Warning: Permanently added '10.128.1.75' (ECDSA) to the list of known hosts. 2021/03/09 23:33:39 fuzzer started 2021/03/09 23:33:39 dialing manager at 10.128.0.169:42075 2021/03/09 23:33:39 syscalls: 3570 2021/03/09 23:33:39 code coverage: enabled 2021/03/09 23:33:39 comparison tracing: enabled 2021/03/09 23:33:39 extra coverage: enabled 2021/03/09 23:33:39 setuid sandbox: enabled 2021/03/09 23:33:39 namespace sandbox: enabled 2021/03/09 23:33:39 Android sandbox: /sys/fs/selinux/policy does not exist 2021/03/09 23:33:39 fault injection: enabled 2021/03/09 23:33:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/09 23:33:39 net packet injection: enabled 2021/03/09 23:33:39 net device setup: enabled 2021/03/09 23:33:39 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/03/09 23:33:39 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/09 23:33:39 USB emulation: enabled 2021/03/09 23:33:39 hci packet injection: enabled 2021/03/09 23:33:39 wifi device emulation: enabled 2021/03/09 23:33:39 802.15.4 emulation: enabled 2021/03/09 23:33:39 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/09 23:33:40 fetching corpus: 50, signal 35511/39133 (executing program) 2021/03/09 23:33:40 fetching corpus: 100, signal 50056/55249 (executing program) 2021/03/09 23:33:40 fetching corpus: 150, signal 62173/68837 (executing program) 2021/03/09 23:33:40 fetching corpus: 200, signal 73193/81271 (executing program) 2021/03/09 23:33:40 fetching corpus: 250, signal 82382/91782 (executing program) 2021/03/09 23:33:40 fetching corpus: 300, signal 87441/98237 (executing program) 2021/03/09 23:33:40 fetching corpus: 350, signal 94913/106945 (executing program) 2021/03/09 23:33:40 fetching corpus: 400, signal 103028/116224 (executing program) 2021/03/09 23:33:40 fetching corpus: 450, signal 109828/124134 (executing program) 2021/03/09 23:33:40 fetching corpus: 500, signal 119039/134289 (executing program) 2021/03/09 23:33:41 fetching corpus: 550, signal 124907/141206 (executing program) 2021/03/09 23:33:41 fetching corpus: 600, signal 129308/146667 (executing program) 2021/03/09 23:33:41 fetching corpus: 650, signal 134491/152813 (executing program) 2021/03/09 23:33:41 fetching corpus: 700, signal 138563/157899 (executing program) 2021/03/09 23:33:41 fetching corpus: 750, signal 140938/161413 (executing program) 2021/03/09 23:33:41 fetching corpus: 800, signal 148084/169231 (executing program) 2021/03/09 23:33:41 fetching corpus: 850, signal 152568/174485 (executing program) 2021/03/09 23:33:41 fetching corpus: 900, signal 156026/178863 (executing program) 2021/03/09 23:33:41 fetching corpus: 950, signal 161933/185363 (executing program) 2021/03/09 23:33:41 fetching corpus: 1000, signal 164933/189232 (executing program) 2021/03/09 23:33:41 fetching corpus: 1050, signal 168490/193539 (executing program) 2021/03/09 23:33:41 fetching corpus: 1100, signal 172826/198480 (executing program) 2021/03/09 23:33:42 fetching corpus: 1150, signal 176171/202571 (executing program) 2021/03/09 23:33:42 fetching corpus: 1200, signal 180940/207879 (executing program) 2021/03/09 23:33:42 fetching corpus: 1250, signal 185554/212904 (executing program) 2021/03/09 23:33:42 fetching corpus: 1300, signal 188616/216594 (executing program) 2021/03/09 23:33:42 fetching corpus: 1350, signal 191268/219918 (executing program) 2021/03/09 23:33:42 fetching corpus: 1400, signal 193565/222922 (executing program) 2021/03/09 23:33:42 fetching corpus: 1450, signal 195238/225366 (executing program) 2021/03/09 23:33:42 fetching corpus: 1500, signal 200246/230572 (executing program) 2021/03/09 23:33:42 fetching corpus: 1550, signal 202405/233356 (executing program) 2021/03/09 23:33:42 fetching corpus: 1600, signal 204951/236384 (executing program) 2021/03/09 23:33:43 fetching corpus: 1650, signal 208172/240107 (executing program) 2021/03/09 23:33:43 fetching corpus: 1700, signal 211157/243487 (executing program) 2021/03/09 23:33:43 fetching corpus: 1750, signal 213527/246326 (executing program) 2021/03/09 23:33:43 fetching corpus: 1800, signal 215673/248978 (executing program) 2021/03/09 23:33:43 fetching corpus: 1850, signal 218445/252092 (executing program) 2021/03/09 23:33:43 fetching corpus: 1900, signal 220886/254935 (executing program) 2021/03/09 23:33:43 fetching corpus: 1950, signal 223840/258232 (executing program) 2021/03/09 23:33:43 fetching corpus: 2000, signal 225593/260454 (executing program) 2021/03/09 23:33:43 fetching corpus: 2050, signal 227870/263094 (executing program) 2021/03/09 23:33:43 fetching corpus: 2100, signal 229597/265292 (executing program) 2021/03/09 23:33:43 fetching corpus: 2150, signal 232559/268396 (executing program) 2021/03/09 23:33:44 fetching corpus: 2200, signal 235334/271419 (executing program) 2021/03/09 23:33:44 fetching corpus: 2250, signal 236881/273441 (executing program) 2021/03/09 23:33:44 fetching corpus: 2300, signal 237997/275096 (executing program) 2021/03/09 23:33:44 fetching corpus: 2350, signal 240630/277987 (executing program) 2021/03/09 23:33:44 fetching corpus: 2400, signal 243864/281220 (executing program) 2021/03/09 23:33:44 fetching corpus: 2450, signal 245586/283257 (executing program) 2021/03/09 23:33:44 fetching corpus: 2500, signal 248524/286243 (executing program) 2021/03/09 23:33:44 fetching corpus: 2550, signal 250179/288202 (executing program) 2021/03/09 23:33:44 fetching corpus: 2600, signal 251663/290048 (executing program) 2021/03/09 23:33:44 fetching corpus: 2650, signal 252933/291714 (executing program) 2021/03/09 23:33:44 fetching corpus: 2700, signal 254507/293590 (executing program) 2021/03/09 23:33:44 fetching corpus: 2750, signal 255750/295230 (executing program) 2021/03/09 23:33:44 fetching corpus: 2800, signal 257026/296834 (executing program) 2021/03/09 23:33:44 fetching corpus: 2850, signal 258595/298643 (executing program) 2021/03/09 23:33:45 fetching corpus: 2900, signal 260532/300665 (executing program) 2021/03/09 23:33:45 fetching corpus: 2950, signal 262895/303170 (executing program) 2021/03/09 23:33:45 fetching corpus: 3000, signal 264795/305146 (executing program) 2021/03/09 23:33:45 fetching corpus: 3050, signal 266650/307084 (executing program) 2021/03/09 23:33:45 fetching corpus: 3100, signal 268148/308787 (executing program) 2021/03/09 23:33:45 fetching corpus: 3150, signal 269653/310437 (executing program) 2021/03/09 23:33:45 fetching corpus: 3200, signal 271231/312177 (executing program) 2021/03/09 23:33:45 fetching corpus: 3250, signal 272704/313750 (executing program) 2021/03/09 23:33:45 fetching corpus: 3300, signal 273837/315128 (executing program) 2021/03/09 23:33:45 fetching corpus: 3350, signal 276250/317313 (executing program) 2021/03/09 23:33:45 fetching corpus: 3400, signal 277684/318834 (executing program) 2021/03/09 23:33:46 fetching corpus: 3450, signal 280175/321001 (executing program) 2021/03/09 23:33:46 fetching corpus: 3500, signal 281364/322347 (executing program) 2021/03/09 23:33:46 fetching corpus: 3550, signal 282959/324019 (executing program) 2021/03/09 23:33:46 fetching corpus: 3600, signal 284478/325578 (executing program) 2021/03/09 23:33:46 fetching corpus: 3650, signal 286380/327346 (executing program) 2021/03/09 23:33:46 fetching corpus: 3700, signal 287601/328614 (executing program) 2021/03/09 23:33:46 fetching corpus: 3750, signal 288764/329841 (executing program) 2021/03/09 23:33:46 fetching corpus: 3800, signal 289571/330916 (executing program) 2021/03/09 23:33:46 fetching corpus: 3850, signal 291299/332464 (executing program) 2021/03/09 23:33:46 fetching corpus: 3900, signal 292420/333699 (executing program) 2021/03/09 23:33:46 fetching corpus: 3950, signal 293370/334778 (executing program) 2021/03/09 23:33:46 fetching corpus: 4000, signal 294983/336243 (executing program) 2021/03/09 23:33:47 fetching corpus: 4050, signal 296481/337598 (executing program) 2021/03/09 23:33:47 fetching corpus: 4100, signal 297609/338728 (executing program) 2021/03/09 23:33:47 fetching corpus: 4150, signal 298888/339954 (executing program) 2021/03/09 23:33:47 fetching corpus: 4200, signal 300212/341182 (executing program) 2021/03/09 23:33:47 fetching corpus: 4250, signal 302153/342765 (executing program) 2021/03/09 23:33:47 fetching corpus: 4300, signal 303522/344013 (executing program) 2021/03/09 23:33:47 fetching corpus: 4350, signal 304755/345177 (executing program) 2021/03/09 23:33:47 fetching corpus: 4400, signal 305828/346167 (executing program) 2021/03/09 23:33:47 fetching corpus: 4450, signal 307230/347361 (executing program) 2021/03/09 23:33:47 fetching corpus: 4500, signal 308885/348761 (executing program) 2021/03/09 23:33:47 fetching corpus: 4550, signal 310350/349926 (executing program) 2021/03/09 23:33:48 fetching corpus: 4600, signal 311162/350785 (executing program) 2021/03/09 23:33:48 fetching corpus: 4650, signal 312388/351851 (executing program) 2021/03/09 23:33:48 fetching corpus: 4700, signal 314059/353171 (executing program) 2021/03/09 23:33:48 fetching corpus: 4750, signal 315368/354291 (executing program) 2021/03/09 23:33:48 fetching corpus: 4800, signal 316570/355318 (executing program) 2021/03/09 23:33:48 fetching corpus: 4850, signal 318435/356699 (executing program) 2021/03/09 23:33:48 fetching corpus: 4900, signal 320211/357975 (executing program) 2021/03/09 23:33:48 fetching corpus: 4950, signal 321191/358834 (executing program) 2021/03/09 23:33:48 fetching corpus: 5000, signal 322324/359783 (executing program) 2021/03/09 23:33:48 fetching corpus: 5050, signal 323238/360545 (executing program) 2021/03/09 23:33:49 fetching corpus: 5100, signal 324107/361328 (executing program) 2021/03/09 23:33:49 fetching