Warning: Permanently added '10.128.1.188' (ED25519) to the list of known hosts. 2023/08/29 07:13:56 fuzzer started 2023/08/29 07:13:56 dialing manager at 10.128.0.169:30002 [ 44.477247][ T5022] cgroup: Unknown subsys name 'net' [ 44.578893][ T5022] cgroup: Unknown subsys name 'rlimit' 2023/08/29 07:13:59 syscalls: 3711 2023/08/29 07:13:59 code coverage: enabled 2023/08/29 07:13:59 comparison tracing: enabled 2023/08/29 07:13:59 extra coverage: enabled 2023/08/29 07:13:59 delay kcov mmap: enabled 2023/08/29 07:13:59 setuid sandbox: enabled 2023/08/29 07:13:59 namespace sandbox: enabled 2023/08/29 07:13:59 Android sandbox: /sys/fs/selinux/policy does not exist 2023/08/29 07:13:59 fault injection: enabled 2023/08/29 07:13:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/08/29 07:13:59 net packet injection: enabled 2023/08/29 07:13:59 net device setup: enabled 2023/08/29 07:13:59 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2023/08/29 07:13:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/08/29 07:13:59 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/08/29 07:13:59 USB emulation: enabled 2023/08/29 07:13:59 hci packet injection: enabled 2023/08/29 07:13:59 wifi device emulation: enabled 2023/08/29 07:13:59 802.15.4 emulation: enabled 2023/08/29 07:13:59 swap file: enabled 2023/08/29 07:13:59 fetching corpus: 0, signal 0/2000 (executing program) [ 45.316322][ T5022] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS 2023/08/29 07:13:59 fetching corpus: 47, signal 45475/48894 (executing program) 2023/08/29 07:13:59 fetching corpus: 97, signal 69431/74089 (executing program) 2023/08/29 07:13:59 fetching corpus: 146, signal 86408/92164 (executing program) 2023/08/29 07:14:00 fetching corpus: 196, signal 111745/117986 (executing program) 2023/08/29 07:14:00 fetching corpus: 244, signal 120741/127858 (executing program) 2023/08/29 07:14:00 fetching corpus: 294, signal 129939/137806 (executing program) 2023/08/29 07:14:00 fetching corpus: 344, signal 138494/147064 (executing program) 2023/08/29 07:14:01 fetching corpus: 394, signal 144796/154071 (executing program) 2023/08/29 07:14:01 fetching corpus: 444, signal 152071/161869 (executing program) 2023/08/29 07:14:01 fetching corpus: 494, signal 161624/171668 (executing program) 2023/08/29 07:14:01 fetching corpus: 541, signal 166760/177293 (executing program) 2023/08/29 07:14:01 fetching corpus: 591, signal 172887/183755 (executing program) 2023/08/29 07:14:02 fetching corpus: 641, signal 179449/190539 (executing program) 2023/08/29 07:14:02 fetching corpus: 691, signal 182250/193814 (executing program) 2023/08/29 07:14:02 fetching corpus: 741, signal 186658/198496 (executing program) 2023/08/29 07:14:02 fetching corpus: 791, signal 190542/202672 (executing program) 2023/08/29 07:14:02 fetching corpus: 840, signal 195449/207674 (executing program) 2023/08/29 07:14:03 fetching corpus: 890, signal 199073/211473 (executing program) 2023/08/29 07:14:03 fetching corpus: 939, signal 202718/215306 (executing program) 2023/08/29 07:14:03 fetching corpus: 988, signal 206373/219082 (executing program) 2023/08/29 07:14:03 fetching corpus: 1038, signal 214085/226262 (executing program) 2023/08/29 07:14:03 fetching corpus: 1088, signal 216247/228704 (executing program) 2023/08/29 07:14:04 fetching corpus: 1138, signal 219727/232197 (executing program) 2023/08/29 07:14:04 fetching corpus: 1188, signal 224255/236477 (executing program) 2023/08/29 07:14:04 fetching corpus: 1237, signal 227902/239964 (executing program) 2023/08/29 07:14:04 fetching corpus: 1287, signal 231033/242938 (executing program) 2023/08/29 07:14:05 fetching corpus: 1337, signal 235330/246893 (executing program) 2023/08/29 07:14:05 fetching corpus: 1387, signal 237489/249020 (executing program) 2023/08/29 07:14:05 fetching corpus: 1436, signal 240955/252189 (executing program) 2023/08/29 07:14:05 fetching corpus: 1486, signal 244060/255017 (executing program) 2023/08/29 07:14:06 fetching corpus: 1536, signal 247186/257834 (executing program) 2023/08/29 07:14:06 fetching corpus: 1585, signal 249844/260225 (executing program) 2023/08/29 07:14:06 fetching corpus: 1634, signal 252533/262648 (executing program) 2023/08/29 07:14:06 fetching corpus: 1684, signal 256793/266210 (executing program) 2023/08/29 07:14:07 fetching corpus: 1732, signal 260831/269562 (executing program) 2023/08/29 07:14:07 fetching corpus: 1780, signal 264560/272556 (executing program) 2023/08/29 07:14:07 fetching corpus: 1829, signal 266710/274365 (executing program) 2023/08/29 07:14:07 fetching corpus: 1877, signal 268935/276242 (executing program) 2023/08/29 07:14:08 fetching corpus: 1927, signal 270791/277804 (executing program) 2023/08/29 07:14:08 fetching corpus: 1977, signal 272737/279388 (executing program) 2023/08/29 07:14:08 fetching corpus: 2026, signal 274509/280814 (executing program) 2023/08/29 07:14:08 fetching corpus: 2075, signal 276260/282208 (executing program) 2023/08/29 07:14:09 fetching corpus: 2125, signal 278073/283653 (executing program) 2023/08/29 07:14:09 fetching corpus: 2175, signal 280230/285297 (executing program) 2023/08/29 07:14:09 fetching corpus: 2225, signal 281713/286446 (executing program) 2023/08/29 07:14:09 fetching corpus: 2275, signal 283827/287990 (executing program) 2023/08/29 07:14:10 fetching corpus: 2324, signal 285417/289184 (executing program) 2023/08/29 07:14:10 fetching corpus: 2373, signal 286951/290272 (executing program) 2023/08/29 07:14:10 fetching corpus: 2422, signal 288495/291382 (executing program) 2023/08/29 07:14:10 fetching corpus: 2471, signal 290208/292588 (executing program) 2023/08/29 07:14:10 fetching corpus: 2480, signal 290469/292792 (executing program) 2023/08/29 07:14:10 fetching corpus: 2480, signal 290469/292847 (executing program) 2023/08/29 07:14:10 fetching corpus: 2480, signal 290469/292892 (executing program) 2023/08/29 07:14:10 fetching corpus: 2480, signal 290469/292939 (executing program) 2023/08/29 07:14:10 fetching corpus: 2480, signal 290469/292977 (executing program) 2023/08/29 07:14:10 fetching corpus: 2480, signal 290469/293032 (executing program) 2023/08/29 07:14:10 fetching corpus: 2480, signal 290469/293090 (executing program) 2023/08/29 07:14:10 fetching corpus: 2480, signal 290469/293137 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293252 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293300 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293345 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293404 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293442 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293481 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293532 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293578 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293625 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293673 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293713 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293743 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293784 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293836 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293883 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293932 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/293978 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/294021 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/294074 (executing program) 2023/08/29 07:14:10 fetching corpus: 2481, signal 290544/294111 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294155 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294206 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294248 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294296 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294330 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294369 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294407 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294449 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294500 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294537 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294590 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294648 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294693 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294750 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294802 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294853 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294905 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294941 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/294990 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295051 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295107 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295159 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295196 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295246 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295299 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295351 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295397 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295450 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295491 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295532 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295568 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295611 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295657 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295715 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295768 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295810 (executing program) 2023/08/29 07:14:10 fetching corpus: 2482, signal 290547/295849 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/295898 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/295950 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/295990 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296047 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296088 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296137 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296176 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296220 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296266 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296311 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296358 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296406 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296457 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296506 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296552 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296595 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296637 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296672 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296724 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296778 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296828 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296863 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296915 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296953 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/296993 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/297041 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/297084 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/297136 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/297178 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/297227 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/297279 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/297338 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/297373 (executing program) 2023/08/29 07:14:11 fetching corpus: 2482, signal 290547/297373 (executing program) 2023/08/29 07:14:13 starting 6 fuzzer processes 07:14:13 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:13 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000002880)=ANY=[]) 07:14:13 executing program 3: r0 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'netdevsim0\x00', &(0x7f0000000100)=@ethtool_drvinfo={0xf, "d4ce5c37e4c0bc8b704b1eff83d75eb19fbfa676488de83a5e993e8711058ea7", "e3f76263880019d1dd7aaad44011b5c16a438f06e8d2cbf2030e7e349fa2e65b", "aa1722b6820c188d8b20e9422922f7a947ccbf7f00f8ed1568e7d3cd8dfebb6b", "ba51e040e6bc8c228c2eb8ade35413e04c374e73fb16e1911122f7b6f6e0aea2", "2f981a151e9aa44a5cba9cccc91a44833f9cd6650e78ef516d15ac604da680e0", "19d7744124a0872bfe7df210"}}) 07:14:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="84", 0x1) r2 = dup(r1) r3 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000180)="b517d010", 0x4) 