Warning: Permanently added '10.128.0.125' (ECDSA) to the list of known hosts. 2020/02/09 23:28:41 fuzzer started 2020/02/09 23:28:43 dialing manager at 10.128.0.105:36345 2020/02/09 23:28:43 syscalls: 2904 2020/02/09 23:28:43 code coverage: enabled 2020/02/09 23:28:43 comparison tracing: enabled 2020/02/09 23:28:43 extra coverage: enabled 2020/02/09 23:28:43 setuid sandbox: enabled 2020/02/09 23:28:43 namespace sandbox: enabled 2020/02/09 23:28:43 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/09 23:28:43 fault injection: enabled 2020/02/09 23:28:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/09 23:28:43 net packet injection: enabled 2020/02/09 23:28:43 net device setup: enabled 2020/02/09 23:28:43 concurrency sanitizer: enabled 2020/02/09 23:28:43 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/02/09 23:28:47 adding functions to KCSAN blacklist: 'wbt_done' 'xas_find_marked' 'do_nanosleep' 'wbt_wait' 'copy_process' 'kauditd_thread' 'do_exit' 'do_syslog' 'ext4_free_inodes_count' 'tick_do_update_jiffies64' 'tomoyo_supervisor' 'find_get_pages_range_tag' '__ext4_new_inode' 'generic_fillattr' 'ktime_get_real_seconds' '__rb_insert_augmented' 'generic_write_end' 'ext4_free_inode' 'tick_sched_do_timer' 'xas_clear_mark' 'audit_log_start' 'ext4_nonda_switch' 'tick_nohz_idle_stop_tick' 'ext4_has_free_clusters' 'mod_timer' 'blk_mq_get_request' 'dd_has_work' 'run_timer_softirq' 'taskstats_exit' 'ep_poll' 'ext4_da_write_end' 'atime_needs_update' 23:30:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 23:30:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e003f0000007e5bc5795e8064", 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 154.215028][ T7996] IPVS: ftp: loaded support on port[0] = 21 [ 154.345465][ T7996] chnl_net:caif_netlink_parms(): no params data found [ 154.399413][ T7999] IPVS: ftp: loaded support on port[0] = 21 23:30:21 executing program 2: r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x7b, 0x0}, 0x0) accept4$packet(r1, 0x0, 0x0, 0x0) [ 154.469768][ T7996] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.477276][ T7996] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.485416][ T7996] device bridge_slave_0 entered promiscuous mode [ 154.518801][ T7996] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.526992][ T7996] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.550624][ T7996] device bridge_slave_1 entered promiscuous mode [ 154.578892][ T7999] chnl_net:caif_netlink_parms(): no params data found [ 154.597422][ T7996] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 154.643129][ T7996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 154.671280][ T7996] team0: Port device team_slave_0 added [ 154.678070][ T7996] team0: Port device team_slave_1 added [ 154.680943][ T8005] IPVS: ftp: loaded support on port[0] = 21 [ 154.728856][ T7996] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 154.750149][ T7996] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 154.780801][ T7996] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 154.792257][ T7999] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.799310][ T7999] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.807101][ T7999] device bridge_slave_0 entered promiscuous mode [ 154.816116][ T7999] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.823248][ T7999] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.831112][ T7999] device bridge_slave_1 entered promiscuous mode [ 154.837966][ T7996] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 154.850245][ T7996] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 154.876577][ T7996] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 154.897461][ T7999] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 154.908390][ T7999] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:30:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bond_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) [ 154.943345][ T7999] team0: Port device team_slave_0 added [ 155.031965][ T7996] device hsr_slave_0 entered promiscuous mode [ 155.060278][ T7996] device hsr_slave_1 entered promiscuous mode [ 155.111238][ T7999] team0: Port device team_slave_1 added [ 155.166799][ T7999] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 155.190391][ T7999] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 23:30:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="080db5015e0bcfe8678071") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='geneve1\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000044a, 0x0) [ 155.217012][ T7999] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 155.239734][ T8010] IPVS: ftp: loaded support on port[0] = 21 [ 155.253358][ T8005] chnl_net:caif_netlink_parms(): no params data found [ 155.270331][ T7999] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 155.277475][ T7999] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 155.305114][ T7999] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 155.441927][ T7999] device hsr_slave_0 entered promiscuous mode 23:30:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000240)={'vlan0\x00', @link_local}) [ 155.490355][ T7999] device hsr_slave_1 entered promiscuous mode [ 155.550137][ T7999] debugfs: Directory 'hsr0' with parent '/' already present! [ 155.583713][ T8013] IPVS: ftp: loaded support on port[0] = 21 [ 155.620286][ T8005] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.627531][ T8005] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.635605][ T8005] device bridge_slave_0 entered promiscuous mode [ 155.644861][ T8005] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.652212][ T8005] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.659925][ T8005] device bridge_slave_1 entered promiscuous mode [ 155.706464][ T8010] chnl_net:caif_netlink_parms(): no params data found [ 155.727701][ T8005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.740692][ T8005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 155.754238][ T8017] IPVS: ftp: loaded support on port[0] = 21 [ 155.759939][ T7996] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 155.796531][ T7996] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 155.855922][ T7996] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 155.913898][ T7996] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 155.985633][ T8005] team0: Port device team_slave_0 added [ 156.007599][ T8005] team0: Port device team_slave_1 added [ 156.042351][ T8005] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 156.049340][ T8005] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.079933][ T8005] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 156.098802][ T7999] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 156.152197][ T8005] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 156.159183][ T8005] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.185502][ T8005] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 156.212032][ T7999] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 156.252882][ T7999] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 