corpus: 5150, signal 325090/362151 (executing program) 2021/03/09 23:33:49 fetching corpus: 5200, signal 326163/363021 (executing program) 2021/03/09 23:33:49 fetching corpus: 5250, signal 327117/363833 (executing program) 2021/03/09 23:33:49 fetching corpus: 5300, signal 327914/364535 (executing program) 2021/03/09 23:33:49 fetching corpus: 5350, signal 329530/365675 (executing program) 2021/03/09 23:33:49 fetching corpus: 5400, signal 330555/366501 (executing program) 2021/03/09 23:33:49 fetching corpus: 5450, signal 331482/367264 (executing program) 2021/03/09 23:33:49 fetching corpus: 5500, signal 332418/368052 (executing program) 2021/03/09 23:33:49 fetching corpus: 5550, signal 333337/368798 (executing program) 2021/03/09 23:33:49 fetching corpus: 5600, signal 334308/369552 (executing program) 2021/03/09 23:33:49 fetching corpus: 5650, signal 335169/370253 (executing program) 2021/03/09 23:33:50 fetching corpus: 5700, signal 336097/370918 (executing program) 2021/03/09 23:33:50 fetching corpus: 5750, signal 337940/371924 (executing program) 2021/03/09 23:33:50 fetching corpus: 5800, signal 339102/372713 (executing program) 2021/03/09 23:33:50 fetching corpus: 5850, signal 341380/373994 (executing program) 2021/03/09 23:33:50 fetching corpus: 5900, signal 342221/374578 (executing program) 2021/03/09 23:33:50 fetching corpus: 5950, signal 343205/375249 (executing program) 2021/03/09 23:33:50 fetching corpus: 6000, signal 344471/375991 (executing program) 2021/03/09 23:33:50 fetching corpus: 6050, signal 345370/376694 (executing program) 2021/03/09 23:33:50 fetching corpus: 6100, signal 346512/377394 (executing program) 2021/03/09 23:33:50 fetching corpus: 6150, signal 347029/377838 (executing program) 2021/03/09 23:33:50 fetching corpus: 6200, signal 348320/378543 (executing program) 2021/03/09 23:33:50 fetching corpus: 6250, signal 349119/379017 (executing program) 2021/03/09 23:33:51 fetching corpus: 6300, signal 349963/379555 (executing program) 2021/03/09 23:33:51 fetching corpus: 6350, signal 351164/380189 (executing program) 2021/03/09 23:33:51 fetching corpus: 6400, signal 351915/380651 (executing program) 2021/03/09 23:33:51 fetching corpus: 6450, signal 353364/381363 (executing program) 2021/03/09 23:33:51 fetching corpus: 6500, signal 354907/382104 (executing program) 2021/03/09 23:33:51 fetching corpus: 6550, signal 355467/382510 (executing program) 2021/03/09 23:33:51 fetching corpus: 6600, signal 356655/383357 (executing program) 2021/03/09 23:33:51 fetching corpus: 6650, signal 357607/383880 (executing program) 2021/03/09 23:33:51 fetching corpus: 6700, signal 358324/384303 (executing program) 2021/03/09 23:33:52 fetching corpus: 6750, signal 359129/384697 (executing program) 2021/03/09 23:33:52 fetching corpus: 6800, signal 360016/385165 (executing program) 2021/03/09 23:33:52 fetching corpus: 6850, signal 360805/385581 (executing program) 2021/03/09 23:33:52 fetching corpus: 6900, signal 361574/386002 (executing program) 2021/03/09 23:33:52 fetching corpus: 6950, signal 362261/386373 (executing program) 2021/03/09 23:33:52 fetching corpus: 7000, signal 363365/386860 (executing program) 2021/03/09 23:33:52 fetching corpus: 7050, signal 364297/387286 (executing program) 2021/03/09 23:33:52 fetching corpus: 7100, signal 365414/388052 (executing program) 2021/03/09 23:33:52 fetching corpus: 7150, signal 366187/388410 (executing program) 2021/03/09 23:33:52 fetching corpus: 7200, signal 367002/388771 (executing program) 2021/03/09 23:33:53 fetching corpus: 7250, signal 367783/389136 (executing program) 2021/03/09 23:33:53 fetching corpus: 7300, signal 368817/389544 (executing program) 2021/03/09 23:33:53 fetching corpus: 7350, signal 369940/389991 (executing program) 2021/03/09 23:33:53 fetching corpus: 7400, signal 370779/390328 (executing program) 2021/03/09 23:33:53 fetching corpus: 7450, signal 371520/390629 (executing program) 2021/03/09 23:33:53 fetching corpus: 7500, signal 372560/390976 (executing program) 2021/03/09 23:33:53 fetching corpus: 7550, signal 374057/391442 (executing program) 2021/03/09 23:33:53 fetching corpus: 7600, signal 374857/391755 (executing program) 2021/03/09 23:33:53 fetching corpus: 7650, signal 375415/391981 (executing program) 2021/03/09 23:33:53 fetching corpus: 7700, signal 375946/392223 (executing program) 2021/03/09 23:33:53 fetching corpus: 7750, signal 376938/392514 (executing program) 2021/03/09 23:33:54 fetching corpus: 7800, signal 377876/392928 (executing program) 2021/03/09 23:33:54 fetching corpus: 7850, signal 378924/393215 (executing program) 2021/03/09 23:33:54 fetching corpus: 7900, signal 380095/393524 (executing program) 2021/03/09 23:33:54 fetching corpus: 7950, signal 381111/393771 (executing program) 2021/03/09 23:33:54 fetching corpus: 8000, signal 382000/394027 (executing program) 2021/03/09 23:33:54 fetching corpus: 8050, signal 382797/394223 (executing program) 2021/03/09 23:33:54 fetching corpus: 8100, signal 383706/394464 (executing program) 2021/03/09 23:33:54 fetching corpus: 8150, signal 384628/394701 (executing program) 2021/03/09 23:33:54 fetching corpus: 8200, signal 385476/394905 (executing program) 2021/03/09 23:33:54 fetching corpus: 8250, signal 385955/395027 (executing program) 2021/03/09 23:33:54 fetching corpus: 8300, signal 386681/395203 (executing program) 2021/03/09 23:33:54 fetching corpus: 8350, signal 387260/395338 (executing program) 2021/03/09 23:33:55 fetching corpus: 8400, signal 388124/395538 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395595 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395635 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395671 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395719 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395762 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395803 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395846 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395882 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395919 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/395967 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396019 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396061 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396098 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396134 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396172 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396216 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396264 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396306 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396341 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396377 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396407 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396460 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396511 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396557 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396614 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396646 (executing program) 2021/03/09 23:33:55 fetching corpus: 8412, signal 388244/396646 (executing program) 2021/03/09 23:33:57 starting 6 fuzzer processes 23:33:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @loopback, @empty}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 23:33:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newnexthop={0x1c, 0x15, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) 23:33:57 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x10f, 0x1, 0x0, 0x904f00) 23:33:58 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000007500000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0xab, &(0x7f00000002c0)=""/171, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) syncfs(r1) 23:33:58 executing program 4: r0 = socket(0x1d, 0x2, 0x6) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x6a, 0x4, 0x400000, 0x4) 23:33:58 executing program 5: syz_emit_ethernet(0x8e, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x5, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, {0x19, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @private, {[@cipso={0x86, 0x12, 0x0, [{0x0, 0x5, "1e0b69"}, {0x0, 0x7, "653d817bf1"}]}, @timestamp_addr={0x44, 0x34, 0x0, 0x1, 0x0, [{@multicast2=0xe000006c}, {@dev}, {}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@remote}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x0]}]}}}}}}}, 0x0) syzkaller login: [ 66.924575][ T8417] IPVS: ftp: loaded support on port[0] = 21 [ 67.150300][ T8419] IPVS: ftp: loaded support on port[0] = 21 [ 67.280170][ T8417] chnl_net:caif_netlink_parms(): no params data found [ 67.356842][ T8421] IPVS: ftp: loaded support on port[0] = 21 [ 67.485170][ T8417] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.493957][ T8417] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.502624][ T8417] device bridge_slave_0 entered promiscuous mode [ 67.515052][ T8417] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.522193][ T8417] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.529838][ T8417] device bridge_slave_1 entered promiscuous mode [ 67.575976][ T8417] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.589711][ T8417] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.697505][ T8419] chnl_net:caif_netlink_parms(): no params data found [ 67.757542][ T8417] team0: Port device team_slave_0 added [ 67.776208][ T8423] IPVS: ftp: loaded support on port[0] = 21 [ 67.795680][ T8417] team0: Port device team_slave_1 added [ 67.828632][ T8417] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.839180][ T8417] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.866628][ T8417] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.879236][ T8421] chnl_net:caif_netlink_parms(): no params data found [ 67.928407][ T8417] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.940684][ T8417] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.973560][ T8417] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.026308][ T8425] IPVS: ftp: loaded support on port[0] = 21 [ 68.057996][ T8417] device hsr_slave_0 entered promiscuous mode [ 68.067590][ T8417] device hsr_slave_1 entered promiscuous mode [ 68.106104][ T8419] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.113420][ T8419] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.122566][ T8419] device bridge_slave_0 entered promiscuous mode [ 68.163631][ T8419] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.182010][ T8419] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.189898][ T8419] device bridge_slave_1 entered promiscuous mode [ 68.263867][ T8419] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.290494][ T8421] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.303740][ T8421] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.313111][ T8421] device bridge_slave_0 entered promiscuous mode [ 68.358991][ T8419] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.413743][ T8421] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.431812][ T8421] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.439889][ T8421] device bridge_slave_1 entered promiscuous mode [ 68.569337][ T8425] chnl_net:caif_netlink_parms(): no params data found [ 68.600460][ T8540] IPVS: ftp: loaded support on port[0] = 21 [ 68.610367][ T8419] team0: Port device team_slave_0 added [ 68.642646][ T8419] team0: Port device team_slave_1 added [ 68.663524][ T8421] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.687531][ T8419] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.696568][ T8419] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.724652][ T8419] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.738922][ T8419] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.747383][ T8419] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.775531][ T8419] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.788397][ T8423] chnl_net:caif_netlink_parms(): no params data found [ 68.804550][ T8421] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.878953][ T8419] device hsr_slave_0 entered promiscuous mode [ 68.890299][ T36] Bluetooth: hci0: command 0x0409 tx timeout [ 68.898594][ T8419] device hsr_slave_1 entered promiscuous mode [ 68.907738][ T8419] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 68.916246][ T8419] Cannot create hsr debugfs directory [ 68.951134][ T8421] team0: Port device team_slave_0 added [ 68.996370][ T8421] team0: Port device team_slave_1 added [ 69.019710][ T8425] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.027905][ T8425] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.037311][ T8425] device bridge_slave_0 entered promiscuous mode [ 69.069935][ T8425] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.079285][ T8425] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.088422][ T8425] device bridge_slave_1 entered promiscuous mode [ 69.117143][ T8423] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.124479][ T36] Bluetooth: hci1: command 0x0409 tx timeout [ 69.128181][ T8423] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.145138][ T8423] device bridge_slave_0 entered promiscuous mode [ 69.154450][ T8421] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.161690][ T8421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.188267][ T8421] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.204673][ T8421] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.211947][ T8421] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.238616][ T8421] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.252474][ T8417] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 69.270293][ T8417] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 69.290109][ T8423] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.297368][ T8423] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.305857][ T8423] device bridge_slave_1 entered promiscuous mode [ 69.315206][ T8425] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.335330][ T8417] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 69.346137][ T8417] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 69.371522][ T8425] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.381726][ T3082] Bluetooth: hci2: command 0x0409 tx timeout [ 69.436163][ T8421] device hsr_slave_0 entered promiscuous mode [ 69.445820][ T8421] device hsr_slave_1 entered promiscuous mode [ 69.454932][ T8421] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 69.463737][ T8421] Cannot create hsr debugfs directory [ 69.476789][ T8423] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.538455][ T8540] chnl_net:caif_netlink_parms(): no params data found [ 69.563564][ T8425] team0: Port device team_slave_0 added [ 69.571615][ T8423] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.635901][ T8425] team0: Port device team_slave_1 added [ 69.680924][ T36] Bluetooth: hci3: command 0x0409 tx timeout [ 69.697773][ T8425] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.708281][ T8425] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.737698][ T8425] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.770164][ T8423] team0: Port device team_slave_0 added [ 69.779631][ T8423] team0: Port device team_slave_1 added [ 69.788531][ T8425] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.796110][ T8425] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.823063][ T8425] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.881238][ T8419] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 69.908287][ T8423] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.920532][ T36] Bluetooth: hci4: command 0x0409 tx timeout [ 69.927726][ T8423] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.956085][ T8423] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.969125][ T8423] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.976904][ T8423] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.003318][ T8423] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.027986][ T8425] device hsr_slave_0 entered promiscuous mode [ 70.034853][ T8425] device hsr_slave_1 entered promiscuous mode [ 70.044168][ T8425] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 70.053218][ T8425] Cannot create hsr debugfs directory [ 70.058816][ T8419] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 70.078644][ T8419] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 70.136454][ T8419] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 70.146044][ T8540] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.159000][ T8540] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.167368][ T8540] device bridge_slave_0 entered promiscuous mode [ 70.188719][ T8417] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.214905][ T8540] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.223273][ T8540] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.232356][ T8540] device bridge_slave_1 entered promiscuous mode [ 70.243146][ T8423] device hsr_slave_0 entered promiscuous mode [ 70.251220][ T8423] device hsr_slave_1 entered promiscuous mode [ 70.258378][ T8423] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 70.266271][ T8423] Cannot create hsr debugfs directory [ 70.348435][ T8417] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.382769][ T8540] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.393533][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.405255][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.421158][ T3822] Bluetooth: hci5: command 0x0409 tx timeout [ 70.439714][ T8540] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.477592][ T8540] team0: Port device team_slave_0 added [ 70.493823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.504786][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.513920][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.521356][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.532611][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.541495][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.550054][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.557227][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.565339][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.607631][ T8540] team0: Port device team_slave_1 added [ 70.622930][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.632729][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.644623][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.653995][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.664313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.673667][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.698439][ T8421] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 70.719914][ T8421] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 70.752135][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.759966][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.776097][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.787271][ T8421] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 70.813306][ T8421] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 70.831759][ T8540] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.838714][ T8540] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.867822][ T8540] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.886988][ T8419] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.910018][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.926596][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.936838][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.954153][ T8540] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.962461][ T8540] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.971100][ T3082] Bluetooth: hci0: command 0x041b tx timeout [ 70.993204][ T8540] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 71.064173][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.072621][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.080269][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.089638][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.104784][ T8417] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.132607][ T8540] device hsr_slave_0 entered promiscuous mode [ 71.144834][ T8540] device hsr_slave_1 entered promiscuous mode [ 71.151946][ T8540] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 71.159612][ T8540] Cannot create hsr debugfs directory [ 71.178234][ T8419] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.200618][ T3082] Bluetooth: hci1: command 0x041b tx timeout [ 71.248572][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 71.258466][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.270273][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.279491][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.288858][ T9541] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.296022][ T9541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.305199][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.315085][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.324343][ T9541] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.331504][ T9541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.374559][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.388869][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.415851][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 71.424828][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.438200][ T8423] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 71.446077][ T9313] Bluetooth: hci2: command 0x041b tx timeout [ 71.459196][ T8417] device veth0_vlan entered promiscuous mode [ 71.476073][ T8421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.483425][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.492815][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.511359][ T8423] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 71.523647][ T3256] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.530217][ T3256] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.568897][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.581462][ T8423] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 71.596391][ T8423] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 71.620038][ T8421] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.641201][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.649031][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.658809][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.669567][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.699898][ T8425] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 71.718466][ T8425] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 71.730093][ T8417] device veth1_vlan entered promiscuous mode [ 71.741377][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 71.749461][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.757606][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.767190][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.777417][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.784578][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.792876][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.802317][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.811417][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.818474][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.827158][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.836277][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.845672][ T36] Bluetooth: hci3: command 0x041b tx timeout [ 71.870197][ T8425] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 71.899192][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 71.907692][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.916430][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.926046][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.935941][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.947278][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.956797][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.966927][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.976180][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.985545][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.010869][ T8419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.020577][ T9568] Bluetooth: hci4: command 0x041b tx timeout [ 72.033557][ T8425] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 72.060096][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.068566][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.078363][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.125883][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.134735][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.144082][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.153416][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.168809][ T8421] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.182899][ T8421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.204607][ T8419] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.222694][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.235425][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.247154][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.259782][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.272799][ T8417] device veth0_macvtap entered promiscuous mode [ 72.322990][ T8417] device veth1_macvtap entered promiscuous mode [ 72.339910][ T8540] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 72.359218][ T8540] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 72.368287][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 72.383551][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.392507][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.399999][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.415790][ T8421] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.436093][ T8540] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 72.466110][ T8540] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 72.481151][ T9313] Bluetooth: hci5: command 0x041b tx timeout [ 72.499428][ T8417] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.507866][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.518045][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.529678][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.539034][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.559452][ T8423] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.592544][ T8417] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.612925][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.622957][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.634806][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.644330][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.653257][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.663006][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.691103][ T8419] device veth0_vlan entered promiscuous mode [ 72.703288][ T8417] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.717790][ T8417] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.728605][ T8417] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.737892][ T8417] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.752258][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.760169][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.775959][ T8423] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.793102][ T8425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.821136][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.828884][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.843563][ T8419] device veth1_vlan entered promiscuous mode [ 72.869149][ T8425] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.878847][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 72.890774][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.899369][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.908580][ T9706] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.915735][ T9706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.924529][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.933244][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.941717][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.949878][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.960836][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.968976][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.977912][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.009954][ T8421] device veth0_vlan entered promiscuous mode [ 73.021690][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.031398][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.039890][ T3822] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.047065][ T3822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.051307][ T9706] Bluetooth: hci0: command 0x040f tx timeout [ 73.110879][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 73.118958][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.137129][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.152711][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.162144][ T9729] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.169186][ T9729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.177416][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.186633][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.195151][ T9729] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.202327][ T9729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.211011][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.219654][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.228778][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.237863][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.261334][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.273852][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.283620][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.295148][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.304944][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.320879][ T9568] Bluetooth: hci1: command 0x040f tx timeout [ 73.325677][ T8419] device veth0_macvtap entered promiscuous mode [ 73.342519][ T8421] device veth1_vlan entered promiscuous mode [ 73.358737][ T8423] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 73.379354][ T8423] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 73.419668][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 73.428486][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.440017][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.450483][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.459012][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.468552][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.478058][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.487817][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 73.496542][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.506452][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 73.515689][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.538883][ T8419] device veth1_macvtap entered promiscuous mode [ 73.545794][ T36] Bluetooth: hci2: command 0x040f tx timeout [ 73.571034][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.571692][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 73.589994][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 73.598366][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 73.608136][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.621007][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 73.629368][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.648524][ T8421] device veth0_macvtap entered promiscuous mode [ 73.674442][ T8425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 73.684271][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 73.697313][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 73.708023][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.717604][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.730279][ T8421] device veth1_macvtap entered promiscuous mode [ 73.742909][ T8423] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.781103][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.789217][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.804011][ T8540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.818097][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 73.828289][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 73.838277][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 73.859489][ T8419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 73.870614][ T8419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.884383][ T8419] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.905751][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 73.920956][ T20] Bluetooth: hci3: command 0x040f tx timeout [ 73.924773][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.938369][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 73.949023][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.961405][ T8421] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.969955][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 73.980636][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.989320][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.003864][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.018682][ T8419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.034475][ T8419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.046505][ T8419] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.068799][ T8540] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.080421][ T3082] Bluetooth: hci4: command 0x040f tx timeout [ 74.091469][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.105143][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.116059][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.127145][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.139071][ T8421] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.147672][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.161623][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.171349][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.179215][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.187996][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 74.196148][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 74.204395][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.214159][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.232995][ T8419] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.242876][ T8419] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.258694][ T8419] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.269176][ T8419] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.283162][ T25] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.285615][ T8425] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.299377][ T25] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.313827][ T8421] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.324530][ T8421] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.334325][ T8421] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.343488][ T8421] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.354269][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 74.363378][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 74.373445][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 74.382459][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.392359][ T9729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.402940][ T9729] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.410031][ T9729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.453277][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.461756][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 74.469864][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.479360][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.488962][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.498154][ T9541] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.505303][ T9541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.513423][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.525334][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.533891][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.560463][ T36] Bluetooth: hci5: command 0x040f tx timeout [ 74.593921][ T8423] device veth0_vlan entered promiscuous mode [ 74.627866][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.720432][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.739057][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.753664][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.763513][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.777595][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 74.786867][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.796131][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.806078][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.818504][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 74.834849][ T8423] device veth1_vlan entered promiscuous mode [ 74.859567][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.914443][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 74.924454][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 75.016078][ T8540] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.026257][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 75.047097][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.067575][ T8423] device veth0_macvtap entered promiscuous mode [ 75.095960][ T285] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.105662][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.114559][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 75.124798][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.124872][ T285] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.144007][ T36] Bluetooth: hci0: command 0x0419 tx timeout [ 75.144399][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.172369][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 75.188556][ T8423] device veth1_macvtap entered promiscuous mode [ 75.221715][ T51] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.229894][ T51] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.239011][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 