07:14:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e00)={0xc, 0x4, &(0x7f0000001700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x21}]}, &(0x7f0000001740)='GPL\x00', 0x3, 0xe0, &(0x7f0000001780)=""/224, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:14:13 executing program 5: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) [ 59.202891][ T5017] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=5017 'syz-fuzzer' [ 59.535763][ T49] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 59.543469][ T49] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 59.566409][ T5045] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 59.574301][ T5045] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 59.588269][ T5047] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 59.598128][ T5047] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 59.605654][ T5047] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 59.606786][ T5048] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 59.613501][ T5047] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 59.619981][ T5048] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 59.627274][ T5047] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 59.634314][ T5048] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 59.641551][ T5047] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 59.653073][ T5051] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 59.657259][ T5047] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 59.662490][ T5048] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 59.668553][ T5047] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 59.676687][ T5051] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 59.682733][ T5047] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 59.690471][ T5051] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 59.710369][ T5047] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 59.723822][ T5047] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 59.735074][ T5051] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 59.742947][ T5051] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 59.752046][ T5045] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 59.760387][ T5051] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 59.770437][ T5051] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 59.778358][ T5051] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 59.785818][ T5051] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 59.793834][ T5051] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 59.801516][ T5051] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 59.808855][ T5045] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 59.817624][ T5051] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 59.825021][ T5045] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 59.837026][ T5051] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 59.847815][ T5051] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 59.936606][ T5037] chnl_net:caif_netlink_parms(): no params data found [ 59.972596][ T5049] chnl_net:caif_netlink_parms(): no params data found [ 60.009706][ T5037] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.016957][ T5037] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.024058][ T5037] bridge_slave_0: entered allmulticast mode [ 60.030559][ T5037] bridge_slave_0: entered promiscuous mode [ 60.040079][ T5037] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.047322][ T5037] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.054409][ T5037] bridge_slave_1: entered allmulticast mode [ 60.060930][ T5037] bridge_slave_1: entered promiscuous mode [ 60.119388][ T5049] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.126628][ T5049] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.133672][ T5049] bridge_slave_0: entered allmulticast mode [ 60.140174][ T5049] bridge_slave_0: entered promiscuous mode [ 60.147840][ T5037] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.162611][ T5049] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.169935][ T5049] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.177066][ T5049] bridge_slave_1: entered allmulticast mode [ 60.183305][ T5049] bridge_slave_1: entered promiscuous mode [ 60.190743][ T5037] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.233554][ T5037] team0: Port device team_slave_0 added [ 60.241593][ T5037] team0: Port device team_slave_1 added [ 60.261594][ T5049] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.299011][ T5049] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.339319][ T5037] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.346351][ T5037] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.372576][ T5037] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.385038][ T5037] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.392100][ T5037] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.418294][ T5037] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.433274][ T5039] chnl_net:caif_netlink_parms(): no params data found [ 60.464627][ T5049] team0: Port device team_slave_0 added [ 60.476969][ T5052] chnl_net:caif_netlink_parms(): no params data found [ 60.491469][ T5049] team0: Port device team_slave_1 added [ 60.549040][ T5053] chnl_net:caif_netlink_parms(): no params data found [ 60.562629][ T5039] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.569859][ T5039] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.577000][ T5039] bridge_slave_0: entered allmulticast mode [ 60.583269][ T5039] bridge_slave_0: entered promiscuous mode [ 60.590958][ T5049] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.597945][ T5049] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.623916][ T5049] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.637036][ T5037] hsr_slave_0: entered promiscuous mode [ 60.642945][ T5037] hsr_slave_1: entered promiscuous mode [ 60.653228][ T5042] chnl_net:caif_netlink_parms(): no params data found [ 60.665095][ T5039] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.672246][ T5039] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.679504][ T5039] bridge_slave_1: entered allmulticast mode [ 60.686137][ T5039] bridge_slave_1: entered promiscuous mode [ 60.692539][ T5049] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.699606][ T5049] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.725534][ T5049] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.751268][ T5052] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.758392][ T5052] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.765768][ T5052] bridge_slave_0: entered allmulticast mode [ 60.772036][ T5052] bridge_slave_0: entered promiscuous mode [ 60.781398][ T5052] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.788506][ T5052] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.796161][ T5052] bridge_slave_1: entered allmulticast mode [ 60.802649][ T5052] bridge_slave_1: entered promiscuous mode [ 60.820527][ T5039] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.849361][ T5039] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.871258][ T5052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.911839][ T5052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.927193][ T5049] hsr_slave_0: entered promiscuous mode [ 60.933178][ T5049] hsr_slave_1: entered promiscuous mode [ 60.939446][ T5049] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 60.947245][ T5049] Cannot create hsr debugfs directory [ 60.981528][ T5039] team0: Port device team_slave_0 added [ 60.991580][ T5042] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.998965][ T5042] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.006164][ T5042] bridge_slave_0: entered allmulticast mode [ 61.012421][ T5042] bridge_slave_0: entered promiscuous mode [ 61.022978][ T5052] team0: Port device team_slave_0 added [ 61.034961][ T5039] team0: Port device team_slave_1 added [ 61.054130][ T5042] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.061327][ T5042] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.068459][ T5042] bridge_slave_1: entered allmulticast mode [ 61.074684][ T5042] bridge_slave_1: entered promiscuous mode [ 61.081990][ T5052] team0: Port device team_slave_1 added [ 61.100127][ T5052] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 61.107282][ T5052] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.133292][ T5052] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 61.149588][ T5053] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.156695][ T5053] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.163747][ T5053] bridge_slave_0: entered allmulticast mode [ 61.170844][ T5053] bridge_slave_0: entered promiscuous mode [ 61.178558][ T5053] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.185835][ T5053] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.192893][ T5053] bridge_slave_1: entered allmulticast mode [ 61.199345][ T5053] bridge_slave_1: entered promiscuous mode [ 61.221594][ T5042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.236410][ T5052] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 61.243337][ T5052] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.269478][ T5052] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 61.284963][ T5039] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 61.292406][ T5039] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.318511][ T5039] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 61.335236][ T5053] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.345507][ T5042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.356698][ T5053] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.382502][ T5039] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 61.389689][ T5039] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.415843][ T5039] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 61.464237][ T5042] team0: Port device team_slave_0 added [ 61.477882][ T5053] team0: Port device team_slave_0 added [ 61.485014][ T5053] team0: Port device team_slave_1 added [ 61.504058][ T5052] hsr_slave_0: entered promiscuous mode [ 61.510534][ T5052] hsr_slave_1: entered promiscuous mode [ 61.516926][ T5052] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 61.524473][ T5052] Cannot create hsr debugfs directory [ 61.541004][ T5042] team0: Port device team_slave_1 added [ 61.599631][ T5037] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 61.613261][ T5039] hsr_slave_0: entered promiscuous mode [ 61.619426][ T5039] hsr_slave_1: entered promiscuous mode [ 61.625321][ T5039] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 61.632868][ T5039] Cannot create hsr debugfs directory [ 61.638658][ T5053] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 61.645652][ T5053] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.671584][ T5053] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 61.683686][ T5053] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 61.690684][ T5053] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.716931][ T5053] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 61.728973][ T5042] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 61.736131][ T5042] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.756195][ T5051] Bluetooth: hci1: command 0x0409 tx timeout [ 61.762106][ T5040] Bluetooth: hci0: command 0x0409 tx timeout [ 61.771821][ T5051] Bluetooth: hci2: command 0x0409 tx timeout [ 61.774927][ T5042] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 61.792379][ T5042] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 61.799524][ T5042] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.825662][ T5042] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 61.836376][ T5040] Bluetooth: hci3: command 0x0409 tx timeout [ 61.852216][ T5037] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 61.861225][ T5037] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 61.899030][ T5042] hsr_slave_0: entered promiscuous mode [ 61.905070][ T5042] hsr_slave_1: entered promiscuous mode [ 61.911542][ T5042] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 61.919610][ T5051] Bluetooth: hci5: command 0x0409 tx timeout [ 61.919712][ T5051] Bluetooth: hci4: command 0x0409 tx timeout [ 61.926016][ T5042] Cannot create hsr debugfs directory [ 61.952866][ T5037] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 62.014978][ T5053] hsr_slave_0: entered promiscuous mode [ 62.021067][ T5053] hsr_slave_1: entered promiscuous mode [ 62.027068][ T5053] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 62.034606][ T5053] Cannot create hsr debugfs directory [ 62.079092][ T5049] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 62.092896][ T5049] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 62.102511][ T5049] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 62.113022][ T5049] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 62.210547][ T5052] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 62.220243][ T5052] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 62.240914][ T5052] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 62.268289][ T5052] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 62.313088][ T5042] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 62.321172][ T5042] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 62.334218][ T5042] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 62.343910][ T5042] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 62.375696][ T5039] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 62.386049][ T5039] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 62.407733][ T5039] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 62.420604][ T5037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.434108][ T5039] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 62.448835][ T5053] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 62.457360][ T5053] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 62.466566][ T5053] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 62.474939][ T5053] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 62.521018][ T5049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.540963][ T5037] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.579807][ T5037] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 62.590659][ T5037] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.610232][ T5101] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.617461][ T5101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.628055][ T5101] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.635155][ T5101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.660404][ T5049] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.685526][ T5052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.705099][ T5101] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.712180][ T5101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.741370][ T5042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.756357][ T5098] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.763412][ T5098] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.789569][ T5052] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.815864][ T5100] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.822889][ T5100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.832436][ T5100] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.839543][ T5100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.868469][ T5042] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.880643][ T5037] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.898728][ T5099] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.905809][ T5099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.937234][ T5053] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.950228][ T5039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.975495][ T5100] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.982539][ T5100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.037492][ T5039] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.047730][ T5037] veth0_vlan: entered promiscuous mode [ 63.081614][ T5053] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.100106][ T4440] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.107206][ T4440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.121039][ T4440] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.128142][ T4440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.141055][ T5037] veth1_vlan: entered promiscuous mode [ 63.173732][ T5101] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.180830][ T5101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.197560][ T5101] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.204625][ T5101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.244386][ T5049] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.255536][ T5052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.280229][ T5039] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 63.293657][ T5039] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 63.317616][ T5037] veth0_macvtap: entered promiscuous mode [ 63.333417][ T5053] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 63.362087][ T5053] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 63.388650][ T5037] veth1_macvtap: entered promiscuous mode [ 63.433443][ T5037] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 63.457722][ T5052] veth0_vlan: entered promiscuous mode [ 63.476853][ T5037] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 63.498785][ T5052] veth1_vlan: entered promiscuous mode [ 63.532542][ T5037] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.555321][ T5037] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.564008][ T5037] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.573264][ T5037] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.604809][ T5042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.650545][ T5039] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.674424][ T5052] veth0_macvtap: entered promiscuous mode [ 63.694542][ T5052] veth1_macvtap: entered promiscuous mode [ 63.712229][ T5052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 63.723209][ T5052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.734664][ T5052] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 63.774767][ T5052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 63.787023][ T5052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.797479][ T5052] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 63.818695][ T5053] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.830153][ T5052] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.839505][ T5040] Bluetooth: hci2: command 0x041b tx timeout [ 63.839522][ T5051] Bluetooth: hci0: command 0x041b tx timeout [ 63.845666][ T5045] Bluetooth: hci1: command 0x041b tx timeout [ 63.860557][ T5052] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.869387][ T5052] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.879659][ T5052] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.894212][ T5042] veth0_vlan: entered promiscuous mode [ 63.916566][ T5045] Bluetooth: hci3: command 0x041b tx timeout [ 63.930992][ T5039] veth0_vlan: entered promiscuous mode [ 63.961014][ T5042] veth1_vlan: entered promiscuous mode [ 63.975861][ T5099] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 63.983829][ T5099] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 63.989494][ T5039] veth1_vlan: entered promiscuous mode [ 63.996643][ T5045] Bluetooth: hci4: command 0x041b tx timeout [ 64.005789][ T5045] Bluetooth: hci5: command 0x041b tx timeout [ 64.013287][ T5049] veth0_vlan: entered promiscuous mode [ 64.039854][ T4440] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.055081][ T5049] veth1_vlan: entered promiscuous mode [ 64.070485][ T5042] veth0_macvtap: entered promiscuous mode [ 64.080018][ T4440] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.094073][ T5042] veth1_macvtap: entered promiscuous mode [ 64.118405][ T5042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 64.129696][ T5042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.140640][ T5042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 64.151123][ T5042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.163011][ T5042] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 64.178484][ T5039] veth0_macvtap: entered promiscuous mode [ 64.214786][ T5101] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.234404][ T5053] veth0_vlan: entered promiscuous mode [ 64.240724][ T5101] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.252266][ T5039] veth1_macvtap: entered promiscuous mode [ 64.269063][ T5049] veth0_macvtap: entered promiscuous mode 07:14:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000f40)=0xe) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x3) [ 64.292206][ T5042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 64.306147][ T5042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.318954][ T5042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 64.329440][ T5042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:14:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000f40)=0xe) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x3) [ 64.343883][ T5042] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 64.359010][ T5102] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.362709][ T5053] veth1_vlan: entered promiscuous mode [ 64.372427][ T5102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.381366][ T5039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 07:14:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000f40)=0xe) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x3) [ 64.399620][ T5039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.409891][ T5039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 64.420761][ T5039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.431959][ T5039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 07:14:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000f40)=0xe) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x3) [ 64.442589][ T5039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.457929][ T5039] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 64.487954][ T5049] veth1_macvtap: entered promiscuous mode 07:14:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000f40)=0xe) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x3) [ 64.524795][ T5039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 64.536464][ T5039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.548603][ T5039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 64.559381][ T5039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:14:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000f40)=0xe) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x3) [ 64.572930][ T5039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 64.585064][ T5039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.596347][ T5039] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 64.607129][ T5042] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.616399][ T5042] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.625175][ T5042] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.633872][ T5042] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.656426][ T5039] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.665464][ T5039] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.674187][ T5039] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.683273][ T5039] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.711426][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 64.737446][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.741523][ T5160] "syz-executor.2" (5160) uses obsolete ecb(arc4) skcipher [ 64.747603][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 64.765313][ T27] audit: type=1800 audit(1693293258.713:2): pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1947 res=0 errno=0 [ 64.767579][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.797551][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 64.808188][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.819347][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 64.830366][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.841596][ T5049] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 64.870504][ T5053] veth0_macvtap: entered promiscuous mode [ 64.890396][ T5053] veth1_macvtap: entered promiscuous mode [ 64.897633][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 64.908360][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.919854][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 64.930529][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.940451][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 64.951024][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.961818][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 64.972341][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.983269][ T5049] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.013737][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 65.024443][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.034523][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 