156.302949][ T7999] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 156.389093][ T8010] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.396264][ T8010] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.404138][ T8010] device bridge_slave_0 entered promiscuous mode [ 156.433656][ T8010] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.440988][ T8010] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.448619][ T8010] device bridge_slave_1 entered promiscuous mode [ 156.512106][ T8005] device hsr_slave_0 entered promiscuous mode [ 156.560621][ T8005] device hsr_slave_1 entered promiscuous mode [ 156.630438][ T8005] debugfs: Directory 'hsr0' with parent '/' already present! [ 156.637966][ T8017] chnl_net:caif_netlink_parms(): no params data found [ 156.660902][ T8013] chnl_net:caif_netlink_parms(): no params data found [ 156.695050][ T8010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.717424][ T8010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.767270][ T8010] team0: Port device team_slave_0 added [ 156.779988][ T8017] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.787603][ T8017] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.795528][ T8017] device bridge_slave_0 entered promiscuous mode [ 156.802998][ T8017] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.810332][ T8017] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.818314][ T8017] device bridge_slave_1 entered promiscuous mode [ 156.825957][ T8010] team0: Port device team_slave_1 added [ 156.838543][ T8013] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.845776][ T8013] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.853617][ T8013] device bridge_slave_0 entered promiscuous mode [ 156.874661][ T7996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.891697][ T8013] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.898777][ T8013] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.911297][ T8013] device bridge_slave_1 entered promiscuous mode [ 156.928799][ T8013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.942904][ T7996] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.975797][ T7999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.983372][ T8010] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 156.990764][ T8010] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.017081][ T8010] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 157.029474][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.037404][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.045462][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.054455][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.063191][ T3088] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.070541][ T3088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.078475][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.087607][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.096125][ T3088] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.103320][ T3088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.111345][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.120571][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.130850][ T8013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 157.141369][ T8017] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 157.151271][ T8005] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 157.192128][ T8010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 157.199154][ T8010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.225103][ T8010] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 157.245838][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.255114][ T8017] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 157.269017][ T7999] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.276419][ T8005] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 157.342803][ T8005] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 157.383702][ T8013] team0: Port device team_slave_0 added [ 157.393277][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.401294][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.408887][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.417695][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.427306][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.435916][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.449649][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.461163][ T8005] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 157.512455][ T8013] team0: Port device team_slave_1 added [ 157.562166][ T8010] device hsr_slave_0 entered promiscuous mode [ 157.600541][ T8010] device hsr_slave_1 entered promiscuous mode [ 157.660188][ T8010] debugfs: Directory 'hsr0' with parent '/' already present! [ 157.674264][ T8017] team0: Port device team_slave_0 added [ 157.681026][ T8017] team0: Port device team_slave_1 added [ 157.691635][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.700803][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.709196][ T3088] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.716318][ T3088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.725371][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.749511][ T7996] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 157.760308][ T7996] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 157.780739][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.788933][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.797567][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.805786][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.814263][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.822958][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.831982][ T8008] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.839274][ T8008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.847370][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.856448][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.865526][ T8017] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 157.872493][ T8017] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.898836][ T8017] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 157.911011][ T8017] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 157.917976][ T8017] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.944125][ T8017] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 157.961958][ T8013] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 157.969010][ T8013] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.996722][ T8013] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 158.008864][ T8013] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 158.015939][ T8013] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.042240][ T8013] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 158.102335][ T8017] device hsr_slave_0 entered promiscuous mode [ 158.150534][ T8017] device hsr_slave_1 entered promiscuous mode [ 158.210793][ T8017] debugfs: Directory 'hsr0' with parent '/' already present! [ 