Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. 2021/03/10 06:11:03 fuzzer started 2021/03/10 06:11:03 dialing manager at 10.128.0.163:41635 2021/03/10 06:11:03 syscalls: 3540 2021/03/10 06:11:03 code coverage: enabled 2021/03/10 06:11:03 comparison tracing: enabled 2021/03/10 06:11:03 extra coverage: enabled 2021/03/10 06:11:03 setuid sandbox: enabled 2021/03/10 06:11:03 namespace sandbox: enabled 2021/03/10 06:11:03 Android sandbox: /sys/fs/selinux/policy does not exist 2021/03/10 06:11:03 fault injection: enabled 2021/03/10 06:11:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/10 06:11:03 net packet injection: enabled 2021/03/10 06:11:03 net device setup: enabled 2021/03/10 06:11:03 concurrency sanitizer: enabled 2021/03/10 06:11:03 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/10 06:11:03 USB emulation: enabled 2021/03/10 06:11:03 hci packet injection: enabled 2021/03/10 06:11:03 wifi device emulation: enabled 2021/03/10 06:11:03 802.15.4 emulation: enabled 2021/03/10 06:11:05 suppressing KCSAN reports in functions: 'generic_write_end' 'jbd2_journal_commit_transaction' 'blk_mq_rq_ctx_init' 'xas_clear_mark' 'blk_mq_sched_dispatch_requests' 'do_nanosleep' '__filemap_fdatawrite_range' '__xa_clear_mark' 'ext4_fc_commit' '__ext4_new_inode' '__mod_timer' 'ext4_free_inodes_count' '__mark_inode_dirty' 'audit_log_start' 2021/03/10 06:11:05 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/10 06:11:05 fetching corpus: 48, signal 19812/23410 (executing program) 2021/03/10 06:11:05 fetching corpus: 97, signal 31923/36921 (executing program) 2021/03/10 06:11:05 fetching corpus: 146, signal 36705/43206 (executing program) 2021/03/10 06:11:05 fetching corpus: 196, signal 45019/52725 (executing program) 2021/03/10 06:11:05 fetching corpus: 246, signal 49778/58716 (executing program) 2021/03/10 06:11:05 fetching corpus: 296, signal 54222/64284 (executing program) 2021/03/10 06:11:05 fetching corpus: 346, signal 65942/76481 (executing program) 2021/03/10 06:11:06 fetching corpus: 396, signal 72904/84157 (executing program) 2021/03/10 06:11:06 fetching corpus: 446, signal 77331/89425 (executing program) 2021/03/10 06:11:06 fetching corpus: 496, signal 81604/94379 (executing program) 2021/03/10 06:11:06 fetching corpus: 546, signal 87167/100402 (executing program) 2021/03/10 06:11:06 fetching corpus: 596, signal 91530/105311 (executing program) 2021/03/10 06:11:06 fetching corpus: 645, signal 94259/108679 (executing program) 2021/03/10 06:11:06 fetching corpus: 695, signal 97966/112841 (executing program) 2021/03/10 06:11:06 fetching corpus: 744, signal 101590/116857 (executing program) 2021/03/10 06:11:06 fetching corpus: 792, signal 104496/120187 (executing program) 2021/03/10 06:11:06 fetching corpus: 841, signal 109261/124964 (executing program) 2021/03/10 06:11:06 fetching corpus: 891, signal 115108/130461 (executing program) 2021/03/10 06:11:06 fetching corpus: 941, signal 118249/133778 (executing program) 2021/03/10 06:11:06 fetching corpus: 991, signal 120560/136349 (executing program) 2021/03/10 06:11:07 fetching corpus: 1041, signal 123340/139245 (executing program) 2021/03/10 06:11:07 fetching corpus: 1088, signal 125310/141454 (executing program) 2021/03/10 06:11:07 fetching corpus: 1138, signal 127059/143452 (executing program) 2021/03/10 06:11:07 fetching corpus: 1188, signal 130665/146845 (executing program) 2021/03/10 06:11:07 fetching corpus: 1238, signal 132907/149149 (executing program) 2021/03/10 06:11:07 fetching corpus: 1288, signal 134883/151181 (executing program) 2021/03/10 06:11:07 fetching corpus: 1338, signal 137257/153420 (executing program) 2021/03/10 06:11:07 fetching corpus: 1388, signal 140344/156165 (executing program) 2021/03/10 06:11:07 fetching corpus: 1438, signal 142575/158274 (executing program) 2021/03/10 06:11:08 fetching corpus: 1487, signal 144246/159949 (executing program) 2021/03/10 06:11:08 fetching corpus: 1537, signal 145666/161432 (executing program) 2021/03/10 06:11:08 fetching corpus: 1587, signal 147756/163316 (executing program) 2021/03/10 06:11:08 fetching corpus: 1637, signal 149834/165124 (executing program) 2021/03/10 06:11:08 fetching corpus: 1687, signal 151855/166838 (executing program) 2021/03/10 06:11:08 fetching corpus: 1737, signal 153551/168354 (executing program) 2021/03/10 06:11:08 fetching corpus: 1787, signal 155126/169717 (executing program) 2021/03/10 06:11:08 fetching corpus: 1837, signal 157176/171334 (executing program) 2021/03/10 06:11:08 fetching corpus: 1887, signal 159464/173072 (executing program) 2021/03/10 06:11:08 fetching corpus: 1937, signal 161626/174668 (executing program) 2021/03/10 06:11:08 fetching corpus: 1987, signal 163331/175932 (executing program) 2021/03/10 06:11:08 fetching corpus: 2037, signal 165060/177230 (executing program) 2021/03/10 06:11:09 fetching corpus: 2087, signal 166404/178273 (executing program) 2021/03/10 06:11:09 fetching corpus: 2137, signal 167976/179396 (executing program) 2021/03/10 06:11:09 fetching corpus: 2186, signal 169363/180364 (executing program) 2021/03/10 06:11:09 fetching corpus: 2236, signal 170709/181353 (executing program) 2021/03/10 06:11:09 fetching corpus: 2286, signal 171848/182188 (executing program) 2021/03/10 06:11:09 fetching corpus: 2336, signal 173400/183215 (executing program) 2021/03/10 06:11:09 fetching corpus: 2386, signal 174545/183972 (executing program) 2021/03/10 06:11:09 fetching corpus: 2436, signal 176123/184955 (executing program) 2021/03/10 06:11:09 fetching corpus: 2486, signal 177957/186003 (executing program) 2021/03/10 06:11:09 fetching corpus: 2536, signal 179836/187025 (executing program) 2021/03/10 06:11:09 fetching corpus: 2586, signal 181120/187728 (executing program) 2021/03/10 06:11:09 fetching corpus: 2634, signal 182228/188384 (executing program) 2021/03/10 06:11:09 fetching corpus: 2683, signal 185012/189741 (executing program) 2021/03/10 06:11:09 fetching corpus: 2733, signal 186074/190303 (executing program) 2021/03/10 06:11:10 fetching corpus: 2783, signal 187401/190922 (executing program) 2021/03/10 06:11:10 fetching corpus: 2832, signal 188963/191592 (executing program) 2021/03/10 06:11:10 fetching corpus: 2880, signal 190424/192193 (executing program) 2021/03/10 06:11:10 fetching corpus: 2927, signal 191280/192566 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192818 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192832 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192853 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192871 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192891 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192903 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192913 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192928 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192947 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191871/192964 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/192986 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193003 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193026 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193035 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193053 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193071 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193085 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193104 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193125 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193144 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193164 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193179 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193190 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193207 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193226 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193243 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193252 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193268 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193285 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193293 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193313 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193322 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193332 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193349 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193371 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193387 (executing program) 2021/03/10 06:11:10 fetching corpus: 2959, signal 191879/193387 (executing program) 2021/03/10 06:11:10 fetching corpus: 2960, signal 191880/193388 (executing program) 2021/03/10 06:11:10 fetching corpus: 2960, signal 191880/193392 (executing program) 2021/03/10 06:11:10 fetching corpus: 2960, signal 191880/193392 (executing program) 2021/03/10 06:11:12 starting 6 fuzzer processes 06:11:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sys_enter\x00', r1}, 0x10) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x141001) r3 = dup(r2) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0xfffffd2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) listen(r0, 0x0) 06:11:12 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f00009e5000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0) 06:11:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10014, 0x4000000000000, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp\x00') fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0xe2, 