75.249481][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 75.268952][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 75.316469][ T9306] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 75.331364][ T9306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 75.339817][ T9306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.357677][ T9306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.367708][ T9306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.379883][ T9306] Bluetooth: hci1: command 0x0419 tx timeout [ 75.390344][ T8425] device veth0_vlan entered promiscuous mode [ 75.407397][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.430316][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.442675][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.454684][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.465872][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.480828][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.504294][ T8423] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.535907][ T9808] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 75.554252][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.564952][ T285] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 23:34:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @loopback, @empty}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 23:34:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newnexthop={0x1c, 0x15, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) [ 75.581249][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.594872][ T285] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.622363][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 75.660870][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.669597][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 75.696785][ T9706] Bluetooth: hci2: command 0x0419 tx timeout [ 75.701250][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 75.730245][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.748023][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 75.768597][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.780400][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 75.792341][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.805743][ T8423] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.818395][ T8425] device veth1_vlan entered promiscuous mode [ 75.828409][ T9814] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 75.838710][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.851025][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:34:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newnexthop={0x1c, 0x15, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) [ 75.872246][ T8423] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.882144][ T8423] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.897388][ T8423] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.919302][ T8423] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.002002][ T36] Bluetooth: hci3: command 0x0419 tx timeout [ 76.035250][ T9820] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 76.071885][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 76.086959][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 23:34:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newnexthop={0x1c, 0x15, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) [ 76.113378][ T8540] device veth0_vlan entered promiscuous mode [ 76.136052][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.155805][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 23:34:07 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x10f, 0x1, 0x0, 0x904f00) [ 76.171014][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 76.181777][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.194127][ T8425] device veth0_macvtap entered promiscuous mode [ 76.202262][ T9313] Bluetooth: hci4: command 0x0419 tx timeout [ 76.233268][ T8540] device veth1_vlan entered promiscuous mode [ 76.324081][ T8425] device veth1_macvtap entered promiscuous mode 23:34:08 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x10f, 0x1, 0x0, 0x904f00) [ 76.380699][ T285] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.391265][ T9838] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 76.403207][ T285] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 23:34:08 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) [ 76.489370][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 76.506399][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 76.525411][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 76.538467][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 76.559730][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 23:34:08 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x10f, 0x1, 0x0, 0x904f00) 23:34:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @loopback, @empty}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 76.592482][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 76.614835][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.641899][ T36] Bluetooth: hci5: command 0x0419 tx timeout [ 76.653476][ T8425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 76.675301][ T8425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.691417][ T8425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 76.730142][ T8425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.750495][ T8425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 76.785418][ T8425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.827766][ T8425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 76.839899][ T8425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.873141][ T8425] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 76.887890][ T8540] device veth0_macvtap entered promiscuous mode [ 76.897469][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 76.908365][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.918939][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.931600][ T285] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.935503][ T8425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 76.939754][ T285] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.951157][ T8425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.971557][ T8425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 76.982675][ T8425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.993295][ T8425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 77.004385][ T8425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.014941][ T8425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 77.026485][ T8425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.044869][ T8425] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.059570][ T8540] device veth1_macvtap entered promiscuous mode [ 77.071422][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 77.090916][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 77.112472][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 77.130554][ C1] hrtimer: interrupt took 88021 ns [ 77.137780][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 77.153630][ T8425] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.189725][ T8425] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.230093][ T8425] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.238964][ T8425] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.396459][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 77.426683][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.459165][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 77.499275][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.532993][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 77.579990][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.590784][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 77.603274][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.615398][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 77.637150][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.654777][ T8540] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.681245][ T9306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 77.703659][ T9306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 77.738206][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 77.766176][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.787458][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 77.810079][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.824794][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 77.838763][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.862423][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 77.884293][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.905445][ T8540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 77.919683][ T8540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 77.936972][ T8540] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.954844][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 77.969826][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:34:09 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000007500000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0xab, &(0x7f00000002c0)=""/171, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) syncfs(r1) [ 77.983333][ T8540] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.019254][ T8540] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.029550][ T8540] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.040939][ T8540] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.090582][ T285] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.098724][ T285] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.171084][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 78.215733][ T25] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.241124][ T25] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.263423][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 78.327951][ T25] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.357176][ T25] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.399747][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 23:34:10 executing program 4: r0 = socket(0x1d, 0x2, 0x6) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x6a, 0x4, 0x400000, 0x4) [ 78.444645][ T285] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.455118][ T285] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.493910][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 23:34:10 executing program 5: syz_emit_ethernet(0x8e, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x5, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, {0x19, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @private, {[@cipso={0x86, 0x12, 0x0, [{0x0, 0x5, "1e0b69"}, {0x0, 0x7, "653d817bf1"}]}, @timestamp_addr={0x44, 0x34, 0x0, 0x1, 0x0, [{@multicast2=0xe000006c}, {@dev}, {}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@remote}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x0]}]}}}}}}}, 0x0) 23:34:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000004200)='/dev/ocfs2_control\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000006780)={0x2020}, 0x465c1c10) 23:34:10 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 23:34:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @loopback, @empty}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 23:34:10 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000007500000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0xab, &(0x7f00000002c0)=""/171, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) syncfs(r1) 23:34:10 executing program 4: r0 = socket(0x1d, 0x2, 0x6) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x6a, 0x4, 0x400000, 0x4) 23:34:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000004200)='/dev/ocfs2_control\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000006780)={0x2020}, 0x465c1c10) 23:34:10 executing program 5: syz_emit_ethernet(0x8e, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x5, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, {0x19, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @private, {[@cipso={0x86, 0x12, 0x0, [{0x0, 0x5, "1e0b69"}, {0x0, 0x7, "653d817bf1"}]}, @timestamp_addr={0x44, 0x34, 0x0, 0x1, 0x0, [{@multicast2=0xe000006c}, {@dev}, {}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@remote}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x0]}]}}}}}}}, 0x0) 23:34:10 executing program 4: r0 = socket(0x1d, 0x2, 0x6) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x6a, 0x4, 0x400000, 0x4) 23:34:10 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000007500000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0xab, &(0x7f00000002c0)=""/171, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) syncfs(r1) 23:34:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000004200)='/dev/ocfs2_control\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000006780)={0x2020}, 0x465c1c10) 23:34:10 executing program 5: syz_emit_ethernet(0x8e, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x5, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, {0x19, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @private, {[@cipso={0x86, 0x12, 0x0, [{0x0, 0x5, "1e0b69"}, {0x0, 0x7, "653d817bf1"}]}, @timestamp_addr={0x44, 0x34, 0x0, 0x1, 0x0, [{@multicast2=0xe000006c}, {@dev}, {}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@remote}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x0]}]}}}}}}}, 0x0) 23:34:10 executing program 4: r0 = socket(0x1d, 0x2, 0x6) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x6a, 0x4, 0x400000, 0x4) 23:34:10 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000007500000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0xab, &(0x7f00000002c0)=""/171, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) syncfs(r1) 23:34:10 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 23:34:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000004200)='/dev/ocfs2_control\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000006780)={0x2020}, 0x465c1c10) 23:34:11 executing program 4: r0 = socket(0x1d, 0x2, 0x6) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x6a, 0x4, 0x400000, 0x4) 23:34:11 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 23:34:11 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000007500000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0xab, &(0x7f00000002c0)=""/171, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) syncfs(r1) 23:34:11 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:34:11 executing program 4: r0 = socket(0x1d, 0x2, 0x6) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x6a, 0x4, 0x400000, 0x4) 23:34:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 23:34:11 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000007500000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0xab, &(0x7f00000002c0)=""/171, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) syncfs(r1) 23:34:11 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) [ 79.976989][ T9986] loop2: detected capacity change from 0 to 264192 23:34:11 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000080)=@random={'user.', 'fdinfo/3\x00'}) 23:34:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 23:34:11 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) [ 80.207805][ T9986] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:34:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 23:34:12 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) 23:34:12 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000080)=@random={'user.', 'fdinfo/3\x00'}) 23:34:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000f00)=ANY=[@ANYBLOB="61128f00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000370700004c0000001f75000000000000bf5400000000000007040000f0fff8ffad430100000000009500000000000000050000000000000095000000000000001c0a7900007a35f0aabeb42c3350c512aee994a5642cb064ecd5615f3196e3359aceb768637c60bd5d2e4b274fdff6e79fc722f15659a7c85615c1b88bc894123cfe2314e887efecdcb7381ef4932cb0dcebea6d90e9c1677fbefd35893d883a2c559b7a34db461b1974af360eace66cec40d92706d0bbcc5bf6fec345ae9606c3c1a348f9b395592c1018e5e4b41b13000c94df1f2db24c67d4c7ba9ec035883e2791a9e9dff3e8bfc7d1be000000820102b1900000000000000000387a601e3a3412086dee84efd375f0645f3301f55d3b9efd12fc86befbed9b430bcf0418e100bdff1c8bcfc0c229874bc3d2418bab997c8bef9aa55841caa5725dddff9220c67c9e17bee524c3dc747445763ecb0a7f2cd12bc34b0fc0271124cfb5279195f701000000f77c71294bbfd85878726c49eb89085967722da6cb884d1afe82f7f722e38397996271700241094d272dd8b754b2dd36d44f92991a7817450bc7921dd372e621dd447b86e7ffd1bdc19846b995cac0995ca3ef6c1affb693ae366b0f11db6ee4830db4713e5cf3263b8c51d4eb57b8e9f172c3db24558d77b8bf18be45c50b3fc005fa7b134dfc948f6015e0389d7f34cb9c02cf517c8ed7a9b6159c1446ef1c2ccff2bdff030000ed9b836d6b8fcab7663d9bd8415e6f90fdb007b8f3e08de3a638c4fdb8562eb85173720c1df1147c9f5013c82fb6517c152c181e759a6b73943748a9cbfbd9cf81bcb1d262a78951c5c2845762f6b0a284cc463b42492bab0f7b25895cc3ba8bf0b5e0fc018463d03a73fa85429725545145b7308c50a13d0dd35092250bbce4f618cad2375a34c7f15c3096f300004468cf1aba4a6f21ed0eb3681c696320d3251b7eab79ad8b126500419e25a94ce13a7a96deac79c90b8df122942a0fad0d814f230f954eec84ebda9fb3977f33c516aadc9bc51f23b12f761c4a0335cc1fe6608ea8626f651d7853af2ef066e4fbe7018f6424f5baafc8d0a6c6d8d0ebc2a2e97f0629999534273e023fd6c300000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 80.643962][T10016] loop2: detected capacity change from 0 to 264192 [ 80.701670][T10016] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:34:12 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:34:12 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 23:34:12 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000080)=@random={'user.', 'fdinfo/3\x00'}) 23:34:12 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) 23:34:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 23:34:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) [ 80.995634][ T236] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:34:12 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000080)=@random={'user.', 'fdinfo/3\x00'}) 23:34:12 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) 23:34:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 23:34:13 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:34:13 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) [ 81.435720][T10048] loop2: detected capacity change from 0 to 264192 23:34:13 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) [ 81.540880][T10048] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:34:13 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:34:13 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) 23:34:13 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) 23:34:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) [ 82.398589][T10066] loop2: detected capacity change from 0 to 264192 23:34:14 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) 23:34:14 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) 23:34:14 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) [ 