158.243039][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.252597][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.263668][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.272793][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.281478][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.289862][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.298166][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.306613][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.315234][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.323842][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.342975][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 158.350495][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 158.411854][ T8013] device hsr_slave_0 entered promiscuous mode [ 158.440560][ T8013] device hsr_slave_1 entered promiscuous mode [ 158.490204][ T8013] debugfs: Directory 'hsr0' with parent '/' already present! [ 158.509258][ T7996] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.583534][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 158.592456][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.636420][ T8005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.648979][ T8010] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 158.702962][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 158.710642][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 158.719036][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.726840][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.736738][ T7996] device veth0_vlan entered promiscuous mode [ 158.747151][ T7999] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.756244][ T8010] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 158.811982][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.820462][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.829041][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.837014][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.848589][ T8005] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.863114][ T8010] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 158.914089][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.922931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.931348][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.938412][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.946468][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.955158][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.963591][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.970630][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.978669][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.999399][ T8010] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 159.052648][ T8017] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 159.095252][ T7996] device veth1_vlan entered promiscuous mode [ 159.104135][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 159.112527][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.121646][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.135371][ T8017] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 159.175680][ T8013] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 159.232703][ T8013] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 159.292136][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.301436][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.310445][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 159.333716][ T8017] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 159.390778][ T8013] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 159.428097][ T8013] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 159.471917][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 159.482387][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.491162][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.500893][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.509691][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.519231][ T8017] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 159.556669][ T7999] device veth0_vlan entered promiscuous mode [ 159.565867][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 159.576079][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.585089][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 159.594316][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 159.607063][ T7999] device veth1_vlan entered promiscuous mode [ 159.623062][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.631120][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.639102][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.648487][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.656999][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.666347][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.686283][ T7996] device veth0_macvtap entered promiscuous mode [ 159.703408][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.715192][ T7996] device veth1_macvtap entered promiscuous mode [ 159.726020][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 159.734304][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 159.743023][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 159.766828][ T7999] device veth0_macvtap entered promiscuous mode [ 159.785131][ T8005] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.794578][ T7999] device veth1_macvtap entered promiscuous mode [ 159.806103][ T7996] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 159.814286][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 159.823127][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 159.831400][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 159.838889][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 159.846827][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.855483][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.880211][ T7999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 159.891279][ T7999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.902603][ T7999] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 159.912453][ T7996] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 159.930391][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.939401][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.950916][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.959904][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.968925][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.977536][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.987531][ T7999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.998890][ T7999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.010430][ T7999] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 160.024519][ T8010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.037258][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 160.046019][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.095797][ T8010] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.103890][ T8005] device veth0_vlan