65.047696][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.058003][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 65.069101][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.079026][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 65.089710][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.100354][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 65.110926][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.122714][ T5053] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.144881][ T5049] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.155685][ T5049] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.164365][ T5049] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.173543][ T5049] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.190780][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 65.204791][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.214814][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 65.225468][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.236003][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 65.246971][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.257759][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 65.269443][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.280172][ T5053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 65.290743][ T5053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.302357][ T5053] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.312967][ T5053] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.321844][ T5053] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.331086][ T5053] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.339857][ T5053] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.405222][ T5101] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.413732][ T5101] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.437102][ T5099] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.449713][ T4440] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.455630][ T5099] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.457920][ T4440] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.490427][ T5099] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.503718][ T5099] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.517142][ T5102] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.524960][ T5102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.560204][ T5102] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.581508][ T5102] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.606943][ T5102] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.621760][ T5102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.646823][ T5165] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 65.647927][ T5109] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.663910][ T5165] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 65.671834][ T5109] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:14:19 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000f40)=0xe) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x3) 07:14:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="84", 0x1) r2 = dup(r1) r3 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000180)="b517d010", 0x4) 07:14:19 executing program 3: r0 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'netdevsim0\x00', &(0x7f0000000100)=@ethtool_drvinfo={0xf, "d4ce5c37e4c0bc8b704b1eff83d75eb19fbfa676488de83a5e993e8711058ea7", "e3f76263880019d1dd7aaad44011b5c16a438f06e8d2cbf2030e7e349fa2e65b", "aa1722b6820c188d8b20e9422922f7a947ccbf7f00f8ed1568e7d3cd8dfebb6b", "ba51e040e6bc8c228c2eb8ade35413e04c374e73fb16e1911122f7b6f6e0aea2", "2f981a151e9aa44a5cba9cccc91a44833f9cd6650e78ef516d15ac604da680e0", "19d7744124a0872bfe7df210"}}) [ 65.703264][ T5165] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list 07:14:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e00)={0xc, 0x4, &(0x7f0000001700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x21}]}, &(0x7f0000001740)='GPL\x00', 0x3, 0xe0, &(0x7f0000001780)=""/224, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 65.826269][ T5179] "syz-executor.2" (5179) uses obsolete ecb(arc4) skcipher [ 65.842563][ T5182] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 65.850380][ T5101] libceph: connect (1)[c::]:6789 error -101 [ 65.865243][ T5167] ceph: No mds server is up or the cluster is laggy [ 65.893231][ T5101] libceph: mon0 (1)[c::]:6789 connect error [ 65.909737][ T27] audit: type=1800 audit(1693293259.843:3): pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1963 res=0 errno=0 [ 65.940078][ T5045] Bluetooth: hci2: command 0x040f tx timeout [ 65.946157][ T5047] Bluetooth: hci0: command 0x040f tx timeout [ 65.952143][ T5047] Bluetooth: hci1: command 0x040f tx timeout [ 65.995595][ T5051] Bluetooth: hci3: command 0x040f tx timeout 07:14:20 executing program 5: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) 07:14:20 executing program 3: r0 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'netdevsim0\x00', &(0x7f0000000100)=@ethtool_drvinfo={0xf, "d4ce5c37e4c0bc8b704b1eff83d75eb19fbfa676488de83a5e993e8711058ea7", "e3f76263880019d1dd7aaad44011b5c16a438f06e8d2cbf2030e7e349fa2e65b", "aa1722b6820c188d8b20e9422922f7a947ccbf7f00f8ed1568e7d3cd8dfebb6b", "ba51e040e6bc8c228c2eb8ade35413e04c374e73fb16e1911122f7b6f6e0aea2", "2f981a151e9aa44a5cba9cccc91a44833f9cd6650e78ef516d15ac604da680e0", "19d7744124a0872bfe7df210"}}) 07:14:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e00)={0xc, 0x4, &(0x7f0000001700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x21}]}, &(0x7f0000001740)='GPL\x00', 0x3, 0xe0, &(0x7f0000001780)=""/224, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:14:20 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:20 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="84", 0x1) r2 = dup(r1) r3 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000180)="b517d010", 0x4) 07:14:20 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) [ 66.075254][ T5047] Bluetooth: hci5: command 0x040f tx timeout [ 66.081269][ T5047] Bluetooth: hci4: command 0x040f tx timeout [ 66.102600][ T5193] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 07:14:20 executing program 3: r0 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'netdevsim0\x00', &(0x7f0000000100)=@ethtool_drvinfo={0xf, "d4ce5c37e4c0bc8b704b1eff83d75eb19fbfa676488de83a5e993e8711058ea7", "e3f76263880019d1dd7aaad44011b5c16a438f06e8d2cbf2030e7e349fa2e65b", "aa1722b6820c188d8b20e9422922f7a947ccbf7f00f8ed1568e7d3cd8dfebb6b", "ba51e040e6bc8c228c2eb8ade35413e04c374e73fb16e1911122f7b6f6e0aea2", "2f981a151e9aa44a5cba9cccc91a44833f9cd6650e78ef516d15ac604da680e0", "19d7744124a0872bfe7df210"}}) 07:14:20 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e00)={0xc, 0x4, &(0x7f0000001700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x21}]}, &(0x7f0000001740)='GPL\x00', 0x3, 0xe0, &(0x7f0000001780)=""/224, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 66.157576][ T5194] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 66.209011][ T5099] libceph: connect (1)[c::]:6789 error -101 [ 66.224132][ T5203] "syz-executor.2" (5203) uses obsolete ecb(arc4) skcipher [ 66.243836][ T5204] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 66.252056][ T5099] libceph: mon0 (1)[c::]:6789 connect error 07:14:20 executing program 3: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) 07:14:20 executing program 4: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) [ 66.284446][ T27] audit: type=1800 audit(1693293260.233:4): pid=5203 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1947 res=0 errno=0 [ 66.284800][ T5208] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 66.313871][ T5195] ceph: No mds server is up or the cluster is laggy [ 66.403740][ T5214] ================================================================== [ 66.411829][ T5214] BUG: KASAN: slab-use-after-free in memcmp+0x1b5/0x1c0 [ 66.418794][ T5214] Read of size 8 at addr ffff88802382ef80 by task syz-executor.3/5214 [ 66.426936][ T5214] [ 66.429248][ T5214] CPU: 0 PID: 5214 Comm: syz-executor.3 Not tainted 6.5.0-syzkaller-01207-g1c59d383390f #0 [ 66.439472][ T5214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 66.449505][ T5214] Call Trace: [ 66.452760][ T5214] [ 66.455671][ T5214] dump_stack_lvl+0xd9/0x1b0 [ 66.460252][ T5214] print_report+0xc4/0x620 [ 66.464666][ T5214] ? __virt_addr_valid+0x5e/0x2d0 [ 66.469675][ T5214] ? __phys_addr+0xc6/0x140 [ 66.474159][ T5214] kasan_report+0xda/0x110 [ 66.478558][ T5214] ? memcmp+0x1b5/0x1c0 [ 66.482705][ T5214] ? memcmp+0x1b5/0x1c0 [ 66.486839][ T5214] memcmp+0x1b5/0x1c0 [ 66.490797][ T5214] ceph_compare_super+0x11a/0x8d0 [ 66.495802][ T5214] ? ceph_reconfigure_fc+0x3f0/0x3f0 [ 66.501070][ T5214] sget_fc+0x582/0x9b0 [ 66.505122][ T5214] ? ceph_put_super+0x90/0x90 [ 66.509796][ T5214] ? ceph_reconfigure_fc+0x3f0/0x3f0 [ 66.515057][ T5214] ceph_get_tree+0x6ea/0x1910 [ 66.519709][ T5214] vfs_get_tree+0x8c/0x370 [ 66.524099][ T5214] vfs_cmd_create+0x11f/0x2f0 [ 66.528773][ T5214] __do_sys_fsconfig+0x832/0xb90 [ 66.533694][ T5214] ? vfs_cmd_create+0x2f0/0x2f0 [ 66.538521][ T5214] ? folio_memcg_unlock+0x2d0/0x2d0 [ 66.543695][ T5214] ? syscall_enter_from_user_mode+0x26/0x80 [ 66.549584][ T5214] do_syscall_64+0x38/0xb0 [ 66.553973][ T5214] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 66.559841][ T5214] RIP: 0033:0x7f667027cae9 [ 66.564231][ T5214] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 66.583811][ T5214] RSP: 002b:00007f66710ba0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [ 66.592199][ T5214] RAX: ffffffffffffffda RBX: 00007f667039bf80 RCX: 00007f667027cae9 [ 66.600144][ T5214] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 66.608088][ T5214] RBP: 00007f66702c847a R08: 0000000000000000 R09: 0000000000000000 [ 66.616033][ T5214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 66.623990][ T5214] R13: 000000000000000b R14: 00007f667039bf80 R15: 00007ffe715e2a08 [ 66.631936][ T5214] [ 66.634928][ T5214] [ 66.637227][ T5214] Allocated by task 5195: [ 66.641521][ T5214] kasan_save_stack+0x33/0x50 [ 66.646175][ T5214] kasan_set_track+0x25/0x30 [ 66.650740][ T5214] __kasan_kmalloc+0xa2/0xb0 [ 66.655312][ T5214] ceph_init_fs_context+0xc8/0x530 [ 66.660421][ T5214] alloc_fs_context+0x56c/0x9f0 [ 66.665253][ T5214] __x64_sys_fsopen+0xeb/0x230 [ 66.670001][ T5214] do_syscall_64+0x38/0xb0 [ 66.674404][ T5214] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 66.680269][ T5214] [ 66.682564][ T5214] Freed by task 5195: [ 66.686509][ T5214] kasan_save_stack+0x33/0x50 [ 66.691158][ T5214] kasan_set_track+0x25/0x30 [ 66.695733][ T5214] kasan_save_free_info+0x2b/0x40 [ 66.700739][ T5214] ____kasan_slab_free+0x15e/0x1b0 [ 66.705829][ T5214] slab_free_freelist_hook+0x10b/0x1e0 [ 66.711275][ T5214] __kmem_cache_free+0xb8/0x2f0 [ 66.716096][ T5214] destroy_mount_options+0xe9/0x140 [ 66.721278][ T5214] destroy_fs_client+0x1b6/0x2b0 [ 66.726191][ T5214] deactivate_locked_super+0xa0/0x2d0 [ 66.731534][ T5214] ceph_get_tree+0x1270/0x1910 [ 66.736273][ T5214] vfs_get_tree+0x8c/0x370 [ 66.740660][ T5214] vfs_cmd_create+0x11f/0x2f0 [ 66.745311][ T5214] __do_sys_fsconfig+0x832/0xb90 [ 66.750229][ T5214] do_syscall_64+0x38/0xb0 [ 66.754617][ T5214] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 66.760484][ T5214] [ 66.762783][ T5214] The buggy address belongs to the object at ffff88802382ef80 [ 66.762783][ T5214] which belongs to the cache kmalloc-96 of size 96 [ 66.776646][ T5214] The buggy address is located 0 bytes inside of [ 66.776646][ T5214] freed 96-byte region [ffff88802382ef80, ffff88802382efe0) [ 66.790148][ T5214] [ 66.792443][ T5214] The buggy address belongs to the physical page: [ 66.798824][ T5214] page:ffffea00008e0b80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2382e [ 66.808945][ T5214] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 66.816456][ T5214] page_type: 0xffffffff() [ 66.820755][ T5214] raw: 00fff00000000200 ffff888012841780 dead000000000122 0000000000000000 [ 66.829310][ T5214] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 66.837862][ T5214] page dumped because: kasan: bad access detected [ 66.844241][ T5214] page_owner tracks the page as allocated [ 66.849925][ T5214] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 4766, tgid 4766 (kworker/1:2), ts 66155798486, free_ts 66145624632 [ 66.868036][ T5214] post_alloc_hook+0x2d2/0x350 [ 66.872777][ T5214] get_page_from_freelist+0x10a9/0x31e0 [ 66.878299][ T5214] __alloc_pages+0x1d0/0x4a0 [ 66.882864][ T5214] alloc_pages+0x1a9/0x270 [ 66.887253][ T5214] allocate_slab+0x24e/0x380 [ 66.891815][ T5214] ___slab_alloc+0x8bc/0x1570 [ 66.896481][ T5214] __slab_alloc.constprop.0+0x56/0xa0 [ 66.901822][ T5214] __kmem_cache_alloc_node+0x137/0x350 [ 66.907255][ T5214] kmalloc_trace+0x25/0xe0 [ 66.911646][ T5214] nsim_fib_event_work+0x1393/0x26e0 [ 66.916907][ T5214] process_one_work+0xaa2/0x16f0 [ 66.921818][ T5214] worker_thread+0x896/0x1110 [ 66.926465][ T5214] kthread+0x33a/0x430 [ 66.930504][ T5214] ret_from_fork+0x2c/0x70 [ 66.934889][ T5214] ret_from_fork_asm+0x11/0x20 [ 66.939628][ T5214] page last free stack trace: [ 66.944268][ T5214] free_unref_page_prepare+0x508/0xb90 [ 66.949703][ T5214] free_unref_page+0x33/0x3b0 [ 66.954354][ T5214] vfree+0x181/0x7a0 [ 66.958240][ T5214] delayed_vfree_work+0x56/0x70 [ 66.963062][ T5214] process_one_work+0xaa2/0x16f0 [ 66.967972][ T5214] worker_thread+0x687/0x1110 [ 66.972634][ T5214] kthread+0x33a/0x430 [ 66.976691][ T5214] ret_from_fork+0x2c/0x70 [ 66.981078][ T5214] ret_from_fork_asm+0x11/0x20 [ 66.985820][ T5214] [ 66.988118][ T5214] Memory state around the buggy address: [ 66.993716][ T5214] ffff88802382ee80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 67.001746][ T5214] ffff88802382ef00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 67.009777][ T5214] >ffff88802382ef80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 67.017808][ T5214] ^ [ 67.021843][ T5214] ffff88802382f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.029874][ T5214] ffff88802382f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.037902][ T5214] ================================================================== [ 67.047261][ T5214] Disabling lock debugging due to kernel taint [ 67.053388][ T5214] ================================================================== [ 67.061435][ T5214] BUG: KASAN: slab-use-after-free in memcmp+0x192/0x1c0 [ 67.068360][ T5214] Read of size 1 at addr ffff88802382ef80 by task syz-executor.3/5214 [ 67.076479][ T5214] [ 67.078778][ T5214] CPU: 0 PID: 5214 Comm: syz-executor.3 Tainted: G B 6.5.0-syzkaller-01207-g1c59d383390f #0 [ 67.090204][ T5214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 67.100246][ T5214] Call Trace: [ 67.103499][ T5214] [ 67.106408][ T5214] dump_stack_lvl+0xd9/0x1b0 [ 67.110977][ T5214] print_report+0xc4/0x620 [ 67.115372][ T5214] ? __virt_addr_valid+0x5e/0x2d0 [ 67.120377][ T5214] ? __phys_addr+0xc6/0x140 [ 67.124854][ T5214] kasan_report+0xda/0x110 [ 67.129242][ T5214] ? memcmp+0x192/0x1c0 [ 67.133372][ T5214] ? memcmp+0x192/0x1c0 [ 67.137504][ T5214] memcmp+0x192/0x1c0 [ 67.141473][ T5214] ceph_compare_super+0x11a/0x8d0 [ 67.146483][ T5214] ? ceph_reconfigure_fc+0x3f0/0x3f0 [ 67.151744][ T5214] sget_fc+0x582/0x9b0 [ 67.155795][ T5214] ? ceph_put_super+0x90/0x90 [ 67.160452][ T5214] ? ceph_reconfigure_fc+0x3f0/0x3f0 [ 67.165727][ T5214] ceph_get_tree+0x6ea/0x1910 [ 67.170648][ T5214] vfs_get_tree+0x8c/0x370 [ 67.175055][ T5214] vfs_cmd_create+0x11f/0x2f0 [ 67.179708][ T5214] __do_sys_fsconfig+0x832/0xb90 [ 67.184619][ T5214] ? vfs_cmd_create+0x2f0/0x2f0 [ 67.189443][ T5214] ? folio_memcg_unlock+0x2d0/0x2d0 [ 67.194618][ T5214] ? syscall_enter_from_user_mode+0x26/0x80 [ 67.200487][ T5214] do_syscall_64+0x38/0xb0 [ 67.204889][ T5214] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.210758][ T5214] RIP: 0033:0x7f667027cae9 [ 67.215149][ T5214] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 67.234734][ T5214] RSP: 002b:00007f66710ba0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [ 67.243116][ T5214] RAX: ffffffffffffffda RBX: 00007f667039bf80 RCX: 00007f667027cae9 [ 67.251062][ T5214] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 67.259008][ T5214] RBP: 00007f66702c847a R08: 0000000000000000 R09: 0000000000000000 [ 67.266952][ T5214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 67.274894][ T5214] R13: 000000000000000b R14: 00007f667039bf80 R15: 00007ffe715e2a08 [ 67.282842][ T5214] [ 67.285850][ T5214] [ 67.288158][ T5214] Allocated by task 5195: [ 67.292452][ T5214] kasan_save_stack+0x33/0x50 [ 67.297107][ T5214] kasan_set_track+0x25/0x30 [ 67.301673][ T5214] __kasan_kmalloc+0xa2/0xb0 [ 67.306241][ T5214] ceph_init_fs_context+0xc8/0x530 [ 67.311335][ T5214] alloc_fs_context+0x56c/0x9f0 [ 67.316182][ T5214] __x64_sys_fsopen+0xeb/0x230 [ 67.320927][ T5214] do_syscall_64+0x38/0xb0 [ 67.325335][ T5214] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.331213][ T5214] [ 67.333510][ T5214] Freed by task 5195: [ 67.337459][ T5214] kasan_save_stack+0x33/0x50 [ 67.342117][ T5214] kasan_set_track+0x25/0x30 [ 67.346683][ T5214] kasan_save_free_info+0x2b/0x40 [ 67.351697][ T5214] ____kasan_slab_free+0x15e/0x1b0 [ 67.356786][ T5214] slab_free_freelist_hook+0x10b/0x1e0 [ 67.362220][ T5214] __kmem_cache_free+0xb8/0x2f0 [ 67.367043][ T5214] destroy_mount_options+0xe9/0x140 [ 67.372214][ T5214] destroy_fs_client+0x1b6/0x2b0 [ 67.377123][ T5214] deactivate_locked_super+0xa0/0x2d0 [ 67.382467][ T5214] ceph_get_tree+0x1270/0x1910 [ 67.387203][ T5214] vfs_get_tree+0x8c/0x370 [ 67.391592][ T5214] vfs_cmd_create+0x11f/0x2f0 [ 67.396244][ T5214] __do_sys_fsconfig+0x832/0xb90 [ 67.401241][ T5214] do_syscall_64+0x38/0xb0 [ 67.405634][ T5214] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.411509][ T5214] [ 67.413805][ T5214] The buggy address belongs to the object at ffff88802382ef80 [ 67.413805][ T5214] which belongs to the cache kmalloc-96 of size 96 [ 67.427652][ T5214] The buggy address is located 0 bytes inside of [ 67.427652][ T5214] freed 96-byte region [ffff88802382ef80, ffff88802382efe0) [ 67.441165][ T5214] [ 67.443473][ T5214] The buggy address belongs to the physical page: [ 67.449857][ T5214] page:ffffea00008e0b80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2382e [ 67.459985][ T5214] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 67.467499][ T5214] page_type: 0xffffffff() [ 67.471802][ T5214] raw: 00fff00000000200 ffff888012841780 dead000000000122 0000000000000000 [ 67.480369][ T5214] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 67.488921][ T5214] page dumped because: kasan: bad access detected [ 67.495304][ T5214] page_owner tracks the page as allocated [ 67.500989][ T5214] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 4766, tgid 4766 (kworker/1:2), ts 66155798486, free_ts 66145624632 [ 67.519106][ T5214] post_alloc_hook+0x2d2/0x350 [ 67.523867][ T5214] get_page_from_freelist+0x10a9/0x31e0 [ 67.529406][ T5214] __alloc_pages+0x1d0/0x4a0 [ 67.533972][ T5214] alloc_pages+0x1a9/0x270 [ 67.538361][ T5214] allocate_slab+0x24e/0x380 [ 67.542925][ T5214] ___slab_alloc+0x8bc/0x1570 [ 67.547574][ T5214] __slab_alloc.constprop.0+0x56/0xa0 [ 67.552923][ T5214] __kmem_cache_alloc_node+0x137/0x350 [ 67.558361][ T5214] kmalloc_trace+0x25/0xe0 [ 67.562767][ T5214] nsim_fib_event_work+0x1393/0x26e0 [ 67.568028][ T5214] process_one_work+0xaa2/0x16f0 [ 67.572939][ T5214] worker_thread+0x896/0x1110 [ 67.577588][ T5214] kthread+0x33a/0x430 [ 67.581627][ T5214] ret_from_fork+0x2c/0x70 [ 67.586014][ T5214] ret_from_fork_asm+0x11/0x20 [ 67.590750][ T5214] page last free stack trace: [ 67.595393][ T5214] free_unref_page_prepare+0x508/0xb90 [ 67.600841][ T5214] free_unref_page+0x33/0x3b0 [ 67.605495][ T5214] vfree+0x181/0x7a0 [ 67.609369][ T5214] delayed_vfree_work+0x56/0x70 [ 67.614205][ T5214] process_one_work+0xaa2/0x16f0 [ 67.619126][ T5214] worker_thread+0x687/0x1110 [ 67.623777][ T5214] kthread+0x33a/0x430 [ 67.627818][ T5214] ret_from_fork+0x2c/0x70 [ 67.632215][ T5214] ret_from_fork_asm+0x11/0x20 [ 67.636955][ T5214] [ 67.639249][ T5214] Memory state around the buggy address: [ 67.644844][ T5214] ffff88802382ee80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 67.652875][ T5214] ffff88802382ef00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 67.660906][ T5214] >ffff88802382ef80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 67.668936][ T5214] ^ [ 67.672983][ T5214] ffff88802382f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.681013][ T5214] ffff88802382f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.689041][ T5214] ================================================================== [ 67.698119][ T5214] ================================================================== [ 67.706158][ T5214] BUG: KASAN: slab-use-after-free in memcmp+0x192/0x1c0 [ 67.713070][ T5214] Read of size 1 at addr ffff88802382ef81 by task syz-executor.3/5214 [ 67.721192][ T5214] [ 67.723489][ T5214] CPU: 0 PID: 5214 Comm: syz-executor.3 Tainted: G B 6.5.0-syzkaller-01207-g1c59d383390f #0 [ 67.734998][ T5214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 67.745023][ T5214] Call Trace: [ 67.748290][ T5214] [ 67.751199][ T5214] dump_stack_lvl+0xd9/0x1b0 [ 67.755771][ T5214] print_report+0xc4/0x620 [ 67.760174][ T5214] ? __virt_addr_valid+0x5e/0x2d0 [ 67.765186][ T5214] ? __phys_addr+0xc6/0x140 [ 67.769679][ T5214] kasan_report+0xda/0x110 [ 67.774067][ T5214] ? memcmp+0x192/0x1c0 [ 67.778199][ T5214] ? memcmp+0x192/0x1c0 [ 67.782330][ T5214] memcmp+0x192/0x1c0 [ 67.786285][ T5214] ceph_compare_super+0x11a/0x8d0 [ 67.791296][ T5214] ? ceph_reconfigure_fc+0x3f0/0x3f0 [ 67.796641][ T5214] sget_fc+0x582/0x9b0 [ 67.800687][ T5214] ? ceph_put_super+0x90/0x90 [ 67.805340][ T5214] ? ceph_reconfigure_fc+0x3f0/0x3f0 [ 67.810606][ T5214] ceph_get_tree+0x6ea/0x1910 [ 67.815267][ T5214] vfs_get_tree+0x8c/0x370 [ 67.819756][ T5214] vfs_cmd_create+0x11f/0x2f0 [ 67.824425][ T5214] __do_sys_fsconfig+0x832/0xb90 [ 67.829339][ T5214] ? vfs_cmd_create+0x2f0/0x2f0 [ 67.834173][ T5214] ? folio_memcg_unlock+0x2d0/0x2d0 [ 67.839353][ T5214] ? syscall_enter_from_user_mode+0x26/0x80 [ 67.845225][ T5214] do_syscall_64+0x38/0xb0 [ 67.849620][ T5214] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.855492][ T5214] RIP: 0033:0x7f667027cae9 [ 67.859889][ T5214] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 67.879478][ T5214] RSP: 002b:00007f66710ba0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [ 67.887867][ T5214] RAX: ffffffffffffffda RBX: 00007f667039bf80 RCX: 00007f667027cae9 [ 67.895821][ T5214] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 67.903785][ T5214] RBP: 00007f66702c847a R08: 0000000000000000 R09: 0000000000000000 [ 67.911728][ T5214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 67.919673][ T5214] R13: 000000000000000b R14: 00007f667039bf80 R15: 00007ffe715e2a08 [ 67.927624][ T5214] [ 67.930614][ T5214] [ 67.932911][ T5214] Allocated by task 5195: [ 67.937213][ T5214] kasan_save_stack+0x33/0x50 [ 67.941868][ T5214] kasan_set_track+0x25/0x30 [ 67.946430][ T5214] __kasan_kmalloc+0xa2/0xb0 [ 67.950993][ T5214] ceph_init_fs_context+0xc8/0x530 [ 67.956083][ T5214] alloc_fs_context+0x56c/0x9f0 [ 67.960918][ T5214] __x64_sys_fsopen+0xeb/0x230 [ 67.965663][ T5214] do_syscall_64+0x38/0xb0 [ 67.970057][ T5214] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.975922][ T5214] [ 67.978218][ T5214] Freed by task 5195: [ 67.982161][ T5214] kasan_save_stack+0x33/0x50 [ 67.986813][ T5214] kasan_set_track+0x25/0x30 [ 67.991374][ T5214] kasan_save_free_info+0x2b/0x40 [ 67.996371][ T5214] ____kasan_slab_free+0x15e/0x1b0 [ 68.001457][ T5214] slab_free_freelist_hook+0x10b/0x1e0 [ 68.006890][ T5214] __kmem_cache_free+0xb8/0x2f0 [ 68.011717][ T5214] destroy_mount_options+0xe9/0x140 [ 68.016891][ T5214] destroy_fs_client+0x1b6/0x2b0 [ 68.021800][ T5214] deactivate_locked_super+0xa0/0x2d0 [ 68.027144][ T5214] ceph_get_tree+0x1270/0x1910 [ 68.031878][ T5214] vfs_get_tree+0x8c/0x370 [ 68.036266][ T5214] vfs_cmd_create+0x11f/0x2f0 [ 68.040918][ T5214] __do_sys_fsconfig+0x832/0xb90 [ 68.045842][ T5214] do_syscall_64+0x38/0xb0 [ 68.050236][ T5214] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.056112][ T5214] [ 68.058407][ T5214] The buggy address belongs to the object at ffff88802382ef80 [ 68.058407][ T5214] which belongs to the cache kmalloc-96 of size 96 [ 68.072272][ T5214] The buggy address is located 1 bytes inside of [ 68.072272][ T5214] freed 96-byte region [ffff88802382ef80, ffff88802382efe0) [ 68.085793][ T5214] [ 68.088093][ T5214] The buggy address belongs to the physical page: [ 68.094472][ T5214] page:ffffea00008e0b80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2382e [ 68.104590][ T5214] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 68.112106][ T5214] page_type: 0xffffffff() [ 68.116413][ T5214] raw: 00fff00000000200 ffff888012841780 dead000000000122 0000000000000000 [ 68.124973][ T5214] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 68.133528][ T5214] page dumped because: kasan: bad access detected [ 68.139909][ T5214] page_owner tracks the page as allocated [ 68.145597][ T5214] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 4766, tgid 4766 (kworker/1:2), ts 