Warning: Permanently added '10.128.1.40' (ECDSA) to the list of known hosts. 2020/07/04 10:41:41 fuzzer started 2020/07/04 10:41:41 dialing manager at 10.128.0.105:45001 2020/07/04 10:41:41 syscalls: 3108 2020/07/04 10:41:41 code coverage: enabled 2020/07/04 10:41:41 comparison tracing: enabled 2020/07/04 10:41:41 extra coverage: enabled 2020/07/04 10:41:41 setuid sandbox: enabled 2020/07/04 10:41:41 namespace sandbox: enabled 2020/07/04 10:41:41 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/04 10:41:41 fault injection: enabled 2020/07/04 10:41:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/04 10:41:41 net packet injection: enabled 2020/07/04 10:41:41 net device setup: enabled 2020/07/04 10:41:41 concurrency sanitizer: enabled 2020/07/04 10:41:41 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/04 10:41:41 USB emulation: enabled 2020/07/04 10:41:45 suppressing KCSAN reports in functions: '__blkdev_get' 'do_signal_stop' 'blk_mq_sched_dispatch_requests' 'generic_write_end' 'ext4_free_inodes_count' 'snd_seq_check_queue' 'filemap_map_pages' '__add_to_page_cache_locked' 'ext4_sync_file' 'do_select' '__writeback_single_inode' 'add_timer_on' '__xa_clear_mark' 'ext4_mb_regular_allocator' 'ext4_mb_good_group' 'wg_packet_decrypt_worker' 'audit_log_start' 'ext4_mark_iloc_dirty' '__d_lookup' '__xa_set_mark' 'lookup_fast' 'pcpu_alloc' '__delayacct_blkio_end' 'dd_has_work' '__blkdev_put' 'xas_clear_mark' 'exit_signals' 'do_syslog' 'wg_packet_send_staged_packets' '__send_signal' 'pcpu_balance_workfn' 'ext4_free_inode' 'exit_mm' 'complete_signal' '__mark_inode_dirty' 'blk_mq_dispatch_rq_list' 'blk_mq_rq_ctx_init' 'tick_sched_timer' 'step_into' 'fifo_open' 'generic_file_buffered_read' 'do_sys_poll' 'n_tty_receive_buf_common' 'page_counter_charge' '__delete_from_page_cache' 'find_get_pages_range_tag' '__ext4_new_inode' '__ext4_update_other_inode_time' 'shmem_unlink' 'lru_add_drain_all' '__mod_timer' '__filemap_fdatawrite_range' 'do_nanosleep' 'do_epoll_wait' 'ext4_writepages' 'alloc_pid' 'expire_timers' 'futex_wait_queue_me' 10:42:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r2 = bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) write$binfmt_misc(r2, 0x0, 0x0) syzkaller login: [ 105.724276][ T8672] IPVS: ftp: loaded support on port[0] = 21 [ 105.782619][ T8672] chnl_net:caif_netlink_parms(): no params data found [ 105.816962][ T8672] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.824175][ T8672] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.831580][ T8672] device bridge_slave_0 entered promiscuous mode [ 105.839238][ T8672] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.846540][ T8672] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.854233][ T8672] device bridge_slave_1 entered promiscuous mode [ 105.868763][ T8672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 10:42:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000240)="48b831000000000000000f23d80f21f835800000800f23f8f00fba3f00b8010000000f01d9450f2080b9800000c00f3235002000000f30460f013ac744240069000000c7442402cb8dfe88ff1c243626660f513f66b839000f00d0b9800000c00f3235002000000f30", 0x69}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$kcm(0xa, 0x0, 0x73) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 105.879128][ T8672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.897555][ T8672] team0: Port device team_slave_0 added [ 105.904781][ T8672] team0: Port device team_slave_1 added [ 105.918283][ T8672] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 105.925392][ T8672] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.951506][ T8672] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 105.963546][ T8672] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 105.970503][ T8672] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.996727][ T8672] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 106.044723][ T8672] device hsr_slave_0 entered promiscuous mode [ 106.063389][ T8672] device hsr_slave_1 entered promiscuous mode 10:42:55 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 106.107601][ T8834] IPVS: ftp: loaded support on port[0] = 21 [ 106.278103][ T8672] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 106.314956][ T8672] netdevsim netdevsim0 netdevsim1: renamed from eth1 10:42:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000c00)=""/4096, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='/dev/nullb0\x00I'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 106.344884][ T8834] chnl_net:caif_netlink_parms(): no params data found [ 106.361254][ T8980] IPVS: ftp: loaded support on port[0] = 21 [ 106.371823][ T8672] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 106.415065][ T8672] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 106.511050][ T8990] IPVS: ftp: loaded support on port[0] = 21 [ 106.536144][ T8672] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.543188][ T8672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.550434][ T8672] bridge0: port 1(bridge_slave_0) entered blocking state 10:42:56 executing program 4: open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200004d1e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x0, 0xffffffff}) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x0, 0xffffffff}) [ 106.557481][ T8672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.582153][ T8834] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.591211][ T8834] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.613322][ T8834] device bridge_slave_0 entered promiscuous mode [ 106.655678][ T8834] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.662714][ T8834] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.670785][ T8834] device bridge_slave_1 entered promiscuous mode [ 106.677623][ T8980] chnl_net:caif_netlink_parms(): no params data found [ 106.723875][ T8834] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 106.778725][ T8834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 106.802185][ T9141] IPVS: ftp: loaded support on port[0] = 21 [ 106.832355][ T8980] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.853019][ T8980] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.860426][ T8980] device bridge_slave_0 entered promiscuous mode 10:42:56 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) connect$tipc(r0, &(0x7f00000004c0)=@id, 0x10) [ 106.877591][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.893806][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.921865][ T8672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.934532][ T8980] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.941582][ T8980] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.952117][ T8980] device bridge_slave_1 entered promiscuous mode [ 106.961904][ T8990] chnl_net:caif_netlink_parms(): no params data found [ 106.984513][ T8834] team0: Port device team_slave_0 added [ 107.002489][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.011489][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.024580][ T8834] team0: Port device team_slave_1 added [ 107.035225][ T8980] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 107.045624][ T8980] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.064840][ T8672] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.079919][ T8980] team0: Port device team_slave_0 added [ 107.093483][ T8834] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 107.100423][ T8834] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 107.126629][ T8834] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 107.140099][ T9283] IPVS: ftp: loaded support on port[0] = 21 [ 107.153405][ T8980] team0: Port device team_slave_1 added [ 107.163798][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.172073][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.180848][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.187881][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.195498][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.204033][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.212213][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.219262][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.226702][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.235299][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.243787][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.251922][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.260559][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.268630][ T8834] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 107.276542][ T8834] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 107.303357][ T8834] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 107.338273][ T8990] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.345552][ T8990] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.352886][ T8990] device bridge_slave_0 entered promiscuous mode [ 107.404638][ T8834] device hsr_slave_0 entered promiscuous mode [ 107.443955][ T8834] device hsr_slave_1 entered promiscuous mode [ 107.483011][ T8834] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 107.490550][ T8834] Cannot create hsr debugfs directory [ 107.501232][ T8980] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 107.508210][ T8980] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 107.534222][ T8980] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 107.546846][ T8980] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 107.554195][ T8980] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 