entered promiscuous mode [ 160.116288][ T8013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.124670][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 160.133282][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.142580][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.152320][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.161652][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.169444][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.182752][ T8005] device veth1_vlan entered promiscuous mode [ 160.195828][ T8017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.223778][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 160.232480][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 160.244246][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.252886][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.261335][ T3088] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.268365][ T3088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.276509][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.285381][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.293930][ T3088] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.301056][ T3088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.309072][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.317681][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.326551][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.335399][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.345784][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.354147][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.366649][ T8013] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.378003][ T8017] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.388997][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.397384][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.405476][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.414967][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.426125][ T8005] device veth0_macvtap entered promiscuous mode [ 160.440496][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 160.449598][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 160.473585][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.485468][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.493990][ T8008] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.501078][ T8008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.509365][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.518109][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.526593][ T8008] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.534340][ T8008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.542982][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 160.551210][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.559630][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.574535][ T8005] device veth1_macvtap entered promiscuous mode [ 160.588702][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 160.598038][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.614344][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.623541][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.632893][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.641755][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.648932][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.657168][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.667561][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.676063][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.683131][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.699233][ T8010] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 160.709960][ T8010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 160.732608][ T8005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 160.743460][ T8005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.753623][ T8005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 160.764982][ T8005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.776437][ T8005] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 160.785605][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.793996][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.804852][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.813340][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.821577][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.830448][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.839386][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.848361][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 160.857032][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 160.867096][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 160.888498][ T8017] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 160.901026][ T8017] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 160.913606][ T8005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 160.924324][ T8005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.934313][ T8005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 160.945084][ T8005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.956455][ T8005] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 160.973609][ T8010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.985691][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.995006][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.004363][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.017362][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.033233][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.043553][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.052538][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.061524][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.069911][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.078375][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 161.085971][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 161.093956][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 23:30:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) [ 161.103314][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.162040][ C1] hrtimer: interrupt took 34864 ns [ 161.173264][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.199748][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.231782][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.255177][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.265996][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 23:30:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 23:30:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e003f0000007e5bc5795e8064", 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 161.277658][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.320115][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.328408][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 23:30:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 