0x2) setregid(0x0, 0x0) sendfile(r1, r2, 0x0, 0x800000080004105) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="0a2a553dd15de123c9a1f71047f7457f28600deee36f7a697db8098211e6b233726ffe73a6473062e025174e0c5c3605c5d60bed49e9a5529f7ec070217a67", 0x3f) creat(0x0, 0x184) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd1, 0x0, @perf_bp={0x0, 0x4}, 0x2080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:11:13 executing program 3: syz_mount_image$vxfs(&(0x7f0000001a00)='vxfs\x00', &(0x7f0000001a40)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0xc080, &(0x7f0000001d00)) 06:11:13 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0xffffffffffffffff) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) 06:11:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000140)=0x10) syzkaller login: [ 41.370674][ T8392] IPVS: ftp: loaded support on port[0] = 21 [ 41.453246][ T8392] chnl_net:caif_netlink_parms(): no params data found [ 41.488610][ T8392] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.496133][ T8392] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.503708][ T8392] device bridge_slave_0 entered promiscuous mode [ 41.512081][ T8392] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.519175][ T8392] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.526985][ T8392] device bridge_slave_1 entered promiscuous mode [ 41.541194][ T8392] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 41.551726][ T8392] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 41.568639][ T8392] team0: Port device team_slave_0 added [ 41.575235][ T8392] team0: Port device team_slave_1 added [ 41.589815][ T8392] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 41.596941][ T8392] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.623928][ T8392] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 41.636657][ T8392] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 41.645630][ T8392] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.694029][ T8392] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 41.710463][ T8394] IPVS: ftp: loaded support on port[0] = 21 [ 41.717826][ T8392] device hsr_slave_0 entered promiscuous mode [ 41.724764][ T8392] device hsr_slave_1 entered promiscuous mode [ 41.784824][ T8396] IPVS: ftp: loaded support on port[0] = 21 [ 41.860399][ T8392] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 41.871624][ T8392] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 41.888773][ T8394] chnl_net:caif_netlink_parms(): no params data found [ 41.927288][ T8398] IPVS: ftp: loaded support on port[0] = 21 [ 41.933516][ T8392] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 41.978507][ T8392] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 42.029653][ T8394] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.039573][ T8394] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.047829][ T8394] device bridge_slave_0 entered promiscuous mode [ 42.055606][ T8394] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.063396][ T8394] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.071222][ T8394] device bridge_slave_1 entered promiscuous mode [ 42.078972][ T8396] chnl_net:caif_netlink_parms(): no params data found [ 42.102178][ T8392] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.109397][ T8392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.116684][ T8392] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.123761][ T8392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.134629][ T8394] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 42.196281][ T8394] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 42.214901][ T8394] team0: Port device team_slave_0 added [ 42.223611][ T8401] IPVS: ftp: loaded support on port[0] = 21 [ 42.234794][ T8394] team0: Port device team_slave_1 added [ 42.261266][ T8398] chnl_net:caif_netlink_parms(): no params data found [ 42.279301][ T8394] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.286405][ T8394] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.313624][ T8394] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.345576][ T8394] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.353553][ T8394] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.381147][ T8394] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.415147][ T8398] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.422514][ T8398] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.430898][ T8398] device bridge_slave_0 entered promiscuous mode [ 42.441294][ T8398] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.448508][ T8398] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.456671][ T8398] device bridge_slave_1 entered promiscuous mode [ 42.471448][ T8403] IPVS: ftp: loaded support on port[0] = 21 [ 42.489321][ T8392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 42.496377][ T8396] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.503732][ T8396] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.511475][ T8396] device bridge_slave_0 entered promiscuous mode [ 42.519757][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.527977][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.538492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 42.566485][ T8396] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.573535][ T8396] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.582590][ T8396] device bridge_slave_1 entered promiscuous mode [ 42.593335][ T8398] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 42.607079][ T8401] chnl_net:caif_netlink_parms(): no params data found [ 42.629330][ T8394] device hsr_slave_0 entered promiscuous mode [ 42.636667][ T8394] device hsr_slave_1 entered promiscuous mode [ 42.643153][ T8394] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 42.651602][ T8394] Cannot create hsr debugfs directory [ 42.661582][ T8398] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 42.683515][ T8398] team0: Port device team_slave_0 added [ 42.690750][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.698609][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.708202][ T8392] 8021q: adding VLAN 0 to HW filter on device team0 [ 42.718857][ T8396] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 42.731039][ T8398] team0: Port device team_slave_1 added [ 42.752831][ T8396] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 42.777233][ T8398] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.784191][ T8398] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.810798][ T8398] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.835192][ T8396] team0: Port device team_slave_0 added [ 42.845127][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 42.857428][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.866567][ T2057] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.873602][ T2057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.883434][ T8398] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.890727][ T8398] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.917708][ T8398] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.940577][ T8396] team0: Port device team_slave_1 added [ 42.952188][ T8403] chnl_net:caif_netlink_parms(): no params data found [ 42.973116][ T8396] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.980530][ T8396] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.006694][ T8396] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 43.019637][ T8396] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 43.028431][ T8396] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.054618][ T8396] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 43.081855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 43.091436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.100825][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.108013][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.132764][ T8398] device hsr_slave_0 entered promiscuous mode [ 43.140572][ T8398] device hsr_slave_1 entered promiscuous mode [ 43.147037][ T8398] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 43.154581][ T8398] Cannot create hsr debugfs directory [ 43.165895][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 43.174539][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 43.183746][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 43.192452][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 43.201476][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 43.210162][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 43.218892][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 43.227323][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.235424][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 43.244420][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.255987][ T8392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 43.266054][ T8396] device hsr_slave_0 entered promiscuous mode [ 43.273399][ T8396] device hsr_slave_1 entered promiscuous mode [ 43.280089][ T8396] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 43.287813][ T8396] Cannot create hsr debugfs directory [ 43.296736][ T8401] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.307417][ T8401] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.315125][ T8401] device bridge_slave_0 entered promiscuous mode [ 43.329952][ T8394] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 43.338997][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 43.352305][ T8394] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 43.365075][ T8394] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 43.376589][ T8394] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 43.385395][ T8401] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.392816][ T8401] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.401051][ T8401] device bridge_slave_1 entered promiscuous mode [ 43.415851][ T9440] Bluetooth: hci0: command 0x0409 tx timeout [ 43.443232][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 43.454230][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 43.464259][ T8401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 43.476777][ T8401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 43.507179][ T8401] team0: Port device team_slave_0 added [ 43.527582][ T8392] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 43.544518][ T8401] team0: Port device team_slave_1 added [ 43.562439][ T8398] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 43.574943][ T8403] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.587950][ T8403] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.595469][ T8403] device bridge_slave_0 entered promiscuous mode [ 43.604255][ T8403] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.612089][ T8403] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.619699][ T8403] device bridge_slave_1 entered promiscuous mode [ 43.640060][ T8398] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 43.659620][ T2039] Bluetooth: hci1: command 0x0409 tx timeout [ 43.660536][ T8403] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 43.679617][ T8403] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 43.690327][ T8401] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 43.697400][ T8401] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.723898][ T8401] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 43.735358][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 43.744244][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.753510][ T8398] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 43.765458][ T8398] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 43.784952][ T8403] team0: Port device team_slave_0 added [ 43.793440][ T8401] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 43.800841][ T8401] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.827272][ T8401] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 43.827427][ T9208] Bluetooth: hci2: command 0x0409 tx timeout [ 43.845932][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 43.853951][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.864518][ T8392] device veth0_vlan entered promiscuous mode [ 43.871876][ T8403] team0: Port device team_slave_1 added [ 43.893032][ T8401] device hsr_slave_0 entered promiscuous mode [ 43.899732][ T8401] device hsr_slave_1 entered promiscuous mode [ 43.907167][ T8401] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 43.914834][ T8401] Cannot create hsr debugfs directory [ 43.920482][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.928907][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.938596][ T8396] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 43.955629][ T8394] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.965618][ T8396] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 43.974463][ T8396] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 43.981261][ T2057] Bluetooth: hci3: command 0x0409 tx timeout [ 43.989310][ T8403] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 43.996659][ T8403] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.025202][ T8403] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.037364][ T8403] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.044303][ T8403] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.070893][ T8403] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.086382][ T8392] device veth1_vlan entered promiscuous mode [ 44.096390][ T8394] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.103917][ T8396] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 44.119704][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 44.127898][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 44.137920][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.145974][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.165558][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 44.174755][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.195130][ T8403] device hsr_slave_0 entered promiscuous mode [ 44.202853][ T8403] device hsr_slave_1 entered promiscuous mode [ 44.209889][ T8403] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 44.218351][ T8403] Cannot create hsr debugfs directory [ 44.233831][ T9208] Bluetooth: hci4: command 0x0409 tx timeout [ 44.242605][ T8392] device veth0_macvtap entered promiscuous mode [ 44.253021][ T8392] device veth1_macvtap entered promiscuous mode [ 44.270343][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 44.278715][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 44.288104][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.297274][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.306093][ T9208] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.316892][ T9208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.324685][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.333227][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.341503][ T9208] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.348596][ T9208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.356429][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.365449][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 44.374357][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.382875][ T2057] Bluetooth: hci5: command 0x0409 tx timeout [ 44.401737][ T8392] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 44.412130][ T8392] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 44.434838][ T8398] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.458096][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 44.467246][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.476286][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 44.484623][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.493696][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 44.502570][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.511789][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 44.520519][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.530066][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 44.538532][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 44.547411][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.559338][ T8392] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.570160][ T8392] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.580939][ T8392] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.591874][ T8392] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.618783][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.627386][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.634886][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 44.643818][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.659022][ T8398] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.671997][ T8394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 44.686010][ T8401] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 44.709535][ T8396] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.723361][ T8401] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 44.736946][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 44.744444][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 44.754571][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.763242][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.773512][ T4942] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.781536][ T4942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.792106][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.801097][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.810650][ T4942] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.818132][ T4942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.826424][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.834189][ T4942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.848584][ T8394] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 44.868786][ T8401] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 44.879140][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.888268][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.897986][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 44.909177][ T8396] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.925400][ T8401] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 44.961008][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 44.970989][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.983078][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 44.995330][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.004743][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 45.015578][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.028114][ T8403] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 