82.629804][T10066] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:34:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:34:14 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:34:14 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 23:34:14 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x53ad1eaee2611710) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="942f77a86b33101e05366ababdbe8f13e55981110a3fba22e0c26770925a3f9764193f67aff8148fd223f403ca4b5192f7643d0895ed4b37a7bec5da9bf42e2cfe902fe1cd972f120099442d61398945b2d48d03a421ca815226af", 0x5b, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) 23:34:14 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) [ 83.182551][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:34:15 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:34:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:34:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:34:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 83.975536][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:34:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:34:15 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 23:34:15 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:34:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb66f2d696569eada31b09fbd15f0332701d9d14a3f3109d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b000000000000000000000000000000730428fde6136b8e97c32a552841516ab78c83f85cfe873f70957000dac653b3b313d89a46e152f50577830547", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:34:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 84.384299][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:34:16 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8209ff92802693f2ece85d74b82d1183c296f2a0818b8f32a3a461cac68663c91500ed25"], &(0x7f0000000080)='{\'(\x00', 0x4, 0x2) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xe0}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc310e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:34:16 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 23:34:16 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 84.989542][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 85.092687][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:34:17 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 23:34:17 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 85.563854][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 85.711538][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:34:17 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)={0x78, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x3c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6600b18dfd63eb0faece9f0e1da3eca3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0x1c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}, @NL802154_KEY_ID_ATTR_INDEX={0x5}]}]}]}, 0x78}}, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) 23:34:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005f00)={0xe, 0x2, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x19}, @exit], &(0x7f0000000c00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:34:17 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 23:34:17 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 86.146313][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:34:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005f00)={0xe, 0x2, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x19}, @exit], &(0x7f0000000c00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 86.210650][T10179] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 86.222416][T10179] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 86.230845][T10179] CPU: 1 PID: 10179 Comm: syz-executor.5 Not tainted 5.12.0-rc2-syzkaller #0 [ 86.239627][T10179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.248255][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 86.249695][T10179] RIP: 0010:crypto_destroy_tfm+0x3b/0x260 [ 86.249745][T10179] Code: 48 89 fb e8 57 74 d7 fd 48 85 db 0f 84 0c 02 00 00 48 89 1c 24 49 bc 00 00 00 00 00 fc ff df 4c 8d 7d 10 4c 89 fb 48 c1 eb 03 <42> 80 3c 23 00 74 08 4c 89 ff e8 26 27 1b fe 48 8b 45 10 48 89 44 [ 86.249759][T10179] RSP: 0018:ffffc9000207f798 EFLAGS: 00010203 [ 86.292177][T10179] RAX: ffffffff83a13949 RBX: 0000000000000002 RCX: 0000000000040000 [ 86.300164][T10179] RDX: ffffc90013b8e000 RSI: 0000000000005b79 RDI: 0000000000005b7a [ 86.308153][T10179] RBP: 0000000000000006 R08: ffffffff83a13845 R09: fffffbfff1f2c8b5 [ 86.316140][T10179] R10: fffffbfff1f2c8b5 R11: 0000000000000000 R12: dffffc0000000000 [ 86.324122][T10179] R13: ffff888030fb4c00 R14: ffff888030fb4c80 R15: 0000000000000016 [ 86.332238][T10179] FS: 00007f9229f0d700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 86.341184][T10179] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 86.347804][T10179] CR2: 00007f9229eeacc0 CR3: 000000002652d000 CR4: 00000000001506e0 23:34:18 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005f00)={0xe, 0x2, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x19}, @exit], &(0x7f0000000c00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 86.355796][T10179] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 86.363906][T10179] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 86.371899][T10179] Call Trace: [ 86.375199][T10179] mac802154_llsec_key_add+0x930/0xe50 [ 86.380676][T10179] ieee802154_add_llsec_key+0x61/0x80 [ 86.386066][T10179] nl802154_add_llsec_key+0x4ca/0x7b0 [ 86.391461][T10179] genl_rcv_msg+0xe4e/0x1280 [ 86.396079][T10179] ? nl802154_dump_llsec_key+0xc20/0xc20 [ 86.401750][T10179] netlink_rcv_skb+0x190/0x3a0 [ 86.406533][T10179] ? genl_bind+0x2f0/0x2f0 [ 86.410973][T10179] genl_rcv+0x24/0x40 [ 86.414973][T10179] netlink_unicast+0x786/0x940 [ 86.419760][T10179] netlink_sendmsg+0x9ae/0xd50 [ 86.424541][T10179] ? netlink_getsockopt+0xa50/0xa50 [ 86.429756][T10179] ____sys_sendmsg+0x519/0x800 [ 86.434536][T10179] ? import_iovec+0xe6/0x120 [ 86.439138][T10179] __sys_sendmsg+0x2bf/0x370 [ 86.443750][T10179] ? syscall_enter_from_user_mode+0x24/0x190 [ 86.449732][T10179] ? lockdep_hardirqs_on+0x8d/0x130 [ 86.455051][T10179] ? syscall_enter_from_user_mode+0x24/0x190 [ 86.461029][T10179] do_syscall_64+0x2d/0x70 [ 86.465442][T10179] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 86.471338][T10179] RIP: 0033:0x465f69 [ 86.475227][T10179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 86.494832][T10179] RSP: 002b:00007f9229f0d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 86.503255][T10179] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000465f69 [ 86.511228][T10179] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000005 [ 86.519198][T10179] RBP: 00000000004bfa3f R08: 0000000000000000 R09: 0000000000000000 [ 86.527162][T10179] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c008 [ 86.535128][T10179] R13: 00007ffe30f14e4f R14: 00007f9229f0d300 R15: 0000000000022000 [ 86.543102][T10179] Modules linked in: 23:34:18 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 23:34:18 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 23:34:18 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 23:34:18 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf23df7af15ea202f}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe70, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000e6ffffff", '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 23:34:18 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005f00)={0xe, 0x2, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x19}, @exit], &(0x7f0000000c00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 86.666520][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:34:18 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000c80)="22bcb88bfedaed2aace19fb1b71ab0294c0e42315845f0ca5430bbd59f803242ebda6df94962194c2d9c1aa30c4585ffffffa35837084b711e971c6d483c3cc74ef7e58656be8b2a9468fc2a5850f12efe6fc090e6c63beb7e9d573fe6240a238478e176e0148a1093a47776d4c4fde7650afa89464b5b3849ced7bd5e1211bc45a08335c0ad0dc7a83fb479b570307ff498399e60aa1e81c2fd69080eaf0f44f6c1ae70ba3d", 0xa6}, {0x0}, {&(0x7f0000000540)}], 0x3}, 0x81) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 87.100893][T10179] ---[ end trace b2b20050f847205e ]--- [ 87.107707][T10179] RIP: 0010:crypto_destroy_tfm+0x3b/0x260 [ 87.128724][T10179] Code: 48 89 fb e8 57 74 d7 fd 48 85 db 0f 84 0c 02 00 00 48 89 1c 24 49 bc 00 00 00 00 00 fc ff df 4c 8d 7d 10 4c 89 fb 48 c1 eb 03 <42> 80 3c 23 00 74 08 4c 89 ff e8 26 27 1b fe 48 8b 45 10 48 89 44 [ 87.180618][T10179] RSP: 0018:ffffc9000207f798 EFLAGS: 00010203 [ 87.187049][T10179] RAX: ffffffff83a13949 RBX: 0000000000000002 RCX: 0000000000040000 [ 87.197442][T10179] RDX: ffffc90013b8e000 RSI: 0000000000005b79 RDI: 0000000000005b7a [ 87.216489][T10179] RBP: 0000000000000006 R08: ffffffff83a13845 R09: fffffbfff1f2c8b5 [ 87.238867][T10179] R10: fffffbfff1f2c8b5 R11: 0000000000000000 R12: dffffc0000000000 [ 87.247454][T10179] R13: ffff888030fb4c00 R14: ffff888030fb4c80 R15: 0000000000000016 [ 87.256158][T10179] FS: 00007f9229f0d700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 87.275434][T10179] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 87.284719][T10179] CR2: 0000001b3202a000 CR3: 000000002652d000 CR4: 00000000001506f0 [ 87.293583][T10179] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 87.304724][T10179] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 87.314669][T10179] Kernel panic - not syncing: Fatal exception [ 87.321384][T10179] Kernel Offset: disabled [ 87.325711][T10179] Rebooting in 86400 seconds..