23:30:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e003f0000007e5bc5795e8064", 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 161.376328][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 161.385611][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.397639][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.406767][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.422482][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.451758][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.490190][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 161.498455][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 23:30:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e003f0000007e5bc5795e8064", 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 161.562394][ T8017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.570512][ T8010] device veth0_vlan entered promiscuous mode [ 161.600710][ T8013] 8021q: adding VLAN 0 to HW filter on device batadv0 23:30:28 executing program 0: syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)='noac,') [ 161.637441][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.649553][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 23:30:28 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x6c}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ea1000/0x4000)=nil, 0x4000}, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 161.697186][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 161.741724][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 161.749334][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 161.770791][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 161.781984][ T8010] device veth1_vlan entered promiscuous mode [ 161.828070][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.837429][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.863773][ T8010] device veth0_macvtap entered promiscuous mode [ 161.885898][ T8010] device veth1_macvtap entered promiscuous mode [ 161.934612][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 161.966872][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.977550][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 161.989351][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.999529][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.010495][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.022156][ T8010] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 162.044662][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 162.053290][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 162.061792][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 162.071432][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.080472][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.089315][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.100811][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.109544][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.127345][ T8013] device veth0_vlan entered promiscuous mode [ 162.137598][ T8013] device veth1_vlan entered promiscuous mode [ 162.146063][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.154662][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.164118][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 162.173594][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.182403][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.206465][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 162.220685][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.230911][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 162.241625][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:30:29 executing program 2: r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x7b, 0x0}, 0x0) accept4$packet(r1, 0x0, 0x0, 0x0) [ 162.251934][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 162.270285][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.287788][ T8010] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 162.313467][ T8017] device veth0_vlan entered promiscuous mode [ 162.322358][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 162.333622][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 162.342458][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.358820][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 162.367992][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 162.377005][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.386599][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.399388][ T8013] device veth0_macvtap entered promiscuous mode [ 162.409309][ T8013] device veth1_macvtap entered promiscuous mode [ 162.422693][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 162.431070][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 162.439026][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.447100][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.462695][ T8017] device veth1_vlan entered promiscuous mode [ 162.474234][ T8013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.484879][ T8013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.495205][ T8013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.505709][ T8013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.515616][ T8013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.526272][ T8013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.536371][ T8013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.547036][ T8013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.558030][ T8013] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 162.572459][ T8013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 162.583456][ T8013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.593889][ T8013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 162.605139][ T8013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.616904][ T8013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 162.627887][ T8013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.638436][ T8013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 162.649507][ T8013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.661250][ T8013] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 162.668699][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 162.677280][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 162.685712][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 162.694763][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.703971][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 162.712805][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.746606][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 162.755334][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 162.766397][ T8017] device veth0_macvtap entered promiscuous mode [ 162.780675][ T8017] device veth1_macvtap entered promiscuous mode [ 