107.581210][ T8980] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 107.592728][ T8990] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.600596][ T8990] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.608078][ T8990] device bridge_slave_1 entered promiscuous mode [ 107.626639][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.635564][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.646143][ T9141] chnl_net:caif_netlink_parms(): no params data found [ 107.659264][ T8990] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 107.687692][ T8672] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 107.699518][ T8672] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 107.710641][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.720523][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.728910][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.737294][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.745574][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.761520][ T8990] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.781567][ T8990] team0: Port device team_slave_0 added [ 107.788700][ T8990] team0: Port device team_slave_1 added [ 107.804754][ T8990] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 107.811702][ T8990] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 107.838161][ T8990] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 107.864395][ T8980] device hsr_slave_0 entered promiscuous mode [ 107.923214][ T8980] device hsr_slave_1 entered promiscuous mode [ 107.972981][ T8980] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 107.980606][ T8980] Cannot create hsr debugfs directory [ 108.003782][ T8990] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 108.010727][ T8990] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 108.037861][ T8990] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 108.070305][ T9141] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.078158][ T9141] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.086346][ T9141] device bridge_slave_0 entered promiscuous mode [ 108.105140][ T8834] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 108.144570][ T9141] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.151595][ T9141] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.159364][ T9141] device bridge_slave_1 entered promiscuous mode [ 108.214217][ T8990] device hsr_slave_0 entered promiscuous mode [ 108.263094][ T8990] device hsr_slave_1 entered promiscuous mode [ 108.323003][ T8990] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 108.330591][ T8990] Cannot create hsr debugfs directory [ 108.336973][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 108.344830][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 108.356752][ T8834] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 108.408256][ T8834] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 108.474994][ T8834] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 108.523767][ T9141] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.545704][ T8672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.555077][ T9141] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 108.581585][ T9283] chnl_net:caif_netlink_parms(): no params data found [ 108.597201][ T9141] team0: Port device team_slave_0 added [ 108.605319][ T9141] team0: Port device team_slave_1 added [ 108.639288][ T9141] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 108.646779][ T9141] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 108.673814][ T9141] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 108.685926][ T9141] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 108.692857][ T9141] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 108.719274][ T9141] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 108.757577][ T8980] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 108.794455][ T9283] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.801470][ T9283] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.809004][ T9283] device bridge_slave_0 entered promiscuous mode [ 108.816801][ T9283] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.824204][ T9283] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.831602][ T9283] device bridge_slave_1 entered promiscuous mode [ 108.847120][ T8990] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 108.915088][ T8980] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 108.955102][ T8980] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 109.011703][ T8990] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 109.064850][ T8990] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 109.114959][ T8980] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 109.145496][ T9283] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 109.204500][ T9141] device hsr_slave_0 entered promiscuous mode [ 109.243141][ T9141] device hsr_slave_1 entered promiscuous mode [ 109.283040][ T9141] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 109.290578][ T9141] Cannot create hsr debugfs directory [ 109.303877][ T8990] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 109.335700][ T9283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 109.344978][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 109.353868][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.374348][ T8672] device veth0_vlan entered promiscuous mode [ 109.408824][ T8834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.416474][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 109.424812][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.433243][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.440865][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.456499][ T8672] device veth1_vlan entered promiscuous mode [ 109.474718][ T9283] team0: Port device team_slave_0 added [ 109.491651][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 109.499922][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 109.509355][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.517253][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.528496][ T8834] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.545167][ T9283] team0: Port device team_slave_1 added [ 109.575860][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.584637][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.593547][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.600561][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.608824][ T9283] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 109.616081][ T9283] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.642532][ T9283] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 109.653553][ T9141] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 109.711721][ T8990] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.722566][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.731493][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.739946][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.748281][ T9028] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.755319][ T9028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.765083][ T9283] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 109.772010][ T9283] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.798422][ T9283] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 109.809411][ T9141] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 109.849674][ T8990] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.867808][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.876715][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.885657][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.893244][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 109.901608][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.911555][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.920033][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.927056][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.935042][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 109.943264][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.951668][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.960136][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.968412][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.975499][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.983527][ T9141] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 110.034946][ T9141] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 110.115544][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.123969][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.132352][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.141826][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.150293][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.159053][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.168347][ T8672] device veth0_macvtap entered promiscuous mode [ 110.214829][ T9283] device hsr_slave_0 entered promiscuous mode [ 110.273179][ T9283] device hsr_slave_1 entered promiscuous mode [ 110.314034][ T9283] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 110.321573][ T9283] Cannot create hsr debugfs directory [ 110.336638][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 