DUID 00:04:91:bc:de:6a:11:68:5e:b9:f7:f7:da:c6:96:db:93:18 forked to background, child pid 3209 [ 34.027826][ T3210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.064381][ T3210] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.91' (ECDSA) to the list of known hosts. 2022/11/17 09:46:44 fuzzer started 2022/11/17 09:46:44 dialing manager at 10.128.0.169:36467 syzkaller login: [ 53.121119][ T3641] cgroup: Unknown subsys name 'net' [ 53.256136][ T3641] cgroup: Unknown subsys name 'rlimit' 2022/11/17 09:46:45 syscalls: 1737 2022/11/17 09:46:45 code coverage: enabled 2022/11/17 09:46:45 comparison tracing: enabled 2022/11/17 09:46:45 extra coverage: enabled 2022/11/17 09:46:45 delay kcov mmap: enabled 2022/11/17 09:46:45 setuid sandbox: enabled 2022/11/17 09:46:45 namespace sandbox: enabled 2022/11/17 09:46:45 Android sandbox: /sys/fs/selinux/policy does not exist 2022/11/17 09:46:45 fault injection: enabled 2022/11/17 09:46:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/11/17 09:46:45 net packet injection: enabled 2022/11/17 09:46:45 net device setup: enabled 2022/11/17 09:46:45 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/11/17 09:46:45 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/11/17 09:46:45 NIC VF setup: PCI device 0000:00:11.0 is not available 2022/11/17 09:46:45 USB emulation: enabled 2022/11/17 09:46:45 hci packet injection: enabled 2022/11/17 09:46:45 wifi device emulation: enabled 2022/11/17 09:46:45 802.15.4 emulation: enabled 2022/11/17 09:46:45 fetching corpus: 0, signal 0/2000 (executing program) 2022/11/17 09:46:45 fetching corpus: 50, signal 43147/46624 (executing program) 2022/11/17 09:46:45 fetching corpus: 100, signal 56791/61791 (executing program) 2022/11/17 09:46:45 fetching corpus: 150, signal 63129/69622 (executing program) 2022/11/17 09:46:45 fetching corpus: 200, signal 69674/77611 (executing program) 2022/11/17 09:46:46 fetching corpus: 250, signal 76866/86149 (executing program) 2022/11/17 09:46:46 fetching corpus: 300, signal 80857/91528 (executing program) 2022/11/17 09:46:46 fetching corpus: 350, signal 85936/97897 (executing program) 2022/11/17 09:46:47 fetching corpus: 400, signal 91948/105024 (executing program) 2022/11/17 09:46:47 fetching corpus: 450, signal 95267/109624 (executing program) 2022/11/17 09:46:47 fetching corpus: 500, signal 99680/115190 (executing program) 2022/11/17 09:46:48 fetching corpus: 550, signal 103159/119841 (executing program) 2022/11/17 09:46:48 fetching corpus: 600, signal 105822/123669 (executing program) 2022/11/17 09:46:48 fetching corpus: 650, signal 108357/127369 (executing program) 2022/11/17 09:46:49 fetching corpus: 700, signal 111133/131231 (executing program) 2022/11/17 09:46:49 fetching corpus: 750, signal 113627/134839 (executing program) 2022/11/17 09:46:49 fetching corpus: 800, signal 115749/138100 (executing program) 2022/11/17 09:46:50 fetching corpus: 850, signal 117763/141165 (executing program) 2022/11/17 09:46:50 fetching corpus: 900, signal 119742/144235 (executing program) 2022/11/17 09:46:50 fetching corpus: 950, signal 122022/147513 (executing program) 2022/11/17 09:46:51 fetching corpus: 1000, signal 124339/150841 (executing program) 2022/11/17 09:46:51 fetching corpus: 1050, signal 126377/153904 (executing program) 2022/11/17 09:46:51 fetching corpus: 1100, signal 128076/156620 (executing program) 2022/11/17 09:46:52 fetching corpus: 1150, signal 130713/160104 (executing program) 2022/11/17 09:46:52 fetching corpus: 1200, signal 133228/163471 (executing program) 2022/11/17 09:46:52 fetching corpus: 1250, signal 135205/166370 (executing program) 2022/11/17 09:46:52 fetching corpus: 1300, signal 136826/168919 (executing program) 2022/11/17 09:46:53 fetching corpus: 1350, signal 139010/171910 (executing program) 2022/11/17 09:46:53 fetching corpus: 1399, signal 140976/174741 (executing program) 2022/11/17 09:46:53 fetching corpus: 1449, signal 142813/177368 (executing program) 2022/11/17 09:46:53 fetching corpus: 1499, signal 144495/179850 (executing program) 2022/11/17 09:46:54 fetching corpus: 1549, signal 146232/182401 (executing program) 2022/11/17 09:46:54 