162.805111][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.815767][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.826051][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.836721][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.846615][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.857085][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.867299][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.877840][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.887688][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.898163][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.909560][ T8017] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 162.925151][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 162.933625][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 162.942422][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 162.951303][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.971231][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 162.985430][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.995832][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 163.010746][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.023878][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 163.034804][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.044664][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 163.055081][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.065473][ T8017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 163.075916][ T8017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.086881][ T8017] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 163.099123][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 23:30:29 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x6c}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ea1000/0x4000)=nil, 0x4000}, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 163.114128][ T8027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:30:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="080db5015e0bcfe8678071") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='geneve1\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000044a, 0x0) 23:30:30 executing program 0: syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)='noac,') 23:30:30 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x6c}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ea1000/0x4000)=nil, 0x4000}, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 23:30:30 executing program 2: r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x7b, 0x0}, 0x0) accept4$packet(r1, 0x0, 0x0, 0x0) 23:30:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000240)={'vlan0\x00', @link_local}) 23:30:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000240)={'vlan0\x00', @link_local}) 23:30:30 executing program 2: r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x7b, 0x0}, 0x0) accept4$packet(r1, 0x0, 0x0, 0x0) 23:30:30 executing program 0: syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)='noac,') 23:30:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'geneve1\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="e3030e0040063e0000000200c52c", 0xe, 0x0, 0x0, 0x0) 23:30:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000240)={'vlan0\x00', @link_local}) 23:30:30 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x6c}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ea1000/0x4000)=nil, 0x4000}, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 23:30:30 executing program 0: syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)='noac,') 23:30:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="080db5015e0bcfe8678071") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='geneve1\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000044a, 0x0) 23:30:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 23:30:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'geneve1\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="e3030e0040063e0000000200c52c", 0xe, 0x0, 0x0, 0x0) 23:30:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) shutdown(r1, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) close(r0) removexattr(0x0, &(0x7f0000000140)=@random={'system.', 'nr0\x01\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)="179ce204d57dbb28be12048a8d80c95150c85ad7a74ab8e6dd837713d4c05188f689ee75a3d11b63d21d379e68e9753eb6302b93d14e4faf897d43ed3d90cddc4b", 0x41, 0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:30:31 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x6c}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ea1000/0x4000)=nil, 0x4000}, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 23:30:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 23:30:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) shutdown(r1, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) close(r0) removexattr(0x0, &(0x7f0000000140)=@random={'system.', 'nr0\x01\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)="179ce204d57dbb28be12048a8d80c95150c85ad7a74ab8e6dd837713d4c05188f689ee75a3d11b63d21d379e68e9753eb6302b93d14e4faf897d43ed3d90cddc4b", 0x41, 0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:30:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'geneve1\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="e3030e0040063e0000000200c52c", 0xe, 0x0, 0x0, 0x0) 23:30:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 23:30:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) shutdown(r1, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) close(r0) removexattr(0x0, &(0x7f0000000140)=@random={'system.', 'nr0\x01\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)="179ce204d57dbb28be12048a8d80c95150c85ad7a74ab8e6dd837713d4c05188f689ee75a3d11b63d21d379e68e9753eb6302b93d14e4faf897d43ed3d90cddc4b", 0x41, 0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:30:31 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x6c}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ea1000/0x4000)=nil, 0x4000}, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 23:30:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 23:30:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="080db5015e0bcfe8678071") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='geneve1\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000044a, 0x0) 23:30:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'geneve1\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="e3030e0040063e0000000200c52c", 0xe, 0x0, 0x0, 0x0) 23:30:32 executing program 5: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) shutdown(r1, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) close(r0) removexattr(0x0, &(0x7f0000000140)=@random={'system.', 'nr0\x01\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)="179ce204d57dbb28be12048a8d80c95150c85ad7a74ab8e6dd837713d4c05188f689ee75a3d11b63d21d379e68e9753eb6302b93d14e4faf897d43ed3d90cddc4b", 0x41, 0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:30:32 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x6c}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ea1000/0x4000)=nil, 0x4000}, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 23:30:32 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000440)=0x7, 0x1009d) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 