110.345224][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.354226][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.362832][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.371564][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.380287][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.388687][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.397148][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.405393][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.413760][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.421863][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.430044][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.441549][ T8834] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 110.453967][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.471448][ T8980] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.481594][ T8672] device veth1_macvtap entered promiscuous mode [ 110.489846][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.498695][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.507029][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.515367][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.534716][ T8990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.553191][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.560651][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.569130][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 110.576573][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 110.606549][ T8980] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.619532][ T8834] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.635215][ T8672] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 110.642706][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 110.652146][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 110.659722][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.670181][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.684567][ T9283] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 110.705333][ T9283] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 110.755437][ T9283] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 110.805770][ T8672] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 110.817308][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.826226][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.834478][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.841523][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.849433][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.859305][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.867776][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.876954][ T9283] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 110.977278][ T8990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.989068][ T9141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.003210][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.011631][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.020273][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.029077][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.037579][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.044687][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.052211][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.060427][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.072043][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.080035][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.093002][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.103056][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.110550][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.121418][ T8834] device veth0_vlan entered promiscuous mode [ 111.195567][ T9141] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.211381][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.221260][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.231031][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.239649][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.246680][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.255969][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.264331][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.272526][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.279560][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.289049][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.303961][ T8834] device veth1_vlan entered promiscuous mode [ 111.361753][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 111.383231][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 111.391070][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.400550][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.409315][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.418239][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.427071][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.436351][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.446961][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.456391][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.465163][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.473937][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.482358][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.490803][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.499088][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.507134][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.521427][ T8834] device veth0_macvtap entered promiscuous mode [ 111.532864][ T8980] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 111.545583][ T8980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.567829][ T9141] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 111.579367][ T9141] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 111.593025][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 111.601209][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 111.609509][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.618032][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.626560][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.638691][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.647315][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.655425][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.663720][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.671796][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.680224][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.688293][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.696679][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 111.704786][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 10:43:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r2 = bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) write$binfmt_misc(r2, 0x0, 0x0) [ 111.712236][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.719985][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.729992][ T8990] device veth0_vlan entered promiscuous mode [ 111.742397][ T8990] device veth1_vlan entered promiscuous mode [ 111.766587][ T8834] device veth1_macvtap entered promiscuous mode [ 111.814869][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 111.822679][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 111.831784][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 111.840267][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 111.848187][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 111.867013][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 111.874755][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 111.888937][ T8834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.899619][ T8834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:43:01 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c6230004904440477c8"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 111.910673][ T8834] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 111.921648][ T8834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 111.932112][ T8834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.952218][ T8834] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 111.975305][ T9141] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 111.993356][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.001758][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.026163][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.034981][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:43:01 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c6230004904440477c8"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 112.074819][ T9940] XFS (nullb0): Invalid superblock magic number [ 112.132915][ C1] hrtimer: interrupt took 16136 ns 10:43:01 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c6230004904440477c8"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 112.156420][ T9283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.168255][ T8980] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.188562][ T8990] device veth0_macvtap entered promiscuous mode [ 112.197689][ T9956] XFS (nullb0): Invalid superblock magic number [ 112.255366][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.273528][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.293531][ T8990] device veth1_macvtap entered promiscuous mode [ 112.306192][ T9283] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.323842][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 112.332102][ T9977] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 