66155798486, free_ts 66145624632 [ 68.163720][ T5214] post_alloc_hook+0x2d2/0x350 [ 68.168469][ T5214] get_page_from_freelist+0x10a9/0x31e0 [ 68.174004][ T5214] __alloc_pages+0x1d0/0x4a0 [ 68.178572][ T5214] alloc_pages+0x1a9/0x270 [ 68.182958][ T5214] allocate_slab+0x24e/0x380 [ 68.187609][ T5214] ___slab_alloc+0x8bc/0x1570 [ 68.192259][ T5214] __slab_alloc.constprop.0+0x56/0xa0 [ 68.197603][ T5214] __kmem_cache_alloc_node+0x137/0x350 [ 68.203034][ T5214] kmalloc_trace+0x25/0xe0 [ 68.207423][ T5214] nsim_fib_event_work+0x1393/0x26e0 [ 68.212768][ T5214] process_one_work+0xaa2/0x16f0 [ 68.217684][ T5214] worker_thread+0x896/0x1110 [ 68.222330][ T5214] kthread+0x33a/0x430 [ 68.226371][ T5214] ret_from_fork+0x2c/0x70 [ 68.230757][ T5214] ret_from_fork_asm+0x11/0x20 [ 68.235509][ T5214] page last free stack trace: [ 68.240153][ T5214] free_unref_page_prepare+0x508/0xb90 [ 68.245587][ T5214] free_unref_page+0x33/0x3b0 [ 68.250243][ T5214] vfree+0x181/0x7a0 [ 68.254106][ T5214] delayed_vfree_work+0x56/0x70 [ 68.258931][ T5214] process_one_work+0xaa2/0x16f0 [ 68.263840][ T5214] worker_thread+0x687/0x1110 [ 68.268506][ T5214] kthread+0x33a/0x430 [ 68.272550][ T5214] ret_from_fork+0x2c/0x70 [ 68.276944][ T5214] ret_from_fork_asm+0x11/0x20 [ 68.281682][ T5214] [ 68.283978][ T5214] Memory state around the buggy address: [ 68.289575][ T5214] ffff88802382ee80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 68.297608][ T5214] ffff88802382ef00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 68.305641][ T5214] >ffff88802382ef80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 68.313673][ T5214] ^ [ 68.317710][ T5214] ffff88802382f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.325745][ T5214] ffff88802382f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.333777][ T5214] ================================================================== [ 68.368572][ T5051] Bluetooth: hci1: command 0x0419 tx timeout [ 68.375782][ T5051] Bluetooth: hci2: command 0x0419 tx timeout [ 68.383268][ T5051] Bluetooth: hci0: command 0x0419 tx timeout [ 68.390080][ T5047] Bluetooth: hci3: command 0x0419 tx timeout [ 68.395142][ T5051] Bluetooth: hci4: command 0x0419 tx timeout [ 68.396520][ T5047] Bluetooth: hci5: command 0x0419 tx timeout [ 68.409742][ T5103] libceph: connect (1)[c::]:6789 error -101 07:14:22 executing program 5: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) 07:14:22 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:22 executing program 0: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) 07:14:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="84", 0x1) r2 = dup(r1) r3 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000180)="b517d010", 0x4) [ 68.421395][ T5103] libceph: mon0 (1)[c::]:6789 connect error [ 68.426875][ T5213] ceph: No mds server is up or the cluster is laggy [ 68.430499][ T5103] libceph: connect (1)[c::]:6789 error -101 [ 68.450479][ T5103] libceph: mon0 (1)[c::]:6789 connect error [ 68.454697][ T5225] "syz-executor.2" (5225) uses obsolete ecb(arc4) skcipher [ 68.472821][ T27] audit: type=1800 audit(1693293262.423:5): pid=5225 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1958 res=0 errno=0 [ 68.497143][ T5231] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 68.499387][ T4440] libceph: connect (1)[c::]:6789 error -101 [ 68.504229][ T5103] libceph: connect (1)[c::]:6789 error -101 [ 68.510867][ T4440] libceph: mon0 (1)[c::]:6789 connect error 07:14:22 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) [ 68.516153][ T5214] ceph: No mds server is up or the cluster is laggy [ 68.541081][ T5103] libceph: mon0 (1)[c::]:6789 connect error 07:14:22 executing program 4: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) 07:14:22 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:22 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) [ 68.574674][ T5239] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 68.588792][ T5226] ceph: No mds server is up or the cluster is laggy [ 68.592613][ T5101] libceph: connect (1)[c::]:6789 error -101 [ 68.602164][ T5101] libceph: mon0 (1)[c::]:6789 connect error [ 68.602292][ T5229] ceph: No mds server is up or the cluster is laggy 07:14:22 executing program 3: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) 07:14:22 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:22 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) [ 68.640225][ T5248] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 68.653448][ T5251] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 68.677029][ T8] libceph: connect (1)[c::]:6789 error -101 [ 68.683546][ T8] libceph: mon0 (1)[c::]:6789 connect error 07:14:22 executing program 5: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) 07:14:22 executing program 0: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) 07:14:22 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:22 executing program 4: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) [ 68.690195][ T5256] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 68.699824][ T5242] ceph: No mds server is up or the cluster is laggy [ 68.723515][ T5260] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 07:14:22 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) [ 68.767844][ T5252] ceph: No mds server is up or the cluster is laggy [ 68.771939][ T5267] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 68.790262][ T5101] libceph: connect (1)[c::]:6789 error -101 [ 68.806863][ T5101] libceph: mon0 (1)[c::]:6789 connect error 07:14:22 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:22 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) [ 68.810229][ T5274] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 68.821044][ T5109] libceph: connect (1)[c::]:6789 error -101 [ 68.827233][ T5109] libceph: mon0 (1)[c::]:6789 connect error [ 68.829467][ T5101] libceph: connect (1)[c::]:6789 error -101 [ 68.852580][ T5101] libceph: mon0 (1)[c::]:6789 connect error [ 68.861266][ T5281] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 07:14:22 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:22 executing program 3: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) [ 68.877010][ T5263] ceph: No mds server is up or the cluster is laggy [ 68.880955][ T5288] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 68.884597][ T5265] ceph: No mds server is up or the cluster is laggy [ 68.910819][ T5275] ceph: No mds server is up or the cluster is laggy 07:14:22 executing program 0: r0 = gettid() r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0xb) 07:14:22 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="84", 0x1) r2 = dup(r1) r3 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000180)="b517d010", 0x4) 07:14:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) [ 68.947813][ T5103] libceph: connect (1)[c::]:6789 error -101 [ 68.958582][ T5293] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 68.973097][ T5103] libceph: mon0 (1)[c::]:6789 connect error [ 68.988179][ T5300] "syz-executor.4" (5300) uses obsolete ecb(arc4) skcipher [ 69.002256][ T5302] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 69.009936][ T27] audit: type=1800 audit(1693293262.963:6): pid=5300 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file1" dev="sda1" ino=1948 res=0 errno=0 [ 69.010338][ T5103] libceph: connect (1)[c::]:6789 error -101 [ 69.037919][ T5103] libceph: mon0 (1)[c::]:6789 connect error 07:14:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000001500000000000000010000c50000000e00180095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='locks_get_lock_context\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) flock(r1, 0x6) 07:14:23 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x2d, 0x0, "000000000000000000000000000000000000014d1700000000009a000000000000000000000000010400000000000000000000000000000000000000fbe16f66fac112bf00f803bb3e5e0b088a00"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}}, 0x0, 0x0, 0x12, 0x0, "76fe2820ace6f137e34e35f6ec463cd7965a0c20ef92a0546381f86ccd8ded63a5a66536007ddbe85dd158f765c57c5a2d689946f5ae9f4264ebc38711b6f90c6174f2886791e4a5dc89e1c68341677f"}, 0xd8) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket(0x2b, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x0, 0x4, 'lc\x00'}, {@rand_addr=0x64010101, 0x4e20, 0x2, 0x0, 0x8}}, 0x44) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@timestamp, @timestamp, @sack_perm, @timestamp, @sack_perm, @window, @mss, @window={0x3, 0x8, 0x2d}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x4, 0x7fffffdd}, 0x14) shutdown(r0, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 07:14:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) [ 69.050891][ T5294] ceph: No mds server is up or the cluster is laggy 07:14:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000001500000000000000010000c50000000e00180095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='locks_get_lock_context\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) flock(r1, 0x6) 07:14:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000001500000000000000010000c50000000e00180095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='locks_get_lock_context\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) flock(r1, 0x6) 07:14:23 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000001500000000000000010000c50000000e00180095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='locks_get_lock_context\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) flock(r1, 0x6) [ 69.100942][ T5303] ceph: No mds server is up or the cluster is laggy [ 69.129499][ T5315] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 07:14:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) 07:14:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000001500000000000000010000c50000000e00180095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='locks_get_lock_context\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) flock(r1, 0x6) 07:14:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) 07:14:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="84", 0x1) r2 = dup(r1) r3 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000180)="b517d010", 0x4) 07:14:23 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000001500000000000000010000c50000000e00180095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='locks_get_lock_context\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) flock(r1, 0x6) 07:14:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) 07:14:23 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000001500000000000000010000c50000000e00180095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='locks_get_lock_context\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) flock(r1, 0x6) 07:14:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) [ 69.238790][ T5332] "syz-executor.4" (5332) uses obsolete ecb(arc4) skcipher 07:14:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1626}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1630}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]]}, 0x40}}, 0x0) 07:14:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) 07:14:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1626}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1630}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]]}, 0x40}}, 0x0) [ 69.280621][ T27] audit: type=1800 audit(1693293263.233:7): pid=5332 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file1" dev="sda1" ino=1949 res=0 errno=0 07:14:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1626}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1630}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]]}, 0x40}}, 0x0) 07:14:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) 07:14:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) open(0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) 07:14:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1626}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1630}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]]}, 0x40}}, 0x0) 07:14:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="84", 0x1) r2 = dup(r1) r3 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000180)="b517d010", 0x4) 07:14:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1626}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1630}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]]}, 0x40}}, 0x0) 07:14:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) 07:14:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1626}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1630}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]]}, 0x40}}, 0x0) 07:14:23 