45.044549][ T8403] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 45.053549][ T8403] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 45.063103][ T8403] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 45.085723][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 45.093893][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.102251][ T38] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.110608][ T38] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 45.118758][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.127176][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.135858][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.144169][ T2039] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.151231][ T2039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.160244][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.168879][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.177612][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 45.187418][ T2039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 45.199683][ T8398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.246498][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.255738][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.267807][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.275337][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.283832][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 45.292788][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 45.302926][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 45.312051][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 45.321570][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 45.331222][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.352842][ T8396] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 45.363821][ T8396] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 45.381926][ T8401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 45.385887][ T38] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.394032][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 45.406162][ T38] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 45.411146][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.424198][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.433827][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.443814][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.452556][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.460854][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.468632][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 45.476934][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.485530][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 45.493293][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.495446][ T2057] Bluetooth: hci0: command 0x041b tx timeout [ 45.501117][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.514147][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.525458][ T8394] device veth0_vlan entered promiscuous mode [ 45.554565][ T8394] device veth1_vlan entered promiscuous mode [ 45.566089][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 45.574410][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.583341][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.593024][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.601985][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.611973][ T8401] 8021q: adding VLAN 0 to HW filter on device team0 [ 45.644220][ T8396] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 45.658171][ T8398] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 45.676047][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 45.701825][ T8403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 45.727878][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.737621][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.745280][ T19] Bluetooth: hci1: command 0x041b tx timeout [ 45.747785][ T2057] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.758945][ T2057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.767032][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.776233][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.784641][ T2057] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.791780][ T2057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.800145][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 45.816156][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 45.832970][ T8394] device veth0_macvtap entered promiscuous mode [ 45.850346][ T8403] 8021q: adding VLAN 0 to HW filter on device team0 [ 45.864284][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 45.873040][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 45.884014][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.893322][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.903867][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.905348][ T19] Bluetooth: hci2: command 0x041b tx timeout [ 45.913333][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 45.932342][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 45.942246][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.953629][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.962689][ T9135] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.970045][ T9135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.980371][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.989798][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.000164][ T9135] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.007289][ T9135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.017423][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 46.026335][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.034714][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.047819][ T8394] device veth1_macvtap entered promiscuous mode [ 46.057909][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.066207][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 46.067513][ T19] Bluetooth: hci3: command 0x041b tx timeout [ 46.074715][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.095815][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.104545][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.125153][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.137817][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 46.146686][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 46.156873][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.165656][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 46.174537][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.202903][ T8401] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 46.237342][ T8401] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 46.271463][ T8403] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 46.305260][ T9704] Bluetooth: hci4: command 0x041b tx timeout [ 46.318966][ T8403] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 46.333569][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.343277][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.352405][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.361972][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.370625][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.380039][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.389296][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.398227][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.407139][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.416201][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.424660][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.435567][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.443886][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.455380][ T9135] Bluetooth: hci5: command 0x041b tx timeout [ 46.466217][ T8398] device veth0_vlan entered promiscuous mode [ 46.475311][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.486447][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.494242][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.502374][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.512109][ T8394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 46.523213][ T8394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 46.536374][ T8394] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 46.559573][ T8398] device veth1_vlan entered promiscuous mode [ 46.587491][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 46.598975][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.612378][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.622689][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.633340][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.643174][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 46.653208][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 46.661553][ T8396] device veth0_vlan entered promiscuous mode 06:11:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sys_enter\x00', r1}, 0x10) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x141001) r3 = dup(r2) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0xfffffd2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) listen(r0, 0x0) [ 46.682545][ T8403] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.691014][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.702077][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.710579][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 46.720362][ T9706] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 46.734710][ T8394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 46.754026][ T8394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 46.766186][ T8394] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 46.789803][ T8401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.802629][ T8396] device veth1_vlan entered promiscuous mode [ 46.810155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.825909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.842044][ T8394] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 46.859117][ T8394] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 46.872963][ T8394] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 46.884852][ T8394] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 46.903557][ T8398] device veth0_macvtap entered promiscuous mode [ 46.917952][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.933847][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.944234][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 46.974402][ T8396] device veth0_macvtap entered promiscuous mode [ 46.986662][ T8398] device veth1_macvtap entered promiscuous mode [ 47.016398][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.025789][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.034320][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.043250][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.052865][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 06:11:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sys_enter\x00', r1}, 0x10) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x141001) r3 = dup(r2) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0xfffffd2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) listen(r0, 0x0) [ 47.061631][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.070669][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.079595][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.105501][ T8396] device veth1_macvtap entered promiscuous mode [ 47.124213][ T8403] device veth0_vlan entered promiscuous mode [ 47.138296][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.149705][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.159047][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.189281][ T8403] device veth1_vlan entered promiscuous mode [ 47.204014][ T8398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.205335][ T38] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 47.238893][ T8398] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.251414][ T38] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 47.261437][ T8398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.272469][ T8398] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.287883][ T8398] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.303262][ T8401] device veth0_vlan entered promiscuous mode [ 47.312549][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.323831][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.332221][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.341513][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 47.352287][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.361798][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.382947][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.391878][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.413480][ T8398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.426927][ T8398] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.437757][ T8398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.449449][ T8398] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.460902][ T8398] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.474132][ T8401] device veth1_vlan entered promiscuous mode [ 47.484383][ T8396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.497796][ T8396] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.508119][ T8396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.519211][ T8396] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.530496][ T8396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.542000][ T8396] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.553463][ T8396] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.563224][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.571715][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.580153][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.588084][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.596579][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.605594][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.614318][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.623592][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.633384][ T9693] Bluetooth: hci0: command 0x040f tx timeout [ 47.636159][ T8398] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.648530][ T8398] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.661087][ T8398] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.674124][ T8398] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.693579][ T8396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.704259][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 47.704939][ T8396] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.714876][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 47.722700][ T8396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.740460][ T8396] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.750588][ T8396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.761559][ T8396] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.772891][ T8396] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.785365][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.793263][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 47.801818][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.811447][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.825333][ T9704] Bluetooth: hci1: command 0x040f tx timeout [ 47.840759][ T8396] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.849792][ T8396] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.858974][ T8396] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.867818][ T8396] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.886640][ T8401] device veth0_macvtap entered promiscuous mode [ 47.910266][ T8403] device veth0_macvtap entered promiscuous mode [ 47.927048][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.936493][ T9775] mmap: syz-executor.1 (9775) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 47.937266][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 06:11:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sys_enter\x00', r1}, 0x10) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x141001) r3 = dup(r2) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0xfffffd2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) listen(r0, 0x0) 06:11:20 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f00009e5000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0) [ 47.959222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.974906][ T4857] Bluetooth: hci2: command 0x040f tx timeout [ 47.994568][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.029278][ T8401] device veth1_macvtap entered promiscuous mode [ 48.064013][ T8403] device veth1_macvtap entered promiscuous mode [ 48.088303][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 48.108078][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 06:11:20 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f00009e5000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0) [ 48.135198][ T9704] Bluetooth: hci3: command 0x040f tx timeout [ 48.136462][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 48.149900][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.218094][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.245125][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 06:11:20 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f00009e5000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0) [ 48.265583][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.276182][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.286146][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.304909][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.323241][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.333828][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.347112][ T8401] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.356774][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.369557][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.381336][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.387940][ T9567] Bluetooth: hci4: command 0x040f tx timeout [ 48.394130][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.410187][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.421408][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.433433][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.444322][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.454630][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.466147][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.479311][ T8403] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.487862][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.500007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.500825][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 48.509543][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 06:11:20 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f00009e5000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0) [ 48.526594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.534965][ T9706] Bluetooth: hci5: command 0x040f tx timeout [ 48.537536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.556442][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.570647][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.583381][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.597269][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.608083][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 06:11:20 executing program 0: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) [ 48.620788][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.631756][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.642857][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.655115][ T8401] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.665151][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.681360][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.692073][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.716101][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.730900][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.753710][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.764234][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.777978][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.791279][ T8403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.802685][ T8403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.814132][ T8403] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.835222][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 48.858248][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 48.869282][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.878397][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 48.888427][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.900961][ T8401] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.914746][ T8401] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.923549][ T8401] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.933888][ T8401] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.950714][ T8403] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.961611][ T8403] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.971801][ T8403] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.981712][ T8403] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.004685][ C0] hrtimer: interrupt took 25842 ns [ 49.030910][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.057844][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.075209][ T3135] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.077173][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.092871][ T3135] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.109963][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 49.154482][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.173804][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.176128][ T1965] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.183313][ T2057] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 49.209280][ T1965] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 06:11:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10014, 0x4000000000000, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp\x00') fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0xe2, 0x2) setregid(0x0, 0x0) sendfile(r1, r2, 0x0, 0x800000080004105) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="0a2a553dd15de123c9a1f71047f7457f28600deee36f7a697db8098211e6b233726ffe73a6473062e025174e0c5c3605c5d60bed49e9a5529f7ec070217a67", 0x3f) creat(0x0, 0x184) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd1, 0x0, @perf_bp={0x0, 0x4}, 0x2080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 49.263080][ T9440] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.290527][ T3135] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 06:11:21 executing program 3: syz_mount_image$vxfs(&(0x7f0000001a00)='vxfs\x00', &(0x7f0000001a40)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0xc080, &(0x7f0000001d00)) [ 49.324243][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.337664][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.351041][ T3135] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.370238][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.379288][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.380368][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 49.397468][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.425971][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 06:11:21 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0xffffffffffffffff) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) 06:11:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000140)=0x10) 06:11:21 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f00009e5000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0) 06:11:21 executing program 0: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10014, 0x4000000000000, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp\x00') fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0xe2, 0x2) setregid(0x0, 0x0) sendfile(r1, r2, 0x0, 0x800000080004105) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="0a2a553dd15de123c9a1f71047f7457f28600deee36f7a697db8098211e6b233726ffe73a6473062e025174e0c5c3605c5d60bed49e9a5529f7ec070217a67", 0x3f) creat(0x0, 0x184) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd1, 0x0, @perf_bp={0x0, 0x4}, 0x2080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:11:21 executing program 3: syz_mount_image$vxfs(&(0x7f0000001a00)='vxfs\x00', &(0x7f0000001a40)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0xc080, &(0x7f0000001d00)) 06:11:21 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f00009e5000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0) 06:11:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10014, 0x4000000000000, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp\x00') fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0xe2, 0x2) setregid(0x0, 0x0) sendfile(r1, r2, 0x0, 0x800000080004105) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="0a2a553dd15de123c9a1f71047f7457f28600deee36f7a697db8098211e6b233726ffe73a6473062e025174e0c5c3605c5d60bed49e9a5529f7ec070217a67", 0x3f) creat(0x0, 0x184) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd1, 0x0, @perf_bp={0x0, 0x4}, 0x2080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:11:21 executing program 3: syz_mount_image$vxfs(&(0x7f0000001a00)='vxfs\x00', &(0x7f0000001a40)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0xc080, &(0x7f0000001d00)) 06:11:21 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0xffffffffffffffff) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) 06:11:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000140)=0x10) [ 49.655138][ T9705] Bluetooth: hci0: command 0x0419 tx timeout 06:11:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000140)=0x10) 06:11:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000140)=0x10) 06:11:22 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0xffffffffffffffff) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) 06:11:22 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0xffffffffffffffff) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) [ 49.896454][ T9705] Bluetooth: hci1: command 0x0419 tx timeout 06:11:22 executing program 0: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:22 executing program 3: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000140)=0x10) 06:11:22 executing program 4: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:22 executing program 5: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:22 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0xffffffffffffffff) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) 06:11:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000140)=0x10) [ 50.063623][ T9705] Bluetooth: hci2: command 0x0419 tx timeout 06:11:22 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0xffffffffffffffff) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) [ 50.219332][ T9208] Bluetooth: hci3: command 0x0419 tx timeout 06:11:22 executing program 1: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:22 executing program 2: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) [ 50.456736][ T9440] Bluetooth: hci4: command 0x0419 tx timeout 06:11:22 executing program 0: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) [ 50.615551][ T9440] Bluetooth: hci5: command 0x0419 tx timeout 06:11:22 executing program 3: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:23 executing program 4: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:23 executing program 5: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:23 executing program 2: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:23 executing program 3: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:23 