112.335262][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 10:43:02 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x44}}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r2, @ANYBLOB="04"], 0x1ec}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 112.354690][ T9969] XFS (nullb0): Invalid superblock magic number [ 112.367839][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.378413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.393677][ T8990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 112.413283][ T8990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.429813][ T8990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 112.443636][ T8990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.460802][ T8990] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 112.484453][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.494205][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.512057][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.520645][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.529123][ T9989] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.0'. [ 112.542207][ T8990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 112.561693][ T8990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.571720][ T8990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 10:43:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$UHID_INPUT(r0, &(0x7f0000000240)={0x8, {"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", 0x1000}}, 0x1006) [ 112.582580][ T8990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.593562][ T8990] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 112.605950][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.615287][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.624579][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.631642][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.639461][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.650646][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 112.659681][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.668037][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.668786][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.684249][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.691755][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.701034][T10002] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.0'. [ 112.717000][ T8980] device veth0_vlan entered promiscuous mode 10:43:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x1e, 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, &(0x7f0000000480)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) [ 112.753989][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.765555][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.782924][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.810273][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.833222][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.840324][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.859812][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.873834][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.899167][ T9141] device veth0_vlan entered promiscuous mode 10:43:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x73badd9a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000001440)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) [ 112.992453][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.002645][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.033261][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.041351][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.052011][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.061215][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.079862][ T9141] device veth1_vlan entered promiscuous mode [ 113.095438][ T8980] device veth1_vlan entered promiscuous mode [ 113.113233][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 113.121244][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 113.132198][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.141590][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.151007][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 113.159061][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.168336][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.182994][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 113.190812][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.199167][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.303538][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.331733][ T8980] device veth0_macvtap entered promiscuous mode [ 113.355583][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 113.365778][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.387535][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.426837][ T8980] device veth1_macvtap entered promiscuous mode [ 113.441625][T10030] XFS (nullb0): Invalid superblock magic number [ 113.462507][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 113.472421][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.481431][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.491896][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.500893][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 113.510398][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 113.519471][ T9141] device veth0_macvtap entered promiscuous mode [ 113.545145][ T9283] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 113.555630][ T8980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.582940][ T8980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.592722][ T8980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.604027][ T8980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.617696][ T8980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.630656][ T8980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.641354][ T8980] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 113.649462][ T9141] device veth1_macvtap entered promiscuous mode [ 113.658653][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.667315][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.678668][ T8980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.690006][ T8980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.700012][ T8980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.710536][ T8980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.720412][ T8980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.730857][ T8980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.741459][ T8980] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 113.751887][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.760752][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.772345][ T9141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.783390][ T9141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.794279][ T9141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.804875][ T9141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.814903][ T9141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.825332][ T9141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.835238][ T9141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.845690][ T9141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.856639][ T9141] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 113.874420][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.882815][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.957800][ T9141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.968283][ T9141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.978128][ T9141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.988953][ T9141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.998772][ T9141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.009238][ T9141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.019318][ T9141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.030430][ T9141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.041210][ T9141] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 114.083803][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.092206][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.100982][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 114.109739][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.209406][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 114.220017][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.229649][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.239469][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.250796][ T9283] device veth0_vlan entered promiscuous mode [ 114.304241][T10057] BFS-fs: bfs_fill_super(): Inode 0x00000004 corrupted on loop2 [ 114.358414][ T9283] device veth1_vlan entered promiscuous mode 10:43:04 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:04 executing program 1: ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000001c01000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa, 0x4, @local}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x48}}, 0x0) [ 114.412451][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 114.427493][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 114.449271][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 114.461691][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.472263][ T9283] device veth0_macvtap entered promiscuous mode [ 114.482797][ T9283] device veth1_macvtap entered promiscuous mode [ 114.497682][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 114.508377][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.518268][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 114.528930][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.549723][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 114.557019][T10072] XFS (loop1): realtime zeroed geometry check failed [ 114.564133][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.569603][T10072] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x231/0x290, xfs_sb block 0xffffffffffffffff [ 114.592078][T10072] XFS (loop1): Unmount and run xfs_repair [ 114.593362][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 114.598558][T10072] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 114.617540][T10072] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 114.625902][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.626512][T10072] 00000010: 00 00 00 00 00 00 00 00 00 1c 01 00 00 00 00 00 ................ [ 114.645369][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 114.647007][T10072] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 114.657317][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.666947][T10072] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 114.676652][ T9283] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 114.683446][T10072] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 114.691880][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 114.700573][T10072] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 114.711175][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 114.716026][T10072] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 114.726847][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 114.732168][T10072] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 114.749403][T10072] XFS (loop1): SB validate failed with error -117. [ 114.758909][T10088] BFS-fs: bfs_fill_super(): Inode 0x00000004 corrupted on loop2 [ 114.761409][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.787201][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 10:43:04 executing program 4: open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200004d1e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x0, 0xffffffff}) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x0, 0xffffffff}) [ 114.822984][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.833021][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.852966][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.862761][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.874755][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.885285][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.897939][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.907792][ T9283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.919636][ T9283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.930282][ T9283] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 114.942106][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.951292][ T9329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:43:04 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_macvtap\x00', &(0x7f0000000040)=@ethtool_rxfh_indir={0x1}}) 10:43:04 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)='^\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 10:43:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000c00)=""/4096, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='/dev/nullb0\x00I'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 10:43:04 executing program 1: ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000001c01000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa, 0x4, @local}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x48}}, 0x0) 10:43:04 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x1) 10:43:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1800000036001901000000000000000001"], 0x18}}, 0x0) [ 115.189478][T10115] nfs4: Unknown parameter '^' 10:43:04 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1}, &(0x7f0000000140)=0x14) [ 115.231066][T10118] XFS (nullb0): Invalid superblock magic number 10:43:05 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c6230004904440477c826"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 10:43:05 executing program 4: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba316000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c000000000000000000e5ffffff00000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000008000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b000000000082790000000000000000000000000000080400"/560]}, 0x2a8) r1 = getpid() socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) [ 115.326171][T10141] BFS-fs: bfs_fill_super(): Inode 0x00000004 corrupted on loop2 10:43:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) [ 115.422666][T10117] XFS (loop1): realtime zeroed geometry check failed [ 115.434103][T10117] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x231/0x290, xfs_sb block 0xffffffffffffffff 10:43:05 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) [ 115.531433][T10163] XFS (nullb0): Invalid superblock magic number [ 115.551978][T10117] XFS (loop1): Unmount and run xfs_repair [ 115.599637][T10117] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 115.611726][T10163] XFS (nullb0): Invalid superblock magic number [ 115.663664][T10181] BFS-fs: bfs_fill_super(): Inode 0x00000004 corrupted on loop2 [ 115.667657][T10117] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 115.726371][T10117] 00000010: 00 00 00 00 00 00 00 00 00 1c 01 00 00 00 00 00 ................ [ 115.769477][T10117] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 115.812151][T10117] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 115.840206][T10117] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 115.869969][T10117] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 115.900053][T10117] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 115.927812][T10117] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 115.956040][T10117] XFS (loop1): SB validate failed with error -117. 10:43:05 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000c00)=""/4096, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='/dev/nullb0\x00I'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 10:43:05 executing program 1: ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000001c01000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa, 0x4, @local}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x48}}, 0x0) 10:43:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip6tnl0\x00', 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000000), 0x4) 10:43:05 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={&(0x7f0000000380)={0x38, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}]}, 0x38}}, 0x0) 10:43:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:05 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:43:05 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={&(0x7f0000000380)={0x38, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}]}, 0x38}}, 0x0) [ 116.150332][T10208] XFS (nullb0): Invalid superblock magic number [ 116.170326][ T9329] XFS (loop1): realtime zeroed geometry check failed [ 116.177598][ T9329] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x231/0x290, xfs_sb block 0xffffffffffffffff [ 116.191037][ T9329] XFS (loop1): Unmount and run xfs_repair [ 116.197050][ T9329] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 116.205713][ T9329] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 116.214583][ T9329] 00000010: 00 00 00 00 00 00 00 00 00 1c 01 00 00 00 00 00 ................ [ 116.224347][ T9329] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 116.233507][ T9329] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 116.242340][ T9329] 00000040: 00 00 00 00 40 00 0d 89 00 00 00 00 00 00 0d 8a ....@........... [ 116.252537][ T9329] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 116.261564][ T9329] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 116.271499][ T9329] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 116.280476][T10217] XFS (loop1): SB validate failed with error -117. 