executing program 0: mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(0x0, 0x0, 0x18) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10120, 0x2, 0x0) dup2(r1, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46900) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getrlimit(0x0, &(0x7f0000000140)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4, 0x100010, 0xffffffffffffffff, 0xa7fb1000) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)=0x5) ftruncate(r3, 0x800) lseek(r3, 0x20400, 0x0) r5 = open(&(0x7f0000000240)='./bus\x00', 0x80, 0xc8) sendfile(r3, r5, 0x0, 0x80001d00c0d0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r3, 0x3) 07:14:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) [ 69.464864][ T5359] "syz-executor.4" (5359) uses obsolete ecb(arc4) skcipher [ 69.485217][ T5361] wireguard0: entered promiscuous mode [ 69.490793][ T5361] wireguard0: entered allmulticast mode [ 69.496970][ T27] audit: type=1800 audit(1693293263.443:8): pid=5359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file1" dev="sda1" ino=1952 res=0 errno=0 07:14:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1626}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1630}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]]}, 0x40}}, 0x0) 07:14:23 executing program 2: syz_emit_vhci(&(0x7f00000037c0)=@HCI_EVENT_PKT={0x4, @hci_ev_key_refresh_complete={{0x30, 0x3}, {0x0, 0xc9}}}, 0x6) 07:14:23 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000001800)={@link_local, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @dev, @loopback, @local, @broadcast}}}}, 0x0) [ 69.700298][ T27] audit: type=1804 audit(1693293263.623:9): pid=5376 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3623757620/syzkaller.TMVy88/10/bus" dev="sda1" ino=1959 res=1 errno=0 07:14:23 executing program 3: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES(r0, 0x3ba0, &(0x7f00000000c0)={0x38, 0x9}) 07:14:24 executing program 1: arch_prctl$ARCH_REQ_XCOMP_PERM(0x1023, 0xc) ioctl$HIDIOCGRDESC(0xffffffffffffffff, 0x90044802, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000600)=""/12) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000640)=""/21) r1 = pidfd_getfd(r0, r0, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000780)={&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000006c0)=""/155, 0x9b}) readahead(r1, 0x0, 0x0) readahead(r0, 0x6, 0x0) r2 = pidfd_getfd(r0, r1, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}}, 0x80) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, 0x0, 0x300, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000a00)={0x6e, "08e59a9599806560ee1db68e869fb41b5df23e0cfa6e584ecc2ea7fc5f33ff766808a897fcf7b9e910c626b6d45a0e45b98c47e911f7dc0a0ffae483e6ab5411"}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000ac0)={&(0x7f0000000a80)=[0x0, 0x0], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000001000)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000b40)={0x460, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x10c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd24}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x268e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff9351}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x485}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffd67}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x1a8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6068}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "60a0c2dcc479c13d5eaf0f6d1407ccc24646536b"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "db54d8f5bb91d6e6dd89095206cb1e09927dcea70d93ecb15e036471b6db"}}, @TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "362232db039dd2c6f740ece27ed83ee6abbabd382c4daec8fadfaf8758553fb8d4d825ff"}}, @TIPC_NLA_NODE_ID={0xa8, 0x3, "8ac14577dc68ef0cb12a1e19cd14abe183e9b504d1262c67dd0affcc25ebd997f37fcfacee9080a125b873de65d1248f24bd1861908a0a17328dde03846e1eb2a466f823e616cbd797d2c16e35fa16e1bf415c470defa0e906b2fb7c40c38abe849bcb5bd3083d2da46b6d0cecc2fc66bca85a9656ea1b8e1a33e7e17c1ef7c1936a63426f876e3fc2b089aeb7c6711ac391a3b2b47f611e984830befcef8596f19dacaf"}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x9}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x401}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x6}]}, @TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x76f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xba}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x49f3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff8001}]}]}, 0x460}, 0x1, 0x0, 0x0, 0x24004005}, 0x0) getpid() syz_clone3(&(0x7f0000002340)={0x40081000, &(0x7f00000021c0), &(0x7f0000002200), &(0x7f0000002240), {0x30}, &(0x7f0000002280)=""/1, 0x1, &(0x7f00000022c0)=""/38, 0x0, 0x0, {r1}}, 0x58) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002400)='./cgroup/syz1\x00', 0x200002, 0x0) 07:14:24 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000001800)={@link_local, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @dev, @loopback, @local, @broadcast}}}}, 0x0) 07:14:24 executing program 3: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES(r0, 0x3ba0, &(0x7f00000000c0)={0x38, 0x9}) 07:14:24 executing program 4: syz_mount_image$udf(&(0x7f00000000c0), &(0x7f00000007c0)='./file0\x00', 0x14444, &(0x7f0000000240)={[{@iocharset={'iocharset', 0x3d, 'cp949'}}, {@shortad}, {@rootdir={'rootdir', 0x3d, 0x7}}, {@gid_forget}, {@gid_ignore}, {@gid}, {@noadinicb}, {@shortad}]}, 0xfe, 0xc17, &(0x7f0000002440)="$eJzs3UFsHNd9B+D/Gy1FSm4rJk5Uu42LTVukMmO5sqSYilW4q5pmG0CWiVDMLQBX5EpdmCIJkmpkI22ZXnroIUBR9JATgdYokKKB0RRBj2zrAsnFhyKnnogWNoKiB7YIkJPBYGbfikuKsmRTpEj7+2zqNzv73ux7b9YzsqA3LwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAiN97+dKZ59KjbgUAsJ+ujH/1zFn3fwD4RLnq//8BAAAAAAAAAAAAAOCgS1HE45Fi/sp6mqxedwxcbs/euj0xMrpztWOpqnmkKl/+DDx39tz5Lz0/fKGbH1z/YXsyXh2/eqn+0tzN+YXW4mJruj4x256am2498BF2W3+7oWoA6jdfuzV9/fpi/eyz57a8fXvwvf7HTg5eHH769FPdshMjo6PjPWVqfR/50+9yrxkeR6OI05Hime/9JDUjoojdj8V9vjt77VjViaGqExMjo1VHZtrN2aXyzbHuQBQR9Z5Kje4Y7cO52JVGxHLZ/LLBQ2X3xuebC81rM636WHNhqb3UnpsdS53Wlv2pRxEXUsRKRKz13324viiiFim+c2I9XYuII91x+GI1Mfje7Sj2sI8PoGxnvS9ipTgE5+wA648iXokUP327iKlyzPJPfCHilTJ/EPFmmS9GpPKLcT7i3R2+RxxOtSjiL8rzf3E9TVfXg+515fLX6l+ZvT7XU7Z7XTn094f9dMCvTQNRRLO64q+nj/6bHQAAAAAAAAAAAAAAAAAetmNRxJOR4uX/+KNqXnFU89JPXBz+/cFf7J0z/sR9jlOWfTYilosHm5N7NE8hHktjKT3iucSfZANRxB/n+X/fetSNAQAAAAAAAAAAAAAAAAAA+EQr4seR4oV3TqWV6F1TvD17o361eW2msypsd+3f7prpGxsbG/XUyUbOyZzLOVdyruZcyxlFrp+zkXMy53LOlZyrOddyxpFcP2cj52TO5ZwrOVdzruWMWq6fs5FzMudyzpWcqznXcsYBWbsXAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODjpIgi3o8U3/7GeooUEY2Iyejkan+3DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwKPWnIr4fKep/0LizrxYRqfq341T5y/loHC3z09EYLvPFaFzK2ayy1vjWI2g/u9OXivhRpOgfeOvOCc/nv6/z6s7XIN785uarX6l18kj3zcH3+h87eeLi8OivPXGv7bRTA4Yut2dv3a5PjIyOjvfsruVP/3TPvsH8ucXD6ToRsfj6G681Z2ZaCzY+GRu1zkYtDkh79msjX6/ioLRn+0bjYDRjc+MRX5jYF+X9/91I8dvv/Gf3ht+9//9C59WdO3z87E827/8vbD/QHt3/H+/Z90L+3UhfLWJg6eZ838mIgcXX3zjdvtm80brRmj1/5syXh4e/fO5M39GIgevtmVbP1q6HCgAAAAAAAAAAAAAAAGB/pSJ+N1I0f7Se6hFxu5qvNXhx+OnTTx2JI9V8qy3ztl4dv3qp/tLczfmF1uJia7o+MduemptuPejHDVTTvSZGRvekM/d1bI/bf2zgpbn51xfaN/5wacf3jw9cura4tNCc2vntOBZFRKN3z1DV4ImR0arRM+3mbFV1bMfJdB9eXyrivyLF1Pl6+nzel+f/bZ/hv2X+//L2A+3R/L9P9ewrPzOlIn4WKX7rL5+Iz1ftPB53jVku97eRYujC53K5OFqW67ah81yBzszAsuz/RYp/fH9r2e58yMc3yz73wAN7SJTn/0Sk+P6ffzd+Pe/b+vyHnc//8e0H2qPz/5mefce3PK9g110nn//TkeLFx9+K38j7Puj5H0VsbGz8acSpXPjO8zn26Px/tmffYHQ+9zcfXvcBAAAAAAAAAAAOrb5UxN9FiqdGa+n5vO9B/v7f9PYD7dHf//rlnn3T+7Re0a4HFQAAAAAOiL5UxI8jxY2lt+7Mod46/7tn/ufvbK69PpK2vVv9Od8vVc8NeJh//tdrMH/u5O67DQAAAAAAAAAAAAAAAAAAAAdKSkU8n9dTn7zPeuqrkeLl/3kml0sny3LddeAHq18HrszNnr40MzM31VxqXptp1cfnm1Otsu5nIsX633wu1y2q9dW768131ngf2Oiuxb4QKUb/vlu2sxZ7d23yznrgnbXYy7KfihT//Q9by3bXsf7sZtmzZdm/jhRf/+edy57cLHuuLPvdSPHDr9e7ZY+XZbvPR+08k3SgFjOtZ6fmZu56FCoAAAAAAAAAAAAAAAAAAAB8WH2piD+LFP97cyWW87T/vP5/dwX+Wrfsm9/sWe9/m9vVOv+D1fr/99r+KOv/Dz60ngIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwOGRoog3IsX8lfW02l++7hi43J69dXtiZHTnasdSVfNIVb78GXju7LnzX3p++EI3P7j+w/ZkvDp+9VL9pbmb8wutxcXWdH1itj01N9164CPstv7m0HUMVQNQv/narenr1xfrZ589t+Xt24Pv9T92cvDi8NOnn+qWnRgZHR3vKVPr+xCf/qEat+loFPFXkeKZ7/0k/Ut/RBG7H4v7fHf22rGqE0NVJyZGRquOzLSbs0vlm2PdgSgi6j2VGt0x2odzsSuNiOWy+WWDh8rujc83F5rXZlr1sebCUnupPTc7ljqtLftTjyIupIiViFjrv/twfVHEa5HiOyfW07/2RxzpjsMXr4x/9czZe7ej2MM+PoCynfW+iJXiEJyzA6w/ivinSPHTt0/Fv/VH1KLzE1+IeKXMH0S8WeaLEan8YpyPeHeH7xGHUy2K+P/y/F9cT2/3l9eD7nXl8tfqX5m9PtdTtntdOfT3h/10wK9NA1HED6sr/nr6d/9dAwAAAAAAAAAAAAAAABwgRfxqpHjhnVOpmh98Z05xe/ZG/Wrz2kxnWl937l93zvTGxsZGPXWykXMy53LOlZyrOddyRpHr52zknMy5nHMl52rOtZxxJNfP2cg5mXM550rO1ZxrOaOW6+ds5JzMuZxzJedqzrWccUDm7gEAAAAAAAAAAAAAAAAAAB8vRfVPim9/Yz1t9HfWl56MTq5aD/Rj7+cBAAD//1vO/Qs=") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x6210, 0x0) mount(&(0x7f0000000040)=@filename='./file0/bus\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='befs\x00', 0x0, 0x0) 07:14:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) open(0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) 07:14:24 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000001800)={@link_local, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @dev, @loopback, @local, @broadcast}}}}, 0x0) 07:14:24 executing program 0: mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(0x0, 0x0, 0x18) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10120, 0x2, 0x0) dup2(r1, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46900) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getrlimit(0x0, &(0x7f0000000140)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4, 0x100010, 0xffffffffffffffff, 0xa7fb1000) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)=0x5) ftruncate(r3, 0x800) lseek(r3, 0x20400, 0x0) r5 = open(&(0x7f0000000240)='./bus\x00', 0x80, 0xc8) sendfile(r3, r5, 0x0, 0x80001d00c0d0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r3, 0x3) [ 70.327029][ T5390] loop4: detected capacity change from 0 to 2048 [ 70.334636][ T5390] ======================================================= [ 70.334636][ T5390] WARNING: The mand mount option has been deprecated and [ 70.334636][ T5390] and is ignored by this kernel. Remove the mand [ 70.334636][ T5390] option from the mount to silence this warning. [ 70.334636][ T5390] ======================================================= 07:14:24 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000001800)={@link_local, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @dev, @loopback, @local, @broadcast}}}}, 0x0) 07:14:24 executing program 3: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES(r0, 0x3ba0, &(0x7f00000000c0)={0x38, 0x9}) 07:14:24 executing program 1: arch_prctl$ARCH_REQ_XCOMP_PERM(0x1023, 0xc) ioctl$HIDIOCGRDESC(0xffffffffffffffff, 0x90044802, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000600)=""/12) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000640)=""/21) r1 = pidfd_getfd(r0, r0, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000780)={&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000006c0)=""/155, 0x9b}) readahead(r1, 0x0, 0x0) readahead(r0, 0x6, 0x0) r2 = pidfd_getfd(r0, r1, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}}, 0x80) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, 0x0, 0x300, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000a00)={0x6e, "08e59a9599806560ee1db68e869fb41b5df23e0cfa6e584ecc2ea7fc5f33ff766808a897fcf7b9e910c626b6d45a0e45b98c47e911f7dc0a0ffae483e6ab5411"}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000ac0)={&(0x7f0000000a80)=[0x0, 0x0], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000001000)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000b40)={0x460, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x10c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd24}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x268e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff9351}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x485}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffd67}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x1a8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6068}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "60a0c2dcc479c13d5eaf0f6d1407ccc24646536b"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "db54d8f5bb91d6e6dd89095206cb1e09927dcea70d93ecb15e036471b6db"}}, @TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "362232db039dd2c6f740ece27ed83ee6abbabd382c4daec8fadfaf8758553fb8d4d825ff"}}, @TIPC_NLA_NODE_ID={0xa8, 