23:30:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x200040, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_mount_image$exfat(&(0x7f0000000040)='exfat\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c06"]) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0xc0, 0x0, 0x20, 0x70bd27, 0x25dfdc02, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5e}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0xc0c1}, 0x4000045) [ 166.213298][ T8293] [EXFAT] Unrecognized mount option 0x0000000000000000 or missing value 23:30:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000440)=0x7, 0x1009d) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) [ 166.290535][ T8297] [EXFAT] Unrecognized mount option 0x0000000000000000 or missing value 23:30:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000440)=0x7, 0x1009d) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 23:30:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x200040, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_mount_image$exfat(&(0x7f0000000040)='exfat\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c06"]) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0xc0, 0x0, 0x20, 0x70bd27, 0x25dfdc02, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5e}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0xc0c1}, 0x4000045) [ 166.658031][ T8309] [EXFAT] Unrecognized mount option 0x0000000000000000 or missing value 23:30:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x200040, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_mount_image$exfat(&(0x7f0000000040)='exfat\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c06"]) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0xc0, 0x0, 0x20, 0x70bd27, 0x25dfdc02, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5e}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0xc0c1}, 0x4000045) [ 166.887478][ T8318] [EXFAT] Unrecognized mount option 0x0000000000000000 or missing value 23:30:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000440)=0x7, 0x1009d) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 23:30:33 executing program 5: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:33 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000440)=0x7, 0x1009d) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 23:30:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x200040, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_mount_image$exfat(&(0x7f0000000040)='exfat\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c06"]) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0xc0, 0x0, 0x20, 0x70bd27, 0x25dfdc02, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5e}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0xc0c1}, 0x4000045) 23:30:34 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) [ 167.366287][ T8330] [EXFAT] Unrecognized mount option 0x0000000000000000 or missing value 23:30:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000440)=0x7, 0x1009d) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 23:30:34 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="674466980000000000000080000000006517a42ac4cb7a63d1a904000000524e892eac4023b714a3202f99f16d06589e03469637a7267592938766010a35efd21affe2009efdc31a3815f3566eff94440aa13392547e2237d368c15d6c9b9eccb6f006953a5bbc205450d1c9eb60e4cb77ddfba6049d5fede36337de8a827d6a77dd374a81456c1ea2aa5dab6d23d2c49af2600db43f0ed0b488b99ddf9d1e1c7ab12f007838b25c30ef5339d0291d5599d3238ec3defaad2d3d16b5c7445566ed70bc9e85b8ba1e747350ea1dc027ab30604b6706d19ee4223357ed7a47edd39cf1c0efb7c7154ebb7eb7fecb08473ef8ece245560f3ead84c370651ee2b9e661c5f8a58b05423148a4f4d795437ed2505fd14ee48cc6a4049eaf2f91f9c721c1912891ef024e8a45452401adbf69a6ddae381ebc69f5f9ce97e13ffceede3aac6feb86e06035532de572f800f6c5f54cb55b17de489c"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:34 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="674466980000000000000080000000006517a42ac4cb7a63d1a904000000524e892eac4023b714a3202f99f16d06589e03469637a7267592938766010a35efd21affe2009efdc31a3815f3566eff94440aa13392547e2237d368c15d6c9b9eccb6f006953a5bbc205450d1c9eb60e4cb77ddfba6049d5fede36337de8a827d6a77dd374a81456c1ea2aa5dab6d23d2c49af2600db43f0ed0b488b99ddf9d1e1c7ab12f007838b25c30ef5339d0291d5599d3238ec3defaad2d3d16b5c7445566ed70bc9e85b8ba1e747350ea1dc027ab30604b6706d19ee4223357ed7a47edd39cf1c0efb7c7154ebb7eb7fecb08473ef8ece245560f3ead84c370651ee2b9e661c5f8a58b05423148a4f4d795437ed2505fd14ee48cc6a4049eaf2f91f9c721c1912891ef024e8a45452401adbf69a6ddae381ebc69f5f9ce97e13ffceede3aac6feb86e06035532de572f800f6c5f54cb55b17de489c"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000440)=0x7, 0x1009d) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 23:30:34 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:35 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:35 executing program 5: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:35 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:35 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:35 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:36 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="674466980000000000000080000000006517a42ac4cb7a63d1a904000000524e892eac4023b714a3202f99f16d06589e03469637a7267592938766010a35efd21affe2009efdc31a3815f3566eff94440aa13392547e2237d368c15d6c9b9eccb6f006953a5bbc205450d1c9eb60e4cb77ddfba6049d5fede36337de8a827d6a77dd374a81456c1ea2aa5dab6d23d2c49af2600db43f0ed0b488b99ddf9d1e1c7ab12f007838b25c30ef5339d0291d5599d3238ec3defaad2d3d16b5c7445566ed70bc9e85b8ba1e747350ea1dc027ab30604b6706d19ee4223357ed7a47edd39cf1c0efb7c7154ebb7eb7fecb08473ef8ece245560f3ead84c370651ee2b9e661c5f8a58b05423148a4f4d795437ed2505fd14ee48cc6a4049eaf2f91f9c721c1912891ef024e8a45452401adbf69a6ddae381ebc69f5f9ce97e13ffceede3aac6feb86e06035532de572f800f6c5f54cb55b17de489c"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:36 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:36 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:36 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:36 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:36 executing program 5: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:37 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:37 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:37 executing program 2: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:37 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:37 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="674466980000000000000080000000006517a42ac4cb7a63d1a904000000524e892eac4023b714a3202f99f16d06589e03469637a7267592938766010a35efd21affe2009efdc31a3815f3566eff94440aa13392547e2237d368c15d6c9b9eccb6f006953a5bbc205450d1c9eb60e4cb77ddfba6049d5fede36337de8a827d6a77dd374a81456c1ea2aa5dab6d23d2c49af2600db43f0ed0b488b99ddf9d1e1c7ab12f007838b25c30ef5339d0291d5599d3238ec3defaad2d3d16b5c7445566ed70bc9e85b8ba1e747350ea1dc027ab30604b6706d19ee4223357ed7a47edd39cf1c0efb7c7154ebb7eb7fecb08473ef8ece245560f3ead84c370651ee2b9e661c5f8a58b05423148a4f4d795437ed2505fd14ee48cc6a4049eaf2f91f9c721c1912891ef024e8a45452401adbf69a6ddae381ebc69f5f9ce97e13ffceede3aac6feb86e06035532de572f800f6c5f54cb55b17de489c"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:38 