10:43:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:06 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg(r0, &(0x7f0000001900)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)="092f57e96818888ce06e0f00ff42", 0xe}], 0x1, &(0x7f00000004c0)=[{0x10, 0x1}], 0x10}, 0x0) 10:43:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) 10:43:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) [ 116.489820][T10259] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 10:43:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:06 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:06 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg(r0, &(0x7f0000001900)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)="092f57e96818888ce06e0f00ff42", 0xe}], 0x1, &(0x7f00000004c0)=[{0x10}], 0x10}, 0x0) 10:43:06 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) 10:43:06 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) 10:43:06 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSETMODE(r0, 0x5452, 0x71e001) 10:43:06 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 10:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:06 executing program 1: sync() r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') rename(&(0x7f0000001100)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$sock(r1, &(0x7f00000005c0)={&(0x7f0000000100)=@nfc, 0x80, 0x0}, 0x0) 10:43:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, 0x0, 0x0) 10:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:06 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0xd1, &(0x7f0000000180)={@local, @random="dc2ad8ae0a62", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209240", 0x9b, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x4, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "9baf79d64a10199c7956316b5f6e8388"}]}}, {"8317401b8e9971a6e74797c8de1ace285e4a77744f0bf003fe05611f11d21515c203dc9a3be413f3f0484cc57b9c1c449a5fe739c4e2adcc7b2538a3ba9506ca260d8c5f74e35325df216cb0b702d6d849feea4e03b637872650f3299e346871a135a64f0176efc89eafb39b38c31d32ff4524"}}}}}}}, 0x0) 10:43:06 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) 10:43:06 executing program 1: 10:43:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x4, 0x800, 0x8, 0x82, 0x1}, 0x40) 10:43:06 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:06 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000017c0)="2e0000001f000503d25a80648c63940d0524fc6004000f400a0010005a00000037153e370a00018004000000d1bd", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 10:43:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) [ 117.370029][T10367] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 117.378810][T10367] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 117.390426][T10367] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 117.399733][T10367] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:43:07 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) 10:43:07 executing program 1: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="82022e2fac"], 0x10) r1 = dup(r0) writev(r1, &(0x7f0000000140)=[{0x0}], 0x1) 10:43:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:07 executing program 0: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:07 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:07 executing program 1: r0 = socket(0x2, 0x8001, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) shutdown(r0, 0x1) 10:43:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:07 executing program 0: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:08 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) 10:43:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000100)='\n', 0x10) 10:43:08 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:08 executing program 0: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:08 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 10:43:08 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:09 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 10:43:09 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:09 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 10:43:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, r0, 0x7}, 0x14) 10:43:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, 0x0, 0x0) 10:43:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) 10:43:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100), 0x0) 10:43:09 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, r0, 0x7}, 0x14) 10:43:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:43:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100), 0x0) 10:43:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, 0x0, 0x0) 10:43:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, r0, 0x7}, 0x14) 10:43:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:43:09 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000100), 0x0) 10:43:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, 0x0, 0x0) 10:43:09 executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x7}, 0x14) 10:43:10 executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x7}, 0x14) 10:43:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:43:10 executing program 5: 10:43:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:10 executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x7}, 0x14) 10:43:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:10 executing program 5: 10:43:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 10:43:10 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 10:43:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 10:43:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 10:43:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:10 executing program 5: 10:43:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 10:43:10 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:11 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:11 executing program 5: 10:43:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 10:43:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)='\n\a', 0x2) 10:43:11 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:11 executing program 5: 10:43:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)='\n\a', 0x2) 10:43:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 10:43:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:11 executing program 5: 10:43:11 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee", 0x3}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:12 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)='\n\a', 0x2) 10:43:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 10:43:12 executing program 5: 10:43:12 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee", 0x3}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:12 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee", 0x3}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 10:43:12 executing program 5: 10:43:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)='\n\au', 0x3) 10:43:12 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:12 executing program 5: 10:43:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:12 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a", 0x4}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x0, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)='\n\au', 0x3) 10:43:12 executing program 5: 10:43:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)='\n\au', 0x3) 10:43:12 executing program 5: 10:43:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:12 executing program 5: 10:43:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x0, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:13 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:13 executing program 4: 10:43:13 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a", 0x4}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:13 executing program 5: 10:43:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x0, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:13 executing program 5: 10:43:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 10:43:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:13 executing program 4: 10:43:13 executing program 4: 10:43:13 executing program 5: 10:43:14 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0xf, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 10:43:14 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a", 0x4}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 10:43:14 executing program 4: 10:43:14 executing program 5: 10:43:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0xf, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 10:43:14 executing program 5: 10:43:14 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:14 executing program 4: 10:43:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0xf, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 10:43:14 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) 10:43:14 executing program 5: 10:43:14 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:14 executing program 4: 10:43:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x0, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0xf, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_INDEX={0x6}]}, 0x1c}}, 0x0) 10:43:14 executing program 4: 10:43:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x0, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:14 executing program 5: 10:43:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0xf, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_INDEX={0x6}]}, 0x1c}}, 0x0) 10:43:14 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:14 executing program 5: 10:43:14 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) 10:43:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0xf, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_INDEX={0x6}]}, 0x1c}}, 0x0) 10:43:14 executing program 5: 10:43:14 executing program 4: 10:43:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x0, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:14 executing program 4: 10:43:14 executing program 0: 10:43:15 executing program 5: 10:43:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:15 executing program 4: 10:43:15 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:15 executing program 0: 10:43:15 executing program 4: 10:43:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:15 executing program 5: 10:43:15 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) 10:43:15 executing program 0: 10:43:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:15 executing program 5: 10:43:15 executing program 4: 10:43:15 executing