fetching corpus: 1599, signal 147859/184882 (executing program) 2022/11/17 09:46:54 fetching corpus: 1649, signal 149692/187411 (executing program) 2022/11/17 09:46:54 fetching corpus: 1699, signal 151202/189728 (executing program) 2022/11/17 09:46:54 fetching corpus: 1749, signal 152431/191852 (executing program) 2022/11/17 09:46:55 fetching corpus: 1799, signal 153811/194008 (executing program) 2022/11/17 09:46:55 fetching corpus: 1849, signal 155611/196453 (executing program) 2022/11/17 09:46:55 fetching corpus: 1899, signal 156758/198414 (executing program) 2022/11/17 09:46:56 fetching corpus: 1949, signal 158262/200573 (executing program) 2022/11/17 09:46:56 fetching corpus: 1999, signal 160282/203197 (executing program) 2022/11/17 09:46:56 fetching corpus: 2049, signal 161878/205472 (executing program) 2022/11/17 09:46:57 fetching corpus: 2099, signal 163358/207587 (executing program) 2022/11/17 09:46:57 fetching corpus: 2149, signal 165143/209993 (executing program) 2022/11/17 09:46:57 fetching corpus: 2199, signal 166506/211995 (executing program) 2022/11/17 09:46:57 fetching corpus: 2248, signal 167874/213984 (executing program) 2022/11/17 09:46:58 fetching corpus: 2298, signal 169206/215958 (executing program) 2022/11/17 09:46:58 fetching corpus: 2348, signal 170744/218074 (executing program) 2022/11/17 09:46:58 fetching corpus: 2398, signal 171748/219772 (executing program) 2022/11/17 09:46:58 fetching corpus: 2448, signal 172472/221225 (executing program) 2022/11/17 09:46:59 fetching corpus: 2498, signal 173789/223101 (executing program) 2022/11/17 09:46:59 fetching corpus: 2548, signal 175329/225090 (executing program) 2022/11/17 09:46:59 fetching corpus: 2598, signal 176403/226779 (executing program) 2022/11/17 09:46:59 fetching corpus: 2648, signal 177107/228266 (executing program) 2022/11/17 09:47:00 fetching corpus: 2698, signal 178367/230036 (executing program) 2022/11/17 09:47:00 fetching corpus: 2748, signal 179217/231552 (executing program) 2022/11/17 09:47:00 fetching corpus: 2797, signal 180181/233142 (executing program) 2022/11/17 09:47:00 fetching corpus: 2846, signal 183615/236317 (executing program) 2022/11/17 09:47:00 fetching corpus: 2896, signal 184808/237996 (executing program) 2022/11/17 09:47:01 fetching corpus: 2946, signal 185640/239410 (executing program) 2022/11/17 09:47:01 fetching corpus: 2996, signal 186917/241064 (executing program) 2022/11/17 09:47:01 fetching corpus: 3046, signal 187826/242540 (executing program) 2022/11/17 09:47:01 fetching corpus: 3096, signal 188923/244110 (executing program) 2022/11/17 09:47:02 fetching corpus: 3146, signal 189700/245456 (executing program) 2022/11/17 09:47:02 fetching corpus: 3196, signal 190362/246713 (executing program) 2022/11/17 09:47:02 fetching corpus: 3246, signal 191105/247985 (executing program) 2022/11/17 09:47:02 fetching corpus: 3296, signal 191795/249283 (executing program) [ 71.271055][ T1249] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.277578][ T1249] ieee802154 phy1 wpan1: encryption failed: -22 2022/11/17 09:47:03 fetching corpus: 3344, signal 192951/250776 (executing program) 2022/11/17 09:47:03 fetching corpus: 3394, signal 194398/252423 (executing program) 2022/11/17 09:47:03 fetching corpus: 3444, signal 195355/253838 (executing program) 2022/11/17 09:47:03 fetching corpus: 3494, signal 196152/255110 (executing program) 2022/11/17 09:47:04 fetching corpus: 3544, signal 197897/256931 (executing program) 2022/11/17 09:47:04 fetching corpus: 3594, signal 198822/258308 (executing program) 2022/11/17 09:47:04 fetching corpus: 3644, signal 199770/259668 (executing program) 2022/11/17 09:47:04 fetching corpus: 3694, signal 200336/260849 (executing program) 2022/11/17 09:47:05 fetching corpus: 3744, signal 200989/261986 (executing program) 2022/11/17 09:47:05 fetching corpus: 3794, signal 201699/263139 (executing program) 2022/11/17 09:47:05 fetching corpus: 3844, signal 202564/264407 (executing program) 2022/11/17 09:47:05 fetching corpus: 3893, signal 203097/265457 (executing program) 2022/11/17 09:47:06 fetching corpus: 3943, signal 203898/266675 (executing program) 