0x3, "8ac14577dc68ef0cb12a1e19cd14abe183e9b504d1262c67dd0affcc25ebd997f37fcfacee9080a125b873de65d1248f24bd1861908a0a17328dde03846e1eb2a466f823e616cbd797d2c16e35fa16e1bf415c470defa0e906b2fb7c40c38abe849bcb5bd3083d2da46b6d0cecc2fc66bca85a9656ea1b8e1a33e7e17c1ef7c1936a63426f876e3fc2b089aeb7c6711ac391a3b2b47f611e984830befcef8596f19dacaf"}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x9}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x401}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x6}]}, @TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x76f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xba}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x49f3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff8001}]}]}, 0x460}, 0x1, 0x0, 0x0, 0x24004005}, 0x0) getpid() syz_clone3(&(0x7f0000002340)={0x40081000, &(0x7f00000021c0), &(0x7f0000002200), &(0x7f0000002240), {0x30}, &(0x7f0000002280)=""/1, 0x1, &(0x7f00000022c0)=""/38, 0x0, 0x0, {r1}}, 0x58) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002400)='./cgroup/syz1\x00', 0x200002, 0x0) [ 70.397993][ T5390] UDF-fs: error (device loop4): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d [ 70.431015][ T5390] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 70.440083][ T5397] wireguard0: entered promiscuous mode 07:14:24 executing program 3: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES(r0, 0x3ba0, &(0x7f00000000c0)={0x38, 0x9}) 07:14:24 executing program 2: mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(0x0, 0x0, 0x18) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10120, 0x2, 0x0) dup2(r1, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46900) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getrlimit(0x0, &(0x7f0000000140)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4, 0x100010, 0xffffffffffffffff, 0xa7fb1000) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)=0x5) ftruncate(r3, 0x800) lseek(r3, 0x20400, 0x0) r5 = open(&(0x7f0000000240)='./bus\x00', 0x80, 0xc8) sendfile(r3, r5, 0x0, 0x80001d00c0d0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r3, 0x3) [ 70.445654][ T5397] wireguard0: entered allmulticast mode 07:14:24 executing program 4: syz_mount_image$udf(&(0x7f00000000c0), &(0x7f00000007c0)='./file0\x00', 0x14444, &(0x7f0000000240)={[{@iocharset={'iocharset', 0x3d, 'cp949'}}, {@shortad}, {@rootdir={'rootdir', 0x3d, 0x7}}, {@gid_forget}, {@gid_ignore}, {@gid}, {@noadinicb}, {@shortad}]}, 0xfe, 0xc17, &(0x7f0000002440)="$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") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x6210, 0x0) mount(&(0x7f0000000040)=@filename='./file0/bus\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='befs\x00', 0x0, 0x0) 07:14:24 executing program 3: syz_mount_image$udf(&(0x7f00000000c0), &(0x7f00000007c0)='./file0\x00', 0x14444, &(0x7f0000000240)={[{@iocharset={'iocharset', 0x3d, 'cp949'}}, {@shortad}, {@rootdir={'rootdir', 0x3d, 0x7}}, {@gid_forget}, {@gid_ignore}, {@gid}, {@noadinicb}, {@shortad}]}, 0xfe, 0xc17, &(0x7f0000002440)="$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") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x6210, 0x0) mount(&(0x7f0000000040)=@filename='./file0/bus\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='befs\x00', 0x0, 0x0) [ 70.592496][ T27] audit: type=1804 audit(1693293264.493:10): pid=5411 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3623757620/syzkaller.TMVy88/11/bus" dev="sda1" ino=1968 res=1 errno=0 [ 70.887231][ T1226] ieee802154 phy0 wpan0: encryption failed: -22 07:14:25 executing program 0: mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(0x0, 0x0, 0x18) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10120, 0x2, 0x0) dup2(r1, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46900) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getrlimit(0x0, &(0x7f0000000140)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4, 0x100010, 0xffffffffffffffff, 0xa7fb1000) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)=0x5) ftruncate(r3, 0x800) lseek(r3, 0x20400, 0x0) r5 = open(&(0x7f0000000240)='./bus\x00', 0x80, 0xc8) sendfile(r3, r5, 0x0, 0x80001d00c0d0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r3, 0x3) [ 71.381934][ T1226] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.398322][ T7] cfg80211: failed to load regulatory.db 07:14:25 executing program 2: mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(0x0, 0x0, 0x18) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10120, 0x2, 0x0) dup2(r1, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46900) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getrlimit(0x0, &(0x7f0000000140)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4, 0x100010, 0xffffffffffffffff, 0xa7fb1000) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)=0x5) ftruncate(r3, 0x800) lseek(r3, 0x20400, 0x0) r5 = open(&(0x7f0000000240)='./bus\x00', 0x80, 0xc8) sendfile(r3, r5, 0x0, 0x80001d00c0d0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r3, 0x3) [ 71.480572][ T27] audit: type=1804 audit(1693293264.823:11): pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir1979453897/syzkaller.vKTIcx/19/bus" dev="sda1" ino=1960 res=1 errno=0 [ 71.521162][ T5419] loop3: detected capacity change from 0 to 2048 [ 71.535503][ T5419] UDF-fs: error (device loop3): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d [ 71.550014][ T5419] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 07:14:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) open(0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) 07:14:26 executing program 2: mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(0x0, 0x0, 0x18) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10120, 0x2, 0x0) dup2(r1, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46900) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getrlimit(0x0, &(0x7f0000000140)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4, 0x100010, 0xffffffffffffffff, 0xa7fb1000) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)=0x5) ftruncate(r3, 0x800) lseek(r3, 0x20400, 0x0) r5 = open(&(0x7f0000000240)='./bus\x00', 0x80, 0xc8) sendfile(r3, r5, 0x0, 0x80001d00c0d0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r3, 0x3) 07:14:26 executing program 0: mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(0x0, 0x0, 0x18) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10120, 0x2, 0x0) dup2(r1, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46900) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getrlimit(0x0, &(0x7f0000000140)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4, 0x100010, 0xffffffffffffffff, 0xa7fb1000) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)=0x5) ftruncate(r3, 0x800) lseek(r3, 0x20400, 0x0) r5 = open(&(0x7f0000000240)='./bus\x00', 0x80, 0xc8) sendfile(r3, r5, 0x0, 0x80001d00c0d0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r3, 0x3) [ 72.540115][ T27] audit: type=1804 audit(1693293265.983:12): pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3623757620/syzkaller.TMVy88/12/bus" dev="sda1" ino=1972 res=1 errno=0 [ 72.574378][ T5425] loop4: detected capacity change from 0 to 2048 07:14:26 executing program 3: syz_mount_image$udf(&(0x7f00000000c0), &(0x7f00000007c0)='./file0\x00', 0x14444, &(0x7f0000000240)={[{@iocharset={'iocharset', 0x3d, 'cp949'}}, {@shortad}, {@rootdir={'rootdir', 0x3d, 0x7}}, {@gid_forget}, {@gid_ignore}, {@gid}, {@noadinicb}, {@shortad}]}, 0xfe, 0xc17, &(0x7f0000002440)="$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") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x6210, 0x0) mount(&(0x7f0000000040)=@filename='./file0/bus\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='befs\x00', 0x0, 0x0) [ 72.580741][ T27] audit: type=1804 audit(1693293265.983:13): pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir1979453897/syzkaller.vKTIcx/20/bus" dev="sda1" ino=1973 res=1 errno=0 [ 72.648215][ T5425] UDF-fs: error (device loop4): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d [ 73.174273][ T27] audit: type=1804 audit(1693293267.103:14): pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir1979453897/syzkaller.vKTIcx/21/bus" dev="sda1" ino=1959 res=1 errno=0 07:14:27 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) open(0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) [ 73.560981][ T5438] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 73.616483][ T27] audit: type=1804 audit(1693293267.113:15): pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3623757620/syzkaller.TMVy88/13/bus" dev="sda1" ino=1972 res=1 errno=0 [ 73.640480][ T5425] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 73.660256][ T5448] loop3: detected capacity change from 0 to 2048 [ 73.674031][ T5449] wireguard0: entered promiscuous mode [ 73.680006][ T5449] wireguard0: entered allmulticast mode [ 73.698478][ T5448] UDF-fs: error (device loop3): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d [ 73.711091][ T5448] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 07:14:28 executing program 1: arch_prctl$ARCH_REQ_XCOMP_PERM(0x1023, 0xc) ioctl$HIDIOCGRDESC(0xffffffffffffffff, 0x90044802, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000600)=""/12) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000640)=""/21) r1 = pidfd_getfd(r0, r0, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000780)={&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000006c0)=""/155, 0x9b}) readahead(r1, 0x0, 0x0) readahead(r0, 0x6, 0x0) r2 = pidfd_getfd(r0, r1, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}}, 0x80) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, 0x0, 0x300, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000a00)={0x6e, "08e59a9599806560ee1db68e869fb41b5df23e0cfa6e584ecc2ea7fc5f33ff766808a897fcf7b9e910c626b6d45a0e45b98c47e911f7dc0a0ffae483e6ab5411"}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000ac0)={&(0x7f0000000a80)=[0x0, 0x0], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000001000)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000b40)={0x460, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x10c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd24}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x268e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff9351}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x485}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffd67}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x1a8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6068}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "60a0c2dcc479c13d5eaf0f6d1407ccc24646536b"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "db54d8f5bb91d6e6dd89095206cb1e09927dcea70d93ecb15e036471b6db"}}, @TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "362232db039dd2c6f740ece27ed83ee6abbabd382c4daec8fadfaf8758553fb8d4d825ff"}}, @TIPC_NLA_NODE_ID={0xa8, 0x3, "8ac14577dc68ef0cb12a1e19cd14abe183e9b504d1262c67dd0affcc25ebd997f37fcfacee9080a125b873de65d1248f24bd1861908a0a17328dde03846e1eb2a466f823e616cbd797d2c16e35fa16e1bf415c470defa0e906b2fb7c40c38abe849bcb5bd3083d2da46b6d0cecc2fc66bca85a9656ea1b8e1a33e7e17c1ef7c1936a63426f876e3fc2b089aeb7c6711ac391a3b2b47f611e984830befcef8596f19dacaf"}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x9}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x401}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x6}]}, @TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x76f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xba}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x49f3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff8001}]}]}, 0x460}, 0x1, 0x0, 0x0, 0x24004005}, 0x0) getpid() syz_clone3(&(0x7f0000002340)={0x40081000, &(0x7f00000021c0), &(0x7f0000002200), &(0x7f0000002240), {0x30}, &(0x7f0000002280)=""/1, 0x1, &(0x7f00000022c0)=""/38, 0x0, 0x0, {r1}}, 0x58) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002400)='./cgroup/syz1\x00', 0x200002, 0x0) 07:14:28 executing program 0: syz_mount_image$udf(&(0x7f00000000c0), &(0x7f00000007c0)='./file0\x00', 0x14444, &(0x7f0000000240)={[{@iocharset={'iocharset', 0x3d, 'cp949'}}, {@shortad}, {@rootdir={'rootdir', 0x3d, 0x7}}, {@gid_forget}, {@gid_ignore}, {@gid}, {@noadinicb}, {@shortad}]}, 0xfe, 0xc17, &(0x7f0000002440)="$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") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x6210, 0x0) mount(&(0x7f0000000040)=@filename='./file0/bus\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='befs\x00', 0x0, 0x0) 07:14:28 executing program 2: syz_mount_image$udf(&(0x7f00000000c0), &(0x7f00000007c0)='./file0\x00', 0x14444, &(0x7f0000000240)={[{@iocharset={'iocharset', 0x3d, 'cp949'}}, {@shortad}, {@rootdir={'rootdir', 0x3d, 0x7}}, {@gid_forget}, {@gid_ignore}, {@gid}, {@noadinicb}, {@shortad}]}, 0xfe, 0xc17, &(0x7f0000002440)="$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