program 5: 10:43:15 executing program 0: 10:43:16 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:16 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) 10:43:16 executing program 4: 10:43:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:16 executing program 0: 10:43:16 executing program 5: 10:43:16 executing program 5: 10:43:16 executing program 4: 10:43:16 executing program 0: 10:43:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:16 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) 10:43:16 executing program 5: 10:43:17 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:17 executing program 4: 10:43:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:17 executing program 0: 10:43:17 executing program 5: 10:43:17 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc102, 0x0) 10:43:17 executing program 0: 10:43:17 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc102, 0x0) 10:43:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:17 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc102, 0x0) 10:43:17 executing program 4: 10:43:17 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:17 executing program 0: 10:43:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x2, 0x0, [{0x95a, 0x0, 0xff}, {0x37f, 0x0, 0x6}]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x44140}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:43:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:17 executing program 4: 10:43:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:17 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:17 executing program 0: 10:43:17 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc102, 0x0) [ 128.080446][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000008 10:43:17 executing program 0: 10:43:17 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 128.141831][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000009 [ 128.179804][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000000a 10:43:17 executing program 4: 10:43:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:17 executing program 0: [ 128.217162][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000000b [ 128.244341][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000000c [ 128.255500][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000000d [ 128.312580][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000000e [ 128.347649][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000000f [ 128.357327][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000011 [ 128.366024][T10943] kvm [10940]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000012 10:43:18 executing program 5: 10:43:18 executing program 4: 10:43:18 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xc102, 0x0) 10:43:18 executing program 0: 10:43:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:18 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:18 executing program 5: 10:43:18 executing program 4: 10:43:18 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:18 executing program 0: 10:43:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:18 executing program 5: 10:43:18 executing program 0: 10:43:18 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xc102, 0x0) 10:43:18 executing program 4: 10:43:18 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:18 executing program 5: 10:43:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:18 executing program 0: 10:43:18 executing program 4: 10:43:18 executing program 5: 10:43:18 executing program 4: 10:43:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:18 executing program 0: 10:43:18 executing program 5: 10:43:18 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xc102, 0x0) 10:43:18 executing program 5: 10:43:19 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:19 executing program 4: 10:43:19 executing program 0: 10:43:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:19 executing program 5: 10:43:19 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0xc102, 0x0) 10:43:19 executing program 0: 10:43:19 executing program 4: 10:43:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:19 executing program 5: 10:43:19 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0xc102, 0x0) 10:43:19 executing program 0: 10:43:20 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:20 executing program 4: 10:43:20 executing program 5: 10:43:20 executing program 0: 10:43:20 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0xc102, 0x0) 10:43:20 executing program 5: 10:43:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:20 executing program 4: 10:43:20 executing program 0: 10:43:20 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0xc102, 0x0) 10:43:20 executing program 5: 10:43:21 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:21 executing program 4: 10:43:21 executing program 0: 10:43:21 executing program 5: 10:43:21 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0xc102, 0x0) 10:43:21 executing program 4: 10:43:21 executing program 0: 10:43:21 executing program 5: 10:43:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:21 executing program 5: 10:43:21 executing program 0: 10:43:21 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:21 executing program 4: 10:43:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:21 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0xc102, 0x0) 10:43:21 executing program 5: 10:43:21 executing program 0: 10:43:21 executing program 4: 10:43:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x0, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:21 executing program 0: 10:43:21 executing program 5: 10:43:22 executing program 5: 10:43:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x0, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:22 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:22 executing program 4: 10:43:22 executing program 0: 10:43:22 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb8", 0x5}], 0xc102, 0x0) 10:43:22 executing program 5: 10:43:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x0, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:22 executing program 0: 10:43:22 executing program 4: 10:43:22 executing program 5: 10:43:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0x0, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:22 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb8", 0x5}], 0xc102, 0x0) 10:43:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0x0, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:23 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:23 executing program 0: 10:43:23 executing program 5: 10:43:23 executing program 4: 10:43:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0x0, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:23 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb8", 0x5}], 0xc102, 0x0) 10:43:23 executing program 4: 10:43:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:23 executing program 5: 10:43:23 executing program 0: 10:43:23 executing program 5: 10:43:23 executing program 4: 10:43:24 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:24 executing program 0: 10:43:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:24 executing program 5: 10:43:24 executing program 4: 10:43:24 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c0000", 0x8}], 0xc102, 0x0) 10:43:24 executing program 4: 10:43:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:24 executing program 0: 10:43:24 executing program 5: 10:43:24 executing program 0: 10:43:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:25 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:25 executing program 4: 10:43:25 executing program 5: 10:43:25 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c0000", 0x8}], 0xc102, 0x0) 10:43:25 executing program 0: 10:43:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:25 executing program 5: 10:43:25 executing program 4: 10:43:25 executing program 0: 10:43:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x7}, 0x14) 10:43:25 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c0000", 0x8}], 0xc102, 0x0) 10:43:25 executing program 4: 10:43:26 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:26 executing program 5: 10:43:26 executing program 0: 10:43:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 10:43:26 executing program 4: 10:43:26 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040", 0x9}], 0xc102, 0x0) 10:43:26 executing program 4: 10:43:26 executing program 5: open(0x0, 0x44042, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x4000000, 0x2000402) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x345a, 0x7fff) 10:43:26 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-vsock\x00', 0x2, 0x0) dup2(r0, r1) 10:43:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 10:43:26 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000040)={0x8, 0x0, 0x7fff}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000080)={0x0, 0x20, 0x4}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x1) 10:43:26 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040", 0x9}], 0xc102, 0x0) 10:43:26 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) [ 136.922430][ T28] audit: type=1800 audit(1593859406.579:2): pid=11382 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16021 res=0 10:43:26 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 10:43:26 executing program 5: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x2}, 