executing program 1: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:38 executing program 5: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:38 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:38 executing program 0: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:39 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) r2 = syz_open_pts(r0, 0x82681) close(r0) dup2(r1, r2) 23:30:39 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) r2 = syz_open_pts(r0, 0x82681) close(r0) dup2(r1, r2) 23:30:39 executing program 2: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:39 executing program 1: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:39 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) r2 = syz_open_pts(r0, 0x82681) close(r0) dup2(r1, r2) 23:30:39 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="674466980000000000000080000000006517a42ac4cb7a63d1a904000000524e892eac4023b714a3202f99f16d06589e03469637a7267592938766010a35efd21affe2009efdc31a3815f3566eff94440aa13392547e2237d368c15d6c9b9eccb6f006953a5bbc205450d1c9eb60e4cb77ddfba6049d5fede36337de8a827d6a77dd374a81456c1ea2aa5dab6d23d2c49af2600db43f0ed0b488b99ddf9d1e1c7ab12f007838b25c30ef5339d0291d5599d3238ec3defaad2d3d16b5c7445566ed70bc9e85b8ba1e747350ea1dc027ab30604b6706d19ee4223357ed7a47edd39cf1c0efb7c7154ebb7eb7fecb08473ef8ece245560f3ead84c370651ee2b9e661c5f8a58b05423148a4f4d795437ed2505fd14ee48cc6a4049eaf2f91f9c721c1912891ef024e8a45452401adbf69a6ddae381ebc69f5f9ce97e13ffceede3aac6feb86e06035532de572f800f6c5f54cb55b17de489c"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:39 executing program 5: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:40 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) r2 = syz_open_pts(r0, 0x82681) close(r0) dup2(r1, r2) 23:30:40 executing program 0: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:40 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x7, 0x3ff, [0x9, 0x1ff, 0x81, 0x8000, 0x9], 0x7c}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = inotify_init() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)=@v2={0x2, @aes256, 0x6, [], "877f9e611e886056d7657a1504c4e1a0"}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f00000001c0)={0x0, 0x0, [0x12, 0x0, 0x0, 0x85c2, 0x400]}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)) inotify_add_watch(r1, &(0x7f0000000300)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41c000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_pts(0xffffffffffffffff, 0x105400) write$nbd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x4a) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) sendfile(r2, r2, &(0x7f0000000200), 0xa198) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0x8, 0x3f, 0xd163, 0x3ff}) 23:30:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2012}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) dup3(r3, r0, 0x0) 23:30:40 executing program 2: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2012}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) dup3(r3, r0, 0x0) 23:30:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2012}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) dup3(r3, r0, 0x0) 23:30:41 executing program 5: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:41 executing program 1: io_setup(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_vlan\x00', &(0x7f0000000100)=@ethtool_ts_info}) 23:30:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2012}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) dup3(r3, r0, 0x0) [ 174.485045][ T8196] ================================================================== [ 174.493196][ T8196] BUG: KCSAN: data-race in __rb_rotate_set_parents / vm_area_dup [ 174.500912][ T8196] [ 174.503249][ T8196] write to 0xffff88812334c698 of 8 bytes by task 8214 on cpu 0: [ 174.510889][ T8196] __rb_rotate_set_parents+0x5c/0xf0 [ 174.516326][ T8196] __rb_insert_augmented+0x109/0x370 [ 174.521618][ T8196] vma_interval_tree_insert_after+0x14b/0x170 [ 174.527691][ T8196] dup_mm+0x53e/0xba0 [ 174.531678][ T8196] copy_process+0x3539/0x3cd0 [ 174.536356][ T8196] _do_fork+0xfe/0x7a0 [ 174.540438][ T8196] __x64_sys_clone+0x130/0x170 [ 174.545214][ T8196] do_syscall_64+0xcc/0x3a0 [ 174.549731][ T8196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.555639][ T8196] [ 174.558093][ T8196] read to 0xffff88812334c640 of 200 bytes by task 8196 on cpu 1: [ 174.565818][ T8196] vm_area_dup+0x70/0xf0 [ 174.570070][ T8196] dup_mm+0x330/0xba0 [ 174.574066][ T8196] copy_process+0x3539/0x3cd0 [ 174.578747][ T8196] _do_fork+0xfe/0x7a0 [ 174.582826][ T8196] __x64_sys_clone+0x130/0x170 [ 174.587598][ T8196] do_syscall_64+0xcc/0x3a0 [ 174.592115][ T8196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.597995][ T8196] [ 174.600316][ T8196] Reported by Kernel Concurrency Sanitizer on: [ 174.606477][ T8196] CPU: 1 PID: 8196 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 174.614285][ T8196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.624337][ T8196] ================================================================== [ 174.632397][ T8196] Kernel panic - not syncing: panic_on_warn set ... [ 174.638995][ T8196] CPU: 1 PID: 8196 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 174.646911][ T8196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.656995][ T8196] Call Trace: [ 174.660302][ T8196] dump_stack+0x11d/0x181 [ 174.664643][ T8196] panic+0x210/0x640 [ 174.668715][ T8196] ? vprintk_func+0x8d/0x140 [ 174.673322][ T8196] kcsan_report.cold+0xc/0x15 [ 174.678005][ T8196] kcsan_setup_watchpoint+0x2e2/0x380 [ 174.683390][ T8196] __tsan_read_range+0xcd/0x110 [ 174.688254][ T8196] vm_area_dup+0x70/0xf0 [ 174.692497][ T8196] dup_mm+0x330/0xba0 [ 174.696497][ T8196] copy_process+0x3539/0x3cd0 [ 174.701191][ T8196] ? apparmor_file_alloc_security+0x249/0x670 [ 174.707277][ T8196] _do_fork+0xfe/0x7a0 [ 174.711349][ T8196] ? __write_once_size+0x41/0xe0 [ 174.716305][ T8196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.722597][ T8196] ? __fd_install+0x117/0x230 [ 174.727284][ T8196] __x64_sys_clone+0x130/0x170 [ 174.732063][ T8196] do_syscall_64+0xcc/0x3a0 [ 174.736584][ T8196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.742474][ T8196] RIP: 0033:0x7fec90e30f46 [ 174.746900][ T8196] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00 [ 174.766607][ T8196] RSP: 002b:00007ffebe072f30 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 174.775026][ T8196] RAX: ffffffffffffffda RBX: 00007ffebe072f30 RCX: 00007fec90e30f46 [ 174.783088][ T8196] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 174.791086][ T8196] RBP: 00007ffebe072f90 R08: 0000000000002004 R09: 0000000000002004 [ 174.799068][ T8196] R10: 00007fec9174da70 R11: 0000000000000246 R12: 0000000000000000 [ 174.807269][ T8196] R13: 00007ffebe072f50 R14: 0000000000000005 R15: 0000000000000005 [ 174.816614][ T8196] Kernel Offset: disabled [ 174.820939][ T8196] Rebooting in 86400 seconds..