executing program 1: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:23 executing program 0: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:23 executing program 5: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:24 executing program 4: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:24 executing program 2: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:24 executing program 1: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:24 executing program 0: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:24 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) writev(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)="8ab6ce", 0x3}, {&(0x7f0000001580)="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", 0x2e2}], 0x2) 06:11:24 executing program 4: madvise(&(0x7f0000000000/0x4000)=nil, 0xfffffffffffffff4, 0xd) 06:11:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) flistxattr(r1, 0x0, 0x0) 06:11:24 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) writev(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)="8ab6ce", 0x3}, {&(0x7f0000001580)="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", 0x2e2}], 0x2) 06:11:24 executing program 4: madvise(&(0x7f0000000000/0x4000)=nil, 0xfffffffffffffff4, 0xd) 06:11:24 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) writev(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)="8ab6ce", 0x3}, {&(0x7f0000001580)="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", 0x2e2}], 0x2) 06:11:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) flistxattr(r1, 0x0, 0x0) 06:11:24 executing program 4: madvise(&(0x7f0000000000/0x4000)=nil, 0xfffffffffffffff4, 0xd) 06:11:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) flistxattr(r1, 0x0, 0x0) 06:11:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) flistxattr(r1, 0x0, 0x0) 06:11:25 executing program 4: madvise(&(0x7f0000000000/0x4000)=nil, 0xfffffffffffffff4, 0xd) 06:11:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) flistxattr(r1, 0x0, 0x0) 06:11:25 executing program 0: r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)) pwrite64(r1, &(0x7f0000000240)="1937f229a62b7c0f614ca08169d8d200edb50e1863de102441a150066a38313fe15302d5448ffa9ba0f4c2b3411ab2dc9af8", 0x32, 0x1) io_setup(0x9, &(0x7f0000000280)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x84000, 0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xb, 0x6, r3, 0x0}]) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x1, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x2007) 06:11:25 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) writev(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)="8ab6ce", 0x3}, {&(0x7f0000001580)="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", 0x2e2}], 0x2) 06:11:25 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) writev(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)="8ab6ce", 0x3}, {&(0x7f0000001580)="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", 0x2e2}], 0x2) 06:11:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000240)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a337cca555fedbe9d8f3b423cdacfa7e32fe021136f4bc38458b2264f9e6effd75c504c9f1f65515b0e1a38d8665522be18bd10a48b043ccc426de0746d25ddd73d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860d01a485dee399b994e12a5c7e8efbc6f2b2a3e3173d5661cfeec79e4fccae92845857f435062595e130c1fda49d6a0de57af1d9a9c37e3138e3adf840891da20b6b86ff68c02725b4e3c2b6575413b995d4064f955d537b01923735657d6f759e592310a28a18dc77e1f29f1b18219a28ddde91ecb8bdd4f664d066db9297e2c4b06ff2f7f62c09e2a2310effd02a0d2176406f9457b85d394a8"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) flistxattr(r1, 0x0, 0x0) 06:11:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x88, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0xc, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}]}]}, 0x88}}, 0x0) 06:11:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000240)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a337cca555fedbe9d8f3b423cdacfa7e32fe021136f4bc38458b2264f9e6effd75c504c9f1f65515b0e1a38d8665522be18bd10a48b043ccc426de0746d25ddd73d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860d01a485dee399b994e12a5c7e8efbc6f2b2a3e3173d5661cfeec79e4fccae92845857f435062595e130c1fda49d6a0de57af1d9a9c37e3138e3adf840891da20b6b86ff68c02725b4e3c2b6575413b995d4064f955d537b01923735657d6f759e592310a28a18dc77e1f29f1b18219a28ddde91ecb8bdd4f664d066db9297e2c4b06ff2f7f62c09e2a2310effd02a0d2176406f9457b85d394a8"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) flistxattr(r1, 0x0, 0x0) 06:11:25 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) writev(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)="8ab6ce", 0x3}, {&(0x7f0000001580)="215ac1ebcc861afcf2d0cead5c8ea915f092c132718aaa9f84d9d01b065456f6c621cf8fc375907c3d9b459461e3aa2b1bde0ccb88eef652851b48b49e242c6ae17b677d5b06ac39b7a88e86aef70567f9d651eac142a0a643a7dd21792aef282fa3e741321b357d99f2748b6183e72556c70a49b3ccc6aa21a516593ba23a0ba585904647cb6402197ad27b87cdc785161994c0507aea55ae081da6aa96f603dc230347e1d67d03353ef1eeb18a061a0d93045fad4aed17f5f3d36a1bb67ecd2cec0b528cca96bcf8a83bda4827a0c0f873cd02e53a5b554e277fe7aa3526fbf5f810322f4b84b452e65fa82b821b371b2adf23494a9588eb0c0ca75c188d8885f758d8f1257248cfdec3befe20f5ab56af1ca00de7972713b00a0b9bec03f235bf05bc56fd875f92e721deffb98dc4d9bf0095930ff6b1983c629843c7a1914348c34d824d2122852dce40bf9353f922ee2d8ae8fdf5bc574cb971e713a329b601d89e53949f6bd174ccddc33b5cfd8352cafd9cdac8c2b20abba440911f751ebffebab2e66a13d2b71e41eba640cd9dbd7ecd069c12bb1c32865df1f976727954c84d12053d033e6c8e6ec409144c7d9f860843437970516aac39f3f1cfdf2e9e04b150faba163aa9eb6d7a2f28bf1ad13cdb4705d0c7325b7c2232083e3cb5cebd71e338eda03a1c407affd06fd2e903b5bfecc83a99f33276f5f21d389f5fdd8e4c0741d6d39eff704725eaee7cb06ef046fd4c8d0e6f3a24583338999446e0501a7ef61d1bed904d82ade16a27627ce35d6214865b8fa0c0d2772079fa492c19c3032de169e9facf4a751d58cf60cabc34e81936b7250fe39d1e17db7453e4d9fa1103f9e88d26f91500902993bb77334929fe342344a290d2321a31221f53e28e732d57055df89f1c88eabd3b532b8b86a8a939ef2f1b6cbc6618112248043bd9d3b2d6c964abb93455f7607049cb3e8a90b3ac80aa1b8e0799b43143f064e0b92478c11263c6f50ebcdb1626a739e7b77e16a4dcbb5002260fb53acd45aa", 0x2e2}], 0x2) 06:11:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f3814584707f9f4ffffff004000010000001ff80000", 0x1c) 06:11:25 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000000100)={'wlan0\x00'}) 06:11:25 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) writev(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)="8ab6ce", 0x3}, {&(0x7f0000001580)="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", 0x2e2}], 0x2) 06:11:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 52.955884][T10087] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 52.988329][T10092] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:11:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f3814584707f9f4ffffff004000010000001ff80000", 0x1c) 06:11:25 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000000100)={'wlan0\x00'}) 06:11:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x88, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0xc, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}]}]}, 0x88}}, 0x0) 06:11:25 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000fef000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000300)={0x7b, 0x0, [0x4b564d01, 0x1]}) 06:11:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f3814584707f9f4ffffff004000010000001ff80000", 0x1c) 06:11:25 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000000100)={'wlan0\x00'}) 06:11:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x88, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0xc, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}]}]}, 0x88}}, 0x0) [ 53.155261][T10108] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 53.187560][T10114] ptrace attach of "/root/syz-executor.0"[10109] was attempted by "/root/syz-executor.0"[10114] [ 53.195987][T10115] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 06:11:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f3814584707f9f4ffffff004000010000001ff80000", 0x1c) 06:11:25 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) [ 53.240796][ T36] audit: type=1804 audit(1615356685.474:2): pid=10118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir123823679/syzkaller.T279KF/11/file0" dev="sda1" ino=14233 res=1 errno=0 [ 53.263522][T10129] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:11:25 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000000100)={'wlan0\x00'}) 06:11:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x88, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_ID={0x8}, @CTA_NAT_SRC={0xc, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}]}]}, 0x88}}, 0x0) 06:11:25 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:25 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) [ 53.368488][T10145] ptrace attach of "/root/syz-executor.0"[10143] was attempted by "/root/syz-executor.0"[10145] 06:11:25 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:25 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) [ 53.471087][T10160] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 53.481612][T10161] ptrace attach of "/root/syz-executor.0"[10158] was attempted by "/root/syz-executor.0"[10161] 06:11:25 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:25 