0x6) recvmmsg(r0, &(0x7f0000008500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xfffffd58, 0x0}}], 0x400000000000251, 0x22, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) lseek(0xffffffffffffffff, 0x20400, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) 10:43:26 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040", 0x9}], 0xc102, 0x0) 10:43:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, r0, 0x7}, 0x14) 10:43:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, r0, 0x7}, 0x14) 10:43:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffffbf, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539302000000000000000000", @ANYRES32=r3, @ANYBLOB="ddffffff03ffffff140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xf43fefae59b4f87f, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4}}, 0x1c}}, 0x0) 10:43:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000040)={0x8, 0x0, 0x7fff}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000080)={0x0, 0x20, 0x4}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x1) [ 137.270893][T11446] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:43:27 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0x0, 0x0) [ 137.312565][T11446] device bridge1 entered promiscuous mode 10:43:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffffbf, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539302000000000000000000", @ANYRES32=r3, @ANYBLOB="ddffffff03ffffff140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xf43fefae59b4f87f, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4}}, 0x1c}}, 0x0) 10:43:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, r0, 0x7}, 0x14) 10:43:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x7}, 0x14) [ 137.464973][T11461] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 137.500910][T11482] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 137.558728][T11482] device bridge2 entered promiscuous mode 10:43:27 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:43:27 executing program 2: syz_mount_image$ceph(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="9946ee9a5e", 0x5}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0x0, 0x0) 10:43:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40101, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6040}, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000040)={0x8, 0x0, 0x7fff}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000080)={0x0, 0x20, 0x4, 0x80}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38d07b6300ffffff7f000000003c000500001000000000", @ANYRES32, @ANYBLOB="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"], 0x38}}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x1) 10:43:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x7}, 0x14) 10:43:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000040)={0x8, 0x0, 0x7fff}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000080)={0x0, 0x20, 0x4}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x1) 10:43:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffffbf, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539302000000000000000000", @ANYRES32=r3, @ANYBLOB="ddffffff03ffffff140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xf43fefae59b4f87f, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4}}, 0x1c}}, 0x0) 10:43:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x7}, 0x14) [ 137.937094][T11507] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 137.961811][T11507] device bridge3 entered promiscuous mode 10:43:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffffbf, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539302000000000000000000", @ANYRES32=r3, @ANYBLOB="ddffffff03ffffff140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xf43fefae59b4f87f, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4}}, 0x1c}}, 0x0) [ 138.021278][T11512] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 10:43:27 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, '\t\x93\aL\xfa\xa4\xc3\xa0\xd3w@QO\xf4\xfd\xe9\x9f,Uj\xa4mJ\xa5&\x82n\xb5_\x04l~\xb9\xc7\x01\x15K\x1d4\x03\x13\x91y\xfdG\xf2\xa8SCNr&If\xd5/\xcf\x035\x9c\xecT\x9b\xc1\xd6\x80d\f\xed|tZN\xa0\'\xe9\xce\x8f7a\xccZ%\xa6\x1e\r\xbb-\xc1p\x05?>x\xb8\x10\xa2\xb9\xbbc\xd2N`\xb0\x88\xef\x95!\xb1\xadt\xfd\bR\x14Qr\xb7H>@y\x15-D\xde\xf28\xd3\xb1\xd0\x132\xc7\xecY?\xefB\x00\xcd\x9f@\xce\vc\x85\x19\t\xb2\xef;\xf3\xfcz\xc2*4\x17Xq\xddh\xf0n\xa7\xeb\x02&\x87\xae\xd7\x87\xb3j\xf6v\x1f^\xcc\xb3\xcc_u\xe2\t\xb4\xc5\xe7H\xe22\xe8\xd5\x90\xbce\x99\xbd\x97k \xb2\xb1\t\xc2\xb1\x0fs\xaf0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, '\t\x93\aL\xfa\xa4\xc3\xa0\xd3w@QO\xf4\xfd\xe9\x9f,Uj\xa4mJ\xa5&\x82n\xb5_\x04l~\xb9\xc7\x01\x15K\x1d4\x03\x13\x91y\xfdG\xf2\xa8SCNr&If\xd5/\xcf\x035\x9c\xecT\x9b\xc1\xd6\x80d\f\xed|tZN\xa0\'\xe9\xce\x8f7a\xccZ%\xa6\x1e\r\xbb-\xc1p\x05?>x\xb8\x10\xa2\xb9\xbbc\xd2N`\xb0\x88\xef\x95!\xb1\xadt\xfd\bR\x14Qr\xb7H>@y\x15-D\xde\xf28\xd3\xb1\xd0\x132\xc7\xecY?\xefB\x00\xcd\x9f@\xce\vc\x85\x19\t\xb2\xef;\xf3\xfcz\xc2*4\x17Xq\xddh\xf0n\xa7\xeb\x02&\x87\xae\xd7\x87\xb3j\xf6v\x1f^\xcc\xb3\xcc_u\xe2\t\xb4\xc5\xe7H\xe22\xe8\xd5\x90\xbce\x99\xbd\x97k \xb2\xb1\t\xc2\xb1\x0fs\xaf0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xf43fefae59b4f87f, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x4}}, 0x1c}}, 0x0) 10:43:28 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, '\t\x93\aL\xfa\xa4\xc3\xa0\xd3w@QO\xf4\xfd\xe9\x9f,Uj\xa4mJ\xa5&\x82n\xb5_\x04l~\xb9\xc7\x01\x15K\x1d4\x03\x13\x91y\xfdG\xf2\xa8SCNr&If\xd5/\xcf\x035\x9c\xecT\x9b\xc1\xd6\x80d\f\xed|tZN\xa0\'\xe9\xce\x8f7a\xccZ%\xa6\x1e\r\xbb-\xc1p\x05?>x\xb8\x10\xa2\xb9\xbbc\xd2N`\xb0\x88\xef\x95!\xb1\xadt\xfd\bR\x14Qr\xb7H>@y\x15-D\xde\xf28\xd3\xb1\xd0\x132\xc7\xecY?\xefB\x00\xcd\x9f@\xce\vc\x85\x19\t\xb2\xef;\xf3\xfcz\xc2*4\x17Xq\xddh\xf0n\xa7\xeb\x02&\x87\xae\xd7\x87\xb3j\xf6v\x1f^\xcc\xb3\xcc_u\xe2\t\xb4\xc5\xe7H\xe22\xe8\xd5\x90\xbce\x99\xbd\x97k \xb2\xb1\t\xc2\xb1\x0fs\xaf0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xf43fefae59b4f87f, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x4}}, 0x1c}}, 0x0) 10:43:28 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, '\t\x93\aL\xfa\xa4\xc3\xa0\xd3w@QO\xf4\xfd\xe9\x9f,Uj\xa4mJ\xa5&\x82n\xb5_\x04l~\xb9\xc7\x01\x15K\x1d4\x03\x13\x91y\xfdG\xf2\xa8SCNr&If\xd5/\xcf\x035\x9c\xecT\x9b\xc1\xd6\x80d\f\xed|tZN\xa0\'\xe9\xce\x8f7a\xccZ%\xa6\x1e\r\xbb-\xc1p\x05?>x\xb8\x10\xa2\xb9\xbbc\xd2N`\xb0\x88\xef\x95!\xb1\xadt\xfd\bR\x14Qr\xb7H>@y\x15-D\xde\xf28\xd3\xb1\xd0\x132\xc7\xecY?\xefB\x00\xcd\x9f@\xce\vc\x85\x19\t\xb2\xef;\xf3\xfcz\xc2*4\x17Xq\xddh\xf0n\xa7\xeb\x02&\x87\xae\xd7\x87\xb3j\xf6v\x1f^\xcc\xb3\xcc_u\xe2\t\xb4\xc5\xe7H\xe22\xe8\xd5\x90\xbce\x99\xbd\x97k \xb2\xb1\t\xc2\xb1\x0fs\xaf0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_client='access=client'}], [], 0x6b}}) 10:43:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40101, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6040}, 0x0) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000040)={0x8, 0x1, 0x7fff}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x932, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="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"], 0x38}}, 0x0) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f00000001c0)={0x1}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x14) 10:43:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffffbf, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xf43fefae59b4f87f, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x4}}, 0x1c}}, 0x0) 10:43:28 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@uname={'uname', 0x3d, '\t\x93\aL\xfa\xa4\xc3\xa0\xd3w@QO\xf4\xfd\xe9\x9f,Uj\xa4mJ\xa5&\x82n\xb5_\x04l~\xb9\xc7\x01\x15K\x1d4\x03\x13\x91y\xfdG\xf2\xa8SCNr&If\xd5/\xcf\x035\x9c\xecT\x9b\xc1\xd6\x80d\f\xed|tZN\xa0\'\xe9\xce\x8f7a\xccZ%\xa6\x1e\r\xbb-\xc1p\x05?>x\xb8\x10\xa2\xb9\xbbc\xd2N`\xb0\x88\xef\x95!\xb1\xadt\xfd\bR\x14Qr\xb7H>@y\x15-D\xde\xf28\xd3\xb1\xd0\x132\xc7\xecY?\xefB\x00\xcd\x9f@\xce\vc\x85\x19\t\xb2\xef;\xf3\xfcz\xc2*4\x17Xq\xddh\xf0n\xa7\xeb\x02&\x87\xae\xd7\x87\xb3j\xf6v\x1f^\xcc\xb3\xcc_u\xe2\t\xb4\xc5\xe7H\xe22\xe8\xd5\x90\xbce\x99\xbd\x97k \xb2\xb1\t\xc2\xb1\x0fs\xaf0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@uname={'uname', 0x3d, '\t\x93\aL\xfa\xa4\xc3\xa0\xd3w@QO\xf4\xfd\xe9\x9f,Uj\xa4mJ\xa5&\x82n\xb5_\x04l~\xb9\xc7\x01\x15K\x1d4\x03\x13\x91y\xfdG\xf2\xa8SCNr&If\xd5/\xcf\x035\x9c\xecT\x9b\xc1\xd6\x80d\f\xed|tZN\xa0\'\xe9\xce\x8f7a\xccZ%\xa6\x1e\r\xbb-\xc1p\x05?>x\xb8\x10\xa2\xb9\xbbc\xd2N`\xb0\x88\xef\x95!\xb1\xadt\xfd\bR\x14Qr\xb7H>@y\x15-D\xde\xf28\xd3\xb1\xd0\x132\xc7\xecY?\xefB\x00\xcd\x9f@\xce\vc\x85\x19\t\xb2\xef;\xf3\xfcz\xc2*4\x17Xq\xddh\xf0n\xa7\xeb\x02&\x87\xae\xd7\x87\xb3j\xf6v\x1f^\xcc\xb3\xcc_u\xe2\t\xb4\xc5\xe7H\xe22\xe8\xd5\x90\xbce\x99\xbd\x97k \xb2\xb1\t\xc2\xb1\x0fs\xaf0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@uname={'uname', 0x3d, '\t\x93\aL\xfa\xa4\xc3\xa0\xd3w@QO\xf4\xfd\xe9\x9f,Uj\xa4mJ\xa5&\x82n\xb5_\x04l~\xb9\xc7\x01\x15K\x1d4\x03\x13\x91y\xfdG\xf2\xa8SCNr&If\xd5/\xcf\x035\x9c\xecT\x9b\xc1\xd6\x80d\f\xed|tZN\xa0\'\xe9\xce\x8f7a\xccZ%\xa6\x1e\r\xbb-\xc1p\x05?>x\xb8\x10\xa2\xb9\xbbc\xd2N`\xb0\x88\xef\x95!\xb1\xadt\xfd\bR\x14Qr\xb7H>@y\x15-D\xde\xf28\xd3\xb1\xd0\x132\xc7\xecY?\xefB\x00\xcd\x9f@\xce\vc\x85\x19\t\xb2\xef;\xf3\xfcz\xc2*4\x17Xq\xddh\xf0n\xa7\xeb\x02&\x87\xae\xd7\x87\xb3j\xf6v\x1f^\xcc\xb3\xcc_u\xe2\t\xb4\xc5\xe7H\xe22\xe8\xd5\x90\xbce\x99\xbd\x97k \xb2\xb1\t\xc2\xb1\x0fs\xaf