 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x8d7/0x16b0 [ 306.128679][ T27] #2: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 306.142453][ T27] 2 locks held by kworker/0:7/9264: [ 306.148121][ T27] #0: ffff888010c66538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x8a3/0x16b0 [ 306.158557][ T27] #1: ffffc90018f77db0 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x8d7/0x16b0 [ 306.172579][ T27] 3 locks held by kworker/u4:6/9322: [ 306.178035][ T27] #0: ffff888140df1938 ((wq_completion)cfg80211){+.+.}-{0:0}, at: process_one_work+0x8a3/0x16b0 [ 306.189077][ T27] #1: ffffc90002f5fdb0 ((work_completion)(&(&rdev->dfs_update_channels_wk)->work)){+.+.}-{0:0}, at: process_one_work+0x8d7/0x16b0 [ 306.203809][ T27] #2: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: cfg80211_dfs_channels_update_work+0x91/0x5f0 [ 306.215353][ T27] 1 lock held by syz-executor.2/9403: [ 306.220912][ T27] #0: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x180 [ 306.231376][ T27] 2 locks held by syz-executor.4/9409: [ 306.236843][ T27] #0: ffffffff8d0d10d0 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x2f5/0x760 [ 306.247293][ T27] #1: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: ip_tunnel_init_net+0x2d5/0x9d0 [ 306.257991][ T27] 1 lock held by syz-executor.3/9424: [ 306.263378][ T27] #0: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x180 [ 306.272808][ T27] 2 locks held by syz-executor.0/9432: [ 306.278428][ T27] #0: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 [ 306.287922][ T27] #1: ffffffff8b9890e8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x4fc/0x620 [ 306.299055][ T27] 1 lock held by syz-executor.1/9434: [ 306.304596][ T27] #0: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 [ 306.315276][ T27] 1 lock held by syz-executor.5/9468: [ 306.320746][ T27] #0: ffffffff8d0e4668 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 [ 306.331075][ T27] [ 306.333807][ T27] ============================================= [ 306.333807][ T27] [ 306.344307][ T27] NMI backtrace for cpu 1 [ 306.348666][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.14.0-syzkaller #0 [ 306.356483][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.366545][ T27] Call Trace: [ 306.369825][ T27] dump_stack_lvl+0xcd/0x134 [ 306.375206][ T27] nmi_cpu_backtrace.cold+0x47/0x144 [ 306.380755][ T27] ? lapic_can_unplug_cpu+0x80/0x80 [ 306.386214][ T27] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 306.393525][ T27] watchdog+0xc1d/0xf50 [ 306.399329][ T27] ? reset_hung_task_detector+0x30/0x30 [ 306.405770][ T27] kthread+0x3e5/0x4d0 [ 306.409832][ T27] ? set_kthread_struct+0x130/0x130 [ 306.415023][ T27] ret_from_fork+0x1f/0x30 [ 306.419912][ T27] Sending NMI from CPU 1 to CPUs 0: [ 306.425458][ C0] NMI backtrace for cpu 0 [ 306.425469][ C0] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.14.0-syzkaller #0 [ 306.425486][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.425495][ C0] Workqueue: phy11 ieee80211_iface_work [ 306.425518][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 [ 306.425539][ C0] Code: 01 f0 4d 89 03 e9 63 fd ff ff b9 ff ff ff ff ba 08 00 00 00 4d 8b 03 48 0f bd ca 49 8b 45 00 48 63 c9 e9 64 ff ff ff 0f 1f 00 <65> 8b 05 b9 e2 8b 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b [ 306.425552][ C0] RSP: 0018:ffffc90000cd7970 EFLAGS: 00000246 [ 306.425564][ C0] RAX: 0000000000000000 RBX: ffff888070947500 RCX: 0000000000000000 [ 306.425573][ C0] RDX: ffff888010e5d580 RSI: ffffffff8886fd85 RDI: 0000000000000000 [ 306.425582][ C0] RBP: ffff88801e468c80 R08: 0000000000000001 R09: ffffffff8fcfc987 [ 306.425592][ C0] R10: 0000000000000006 R11: 0000000000000000 R12: 1ffff9200019af34 [ 306.425600][ C0] R13: ffff888024646450 R14: 0000000000000006 R15: ffff88801e468d18 [ 306.425613][ C0] FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 306.425626][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 306.425636][ C0] CR2: 00007f6f64c25020 CR3: 000000000b68e000 CR4: 0000000000350ef0 [ 306.425646][ C0] Call Trace: [ 306.425649][ C0] ieee80211_ibss_rx_queued_mgmt+0xa6a/0x1610 [ 306.425670][ C0] ? mark_lock+0xef/0x17b0 [ 306.425684][ C0] ? ieee80211_ibss_rx_no_sta+0x830/0x830 [ 306.425702][ C0] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 306.425719][ C0] ? __lock_acquire+0x162f/0x54a0 [ 306.425737][ C0] ? mark_lock+0xef/0x17b0 [ 306.425751][ C0] ? mark_lock+0xef/0x17b0 [ 306.425766][ C0] ? lock_chain_count+0x20/0x20 [ 306.425782][ C0] ? find_held_lock+0x2d/0x110 [ 306.425797][ C0] ? ieee80211_iface_work+0x28e/0xd00 [ 306.425815][ C0] ? mark_held_locks+0x9f/0xe0 [ 306.425830][ C0] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 306.425849][ C0] ieee80211_iface_work+0xa65/0xd00 [ 306.425868][ C0] process_one_work+0x9bf/0x16b0 [ 306.425884][ C0] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 306.425899][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 306.425914][ C0] ? _raw_spin_lock_irq+0x41/0x50 [ 306.425937][ C0] worker_thread+0x658/0x11f0 [ 306.425953][ C0] ? process_one_work+0x16b0/0x16b0 [ 306.425967][ C0] kthread+0x3e5/0x4d0 [ 306.425982][ C0] ? set_kthread_struct+0x130/0x130 [ 306.425999][ C0] ret_from_fork+0x1f/0x30 [ 306.450996][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 306.681517][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.14.0-syzkaller #0 [ 306.689419][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.699648][ T27] Call Trace: [ 306.702913][ T27] dump_stack_lvl+0xcd/0x134 [ 306.707497][ T27] panic+0x2b0/0x6dd [ 306.711384][ T27] ? __warn_printk+0xf3/0xf3 [ 306.716051][ T27] ? lapic_can_unplug_cpu+0x80/0x80 [ 306.721238][ T27] ? preempt_schedule_thunk+0x16/0x18 [ 306.726598][ T27] ? nmi_trigger_cpumask_backtrace+0x191/0x220 [ 306.732922][ T27] ? watchdog.cold+0x130/0x158 [ 306.737699][ T27] watchdog.cold+0x141/0x158 [ 306.742285][ T27] ? reset_hung_task_detector+0x30/0x30 [ 306.748080][ T27] kthread+0x3e5/0x4d0 [ 306.752158][ T27] ? set_kthread_struct+0x130/0x130 [ 306.757344][ T27] ret_from_fork+0x1f/0x30 [ 306.772397][ T27] Kernel Offset: disabled [ 306.777269][ T27] Rebooting in 86400 seconds..