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b037e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f856f0bf8893cc7149595314f0771b65d33e129933dd93f99f03cd6b3e5903e1ddb592a67f706eb14c1d3d1a204fe2e9c50d7920f69e068d2c7faba4084e7a3b0c6c699890e19745ba9a37cfdd7ff58b659bbf65c6a2b2e441a0e0c44a3d9abeb7d90f000000000e077d0d67096da85a6d22c36fac7505a35892211b5194d55e0ad396b242ac56b00fbd89c9ff98e0fb6f9ab48e8f83bfcc455d81d7aff06587ca3d455f61f4258a09db4a85d2ac5771ae217e11ebd59af344928e136cf95a1898f97d5031c5770041f2bfb8cfa7b2674b908612cea6c93afd32c8e740e3bbf6c71be92d61dd77efa9945063d8e13b72d83137032d2c184c98eb8ac272886dc1c4bee4d4314f759d2a7843b6d5573fe9d3f35fad83fc47d3df64978b2a6ac0b5681666c8ac133e1c137e034e3751229a1f4a7a59380e494523ffe363944e28d1e4fbbd66cce142ec3c20a8d040e77dc15d468403fac7cb5777e8ac228f59880809322ccb614225851e22963a9a5bd5f2f1000000000000000000001d0e44022ce12a205da6bb548872b8f285c4f24b3300dc59ec282d5d87b19bee05c4fe4b32a9e37e195bc4aa10e7334be854825729b794904af84b691d75a308a526f2cc923be14e103e8cb2b68c72f94f"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) [ 53.621388][T10170] ptrace attach of "/root/syz-executor.1"[10169] was attempted by "/root/syz-executor.1"[10170] 06:11:25 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b037e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f856f0bf8893cc7149595314f0771b65d33e129933dd93f99f03cd6b3e5903e1ddb592a67f706eb14c1d3d1a204fe2e9c50d7920f69e068d2c7faba4084e7a3b0c6c699890e19745ba9a37cfdd7ff58b659bbf65c6a2b2e441a0e0c44a3d9abeb7d90f000000000e077d0d67096da85a6d22c36fac7505a35892211b5194d55e0ad396b242ac56b00fbd89c9ff98e0fb6f9ab48e8f83bfcc455d81d7aff06587ca3d455f61f4258a09db4a85d2ac5771ae217e11ebd59af344928e136cf95a1898f97d5031c5770041f2bfb8cfa7b2674b908612cea6c93afd32c8e740e3bbf6c71be92d61dd77efa9945063d8e13b72d83137032d2c184c98eb8ac272886dc1c4bee4d4314f759d2a7843b6d5573fe9d3f35fad83fc47d3df64978b2a6ac0b5681666c8ac133e1c137e034e3751229a1f4a7a59380e494523ffe363944e28d1e4fbbd66cce142ec3c20a8d040e77dc15d468403fac7cb5777e8ac228f59880809322ccb614225851e22963a9a5bd5f2f1000000000000000000001d0e44022ce12a205da6bb548872b8f285c4f24b3300dc59ec282d5d87b19bee05c4fe4b32a9e37e195bc4aa10e7334be854825729b794904af84b691d75a308a526f2cc923be14e103e8cb2b68c72f94f"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:26 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:26 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) [ 53.684696][T10181] ptrace attach of "/root/syz-executor.4"[10177] was attempted by "/root/syz-executor.4"[10181] [ 53.697855][T10182] ptrace attach of "/root/syz-executor.0"[10178] was attempted by "/root/syz-executor.0"[10182] [ 53.701538][T10183] ptrace attach of "/root/syz-executor.3"[10179] was attempted by "/root/syz-executor.3"[10183] [ 53.718590][T10184] ptrace attach of "/root/syz-executor.5"[10176] was attempted by "/root/syz-executor.5"[10184] 06:11:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 53.793412][T10188] ptrace attach of "/root/syz-executor.1"[10186] was attempted by "/root/syz-executor.1"[10188] 06:11:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 53.849128][T10196] ptrace attach of "/root/syz-executor.3"[10193] was attempted by "/root/syz-executor.3"[10196] 06:11:26 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:26 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:26 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = gettid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x191) keyctl$set_timeout(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_type(r2, 0x0, 0x2, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0x800000000000937e, 0x0) 06:11:26 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:26 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, 0xe) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f00000000c0)) 06:11:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 06:11:26 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, 0xe) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f00000000c0)) 06:11:26 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x400) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') fchmod(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_congestion(0xffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 54.279329][ T8396] ================================================================== [ 54.287497][ T8396] BUG: KCSAN: data-race in ext4_mark_iloc_dirty / ext4_orphan_del [ 54.295287][ T8396] [ 54.297597][ T8396] write to 0xffff88810e7b84dc of 4 bytes by task 8401 on cpu 1: [ 54.305856][ T8396] ext4_orphan_del+0x2fc/0x4a0 [ 54.310891][ T8396] ext4_evict_inode+0xb90/0xef0 [ 54.315765][ T8396] evict+0x1aa/0x410 [ 54.319646][ T8396] iput+0x3fd/0x520 [ 54.323431][ T8396] dentry_unlink_inode+0x210/0x220 [ 54.328519][ T8396] d_delete+0x78/0xa0 [ 54.332506][ T8396] vfs_rmdir+0x28a/0x2a0 [ 54.336756][ T8396] do_rmdir+0x186/0x310 [ 54.340994][ T8396] __x64_sys_rmdir+0x2c/0x30 [ 54.345564][ T8396] do_syscall_64+0x39/0x80 [ 54.349966][ T8396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 54.355840][ T8396] [ 54.358215][ T8396] read to 0xffff88810e7b84dc of 4 bytes by task 8396 on cpu 0: [ 54.365876][ T8396] ext4_mark_iloc_dirty+0x37e/0x16f0 [ 54.371301][ T8396] __ext4_mark_inode_dirty+0x4db/0x5e0 [ 54.376985][ T8396] ext4_ext_truncate+0x54/0x170 [ 54.381821][ T8396] ext4_truncate+0x844/0xbd0 [ 54.386396][ T8396] ext4_evict_inode+0xac6/0xef0 [ 54.391252][ T8396] evict+0x1aa/0x410 [ 54.395130][ T8396] iput+0x3fd/0x520 [ 54.398933][ T8396] dentry_unlink_inode+0x210/0x220 [ 54.404021][ T8396] d_delete+0x78/0xa0 [ 54.408066][ T8396] vfs_rmdir+0x28a/0x2a0 [ 54.412668][ T8396] do_rmdir+0x186/0x310 [ 54.416975][ T8396] __x64_sys_rmdir+0x2c/0x30 [ 54.421563][ T8396] do_syscall_64+0x39/0x80 [ 54.426080][ T8396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 54.432055][ T8396] [ 54.434365][ T8396] Reported by Kernel Concurrency Sanitizer on: [ 54.440490][ T8396] CPU: 0 PID: 8396 Comm: syz-executor.2 Not tainted 5.12.0-rc2-syzkaller #0 [ 54.453485][ T8396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.463694][ T8396] ================================================================== [ 54.471733][ T8396] Kernel panic - not syncing: panic_on_warn set ... [ 54.478657][ T8396] CPU: 0 PID: 8396 Comm: syz-executor.2 Not tainted 5.12.0-rc2-syzkaller #0 [ 54.487656][ T8396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.498647][ T8396] Call Trace: [ 54.501909][ T8396] dump_stack+0x137/0x19d [ 54.506225][ T8396] panic+0x1e7/0x5fa [ 54.510123][ T8396] ? vprintk_emit+0x2fa/0x3e0 [ 54.514960][ T8396] kcsan_report+0x67b/0x680 [ 54.519619][ T8396] ? put_dec+0xcd/0xe0 [ 54.523685][ T8396] ? kcsan_setup_watchpoint+0x40b/0x470 [ 54.529220][ T8396] ? ext4_mark_iloc_dirty+0x37e/0x16f0 [ 54.534807][ T8396] ? __ext4_mark_inode_dirty+0x4db/0x5e0 [ 54.540457][ T8396] ? ext4_ext_truncate+0x54/0x170 [ 54.545476][ T8396] ? ext4_truncate+0x844/0xbd0 [ 54.550225][ T8396] ? ext4_evict_inode+0xac6/0xef0 [ 54.555230][ T8396] ? evict+0x1aa/0x410 [ 54.559284][ T8396] ? iput+0x3fd/0x520 [ 54.563241][ T8396] ? dentry_unlink_inode+0x210/0x220 [ 54.568500][ T8396] ? d_delete+0x78/0xa0 [ 54.572629][ T8396] ? vfs_rmdir+0x28a/0x2a0 [ 54.577021][ T8396] ? do_rmdir+0x186/0x310 [ 54.581328][ T8396] ? __x64_sys_rmdir+0x2c/0x30 [ 54.586085][ T8396] ? do_syscall_64+0x39/0x80 [ 54.590655][ T8396] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 54.596710][ T8396] ? __getblk_gfp+0x3a/0x1f0 [ 54.601277][ T8396] ? jbd2_journal_get_write_access+0x1b5/0x1c0 [ 54.607420][ T8396] kcsan_setup_watchpoint+0x40b/0x470 [ 54.612771][ T8396] ext4_mark_iloc_dirty+0x37e/0x16f0 [ 54.618051][ T8396] ? ext4_reserve_inode_write+0x17a/0x1f0 [ 54.623834][ T8396] __ext4_mark_inode_dirty+0x4db/0x5e0 [ 54.629277][ T8396] ? __down_write_common+0x45/0x870 [ 54.634467][ T8396] ? ext4_mark_iloc_dirty+0x1606/0x16f0 [ 54.640080][ T8396] ? ext4_discard_preallocations+0x3a0/0xd70 [ 54.646048][ T8396] ? is_bad_inode+0x12/0x30 [ 54.650651][ T8396] ? ext4_orphan_add+0xfa/0x5f0 [ 54.655577][ T8396] ext4_ext_truncate+0x54/0x170 [ 54.660409][ T8396] ext4_truncate+0x844/0xbd0 [ 54.664989][ T8396] ext4_evict_inode+0xac6/0xef0 [ 54.669835][ T8396] ? ext4_inode_is_fast_symlink+0x200/0x200 [ 54.675709][ T8396] evict+0x1aa/0x410 [ 54.679878][ T8396] iput+0x3fd/0x520 [ 54.683681][ T8396] dentry_unlink_inode+0x210/0x220 [ 54.688806][ T8396] d_delete+0x78/0xa0 [ 54.692768][ T8396] vfs_rmdir+0x28a/0x2a0 [ 54.696989][ T8396] do_rmdir+0x186/0x310 [ 54.701124][ T8396] __x64_sys_rmdir+0x2c/0x30 [ 54.705699][ T8396] do_syscall_64+0x39/0x80 [ 54.710105][ T8396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 54.715977][ T8396] RIP: 0033:0x4658d7 [ 54.719846][ T8396] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 54 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 54.739434][ T8396] RSP: 002b:00007ffd2a5fc6f8 EFLAGS: 00000207 ORIG_RAX: 0000000000000054 [ 54.747832][ T8396] RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 00000000004658d7 [ 54.755802][ T8396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffd2a5fd890 [ 54.763753][ T8396] RBP: 00007ffd2a5fc7c0 R08: 0000000000000000 R09: 00007ffd2a5fc590 [ 54.771712][ T8396] R10: 000000000262f8c3 R11: 0000000000000207 R12: 00000000004beb32 [ 54.779659][ T8396] R13: 00007ffd2a5fd890 R14: 000000000262f810 R15: 00007ffd2a5fd8d0 [ 54.788270][ T8396] Kernel Offset: disabled [ 54.792608][ T8396] Rebooting in 86400 seconds..