2022/11/17 09:47:06 fetching corpus: 3993, signal 204526/267746 (executing program) 2022/11/17 09:47:06 fetching corpus: 4043, signal 205769/269171 (executing program) 2022/11/17 09:47:06 fetching corpus: 4093, signal 206492/270317 (executing program) 2022/11/17 09:47:06 fetching corpus: 4143, signal 207191/271464 (executing program) 2022/11/17 09:47:07 fetching corpus: 4193, signal 207926/272598 (executing program) 2022/11/17 09:47:07 fetching corpus: 4243, signal 208690/273675 (executing program) 2022/11/17 09:47:07 fetching corpus: 4293, signal 209345/274730 (executing program) 2022/11/17 09:47:07 fetching corpus: 4343, signal 210134/275845 (executing program) 2022/11/17 09:47:07 fetching corpus: 4393, signal 210727/276828 (executing program) [ 76.390368][ T155] cfg80211: failed to load regulatory.db 2022/11/17 09:47:08 fetching corpus: 4443, signal 211544/278015 (executing program) 2022/11/17 09:47:08 fetching corpus: 4493, signal 212087/278970 (executing program) 2022/11/17 09:47:08 fetching corpus: 4541, signal 212926/280063 (executing program) 2022/11/17 09:47:09 fetching corpus: 4591, signal 213590/281083 (executing program) 2022/11/17 09:47:09 fetching corpus: 4641, signal 214376/282158 (executing program) 2022/11/17 09:47:09 fetching corpus: 4691, signal 214862/283090 (executing program) 2022/11/17 09:47:09 fetching corpus: 4741, signal 215559/284118 (executing program) 2022/11/17 09:47:09 fetching corpus: 4791, signal 216237/285090 (executing program) 2022/11/17 09:47:10 fetching corpus: 4841, signal 216751/286024 (executing program) 2022/11/17 09:47:10 fetching corpus: 4891, signal 217528/287075 (executing program) 2022/11/17 09:47:10 fetching corpus: 4941, signal 218197/288052 (executing program) 2022/11/17 09:47:10 fetching corpus: 4991, signal 219069/289090 (executing program) 2022/11/17 09:47:11 fetching corpus: 5041, signal 219683/290050 (executing program) 2022/11/17 09:47:11 fetching corpus: 5091, signal 220575/291087 (executing program) 2022/11/17 09:47:11 fetching corpus: 5141, signal 221024/291998 (executing program) 2022/11/17 09:47:11 fetching corpus: 5191, signal 221800/292986 (executing program) 2022/11/17 09:47:12 fetching corpus: 5241, signal 222633/293955 (executing program) 2022/11/17 09:47:12 fetching corpus: 5291, signal 223588/294955 (executing program) 2022/11/17 09:47:12 fetching corpus: 5341, signal 224286/295847 (executing program) 2022/11/17 09:47:12 fetching corpus: 5391, signal 224886/296684 (executing program) 2022/11/17 09:47:12 fetching corpus: 5441, signal 225490/297518 (executing program) 2022/11/17 09:47:13 fetching corpus: 5491, signal 226121/298378 (executing program) 2022/11/17 09:47:13 fetching corpus: 5541, signal 226601/299194 (executing program) 2022/11/17 09:47:13 fetching corpus: 5591, signal 227229/300096 (executing program) 2022/11/17 09:47:13 fetching corpus: 5641, signal 227792/300888 (executing program) 2022/11/17 09:47:14 fetching corpus: 5691, signal 228351/301696 (executing program) 2022/11/17 09:47:14 fetching corpus: 5740, signal 229045/302538 (executing program) 2022/11/17 09:47:14 fetching corpus: 5790, signal 229993/303487 (executing program) 2022/11/17 09:47:14 fetching corpus: 5840, signal 230677/304304 (executing program) 2022/11/17 09:47:15 fetching corpus: 5890, signal 231125/305052 (executing program) 2022/11/17 09:47:15 fetching corpus: 5940, signal 231773/305838 (executing program) 2022/11/17 09:47:15 fetching corpus: 5990, signal 232388/306632 (executing program) 2022/11/17 09:47:15 fetching corpus: 6040, signal 232936/307401 (executing program) 2022/11/17 09:47:16 fetching corpus: 6090, signal 233628/308204 (executing program) 2022/11/17 09:47:16 fetching corpus: 6140, signal 234497/309042 (executing program) 2022/11/17 09:47:16 fetching corpus: 6190, signal 235239/309822 (executing program) 2022/11/17 09:47:16 fetching corpus: 6240, signal 235961/310638 (executing program) 2022/11/17 09:47:17 fetching corpus: 6290, signal 236337/311318 (executing program) 2022/11/17 09:47:17 fetching corpus: 6340, signal 237321/312144 (executing program) 2022/11/17 09:47:17 fetching corpus: 6390, signal 237786/312857 (executing program) 2022/11/17 09:47:18 fetching corpus: 6440, signal 238352/313622 (executing program) 2022/11/17 09:47:18 fetching corpus: 6490, signal 239082/314369 (executing program) 2022/11/17 09:47:18 fetching corpus: 6540, signal 239539/315052 (executing program) 2022/11/17 09:47:18 fetching corpus: 6590, signal 240006/315681 (executing program) 2022/11/17 09:47:19 fetching corpus: 6640, signal 240529/316374 (executing program) 2022/11/17 09:47:19 fetching corpus: 6690, signal 241092/317055 (executing program) 2022/11/17 09:47:19 fetching corpus: 6740, signal 241727/317718 (executing program) 2022/11/17 09:47:19 fetching corpus: 6790, signal 242360/318407 (executing program) 2022/11/17 09:47:20 fetching corpus: 6840, signal 242959/319053 (executing program) 2022/11/17 09:47:20 fetching corpus: 6890, signal 243488/319685 (executing program) 2022/11/17 09:47:20 fetching corpus: 6940, signal 243832/320292 (executing program) 2022/11/17 09:47:20 fetching corpus: 6990, signal 244267/320892 (executing program) 2022/11/17 09:47:21 fetching corpus: 7040, signal 244709/321478 (executing program) 2022/11/17 09:47:21 fetching corpus: 7090, signal 245098/322093 (executing program) 2022/11/17 09:47:21 fetching corpus: 7140, signal 245466/322747 (executing program) 2022/11/17 09:47:22 fetching corpus: 7190, signal 245836/323339 (executing program) 2022/11/17 09:47:22 fetching corpus: 7240, signal 246350/323928 (executing program) 2022/11/17 09:47:22 fetching corpus: 7290, signal 246999/324492 (executing program) 2022/11/17 09:47:23 fetching corpus: 7340, signal 247540/325103 (executing program) 2022/11/17 09:47:23 fetching corpus: 7389, signal 247961/325647 (executing program) 2022/11/17 09:47:23 fetching corpus: 7439, signal 248535/326243 (executing program) 2022/11/17 09:47:23 fetching corpus: 7489, signal 248928/326796 (executing program) 2022/11/17 09:47:24 fetching corpus: 7539, signal 249384/327336 (executing program) 2022/11/17 09:47:24 fetching corpus: 7589, signal 249692/327876 (executing program) 2022/11/17 09:47:24 fetching corpus: 7639, signal 254097/328679 (executing program) 2022/11/17 09:47:24 fetching corpus: 7689, signal 254595/329205 (executing program) 2022/11/17 09:47:24 fetching corpus: 7739, signal 255050/329750 (executing program) 2022/11/17 09:47:25 fetching corpus: 7789, signal 255479/330284 (executing program) 2022/11/17 09:47:25 fetching corpus: 7839, signal 256181/330827 (executing program) 2022/11/17 09:47:25 fetching corpus: 7889, signal 256539/331287 (executing program) 2022/11/17 09:47:25 fetching corpus: 7938, signal 257081/331761 (executing program) 2022/11/17 09:47:26 fetching corpus: 7988, signal 257685/332221 (executing program) 2022/11/17 09:47:26 fetching corpus: 8038, signal 258065/332685 (executing program) 2022/11/17 09:47:26 fetching corpus: 8087, signal 258637/333159 (executing program) 2022/11/17 09:47:26 fetching corpus: 8137, signal 259077/333641 (executing program) 2022/11/17 09:47:27 fetching corpus: 8187, signal 259820/334097 (executing program) 2022/11/17 09:47:27 fetching corpus: 8237, signal 260260/334560 (executing program) 2022/11/17 09:47:27 fetching corpus: 8286, signal 260672/335010 (executing program) 2022/11/17 09:47:27 fetching corpus: 8336, signal 261165/335312 (executing program) 2022/11/17 09:47:28 fetching corpus: 8386, signal 261546/335313 (executing program) 2022/11/17 09:47:28 fetching corpus: 8435, signal 261900/335313 (executing program) 2022/11/17 09:47:28 fetching corpus: 8485, signal 262208/335318 (executing program) 2022/11/17 09:47:28 fetching corpus: 8535, signal 262753/335318 (executing program) 2022/11/17 09:47:29 fetching corpus: 8583, signal 263256/335328 (executing program) 2022/11/17 09:47:29 fetching corpus: 8632, signal 263615/335351 (executing program) 2022/11/17 09:47:29 fetching corpus: 8682, signal 263988/335351 (executing program) 2022/11/17 09:47:29 fetching corpus: 8732, signal 264323/335351 (executing program) 2022/11/17 09:47:29 fetching corpus: 8781, signal 264659/335351 (executing program) 2022/11/17 09:47:30 fetching corpus: 8831, signal 265074/335351 (executing program) 2022/11/17 09:47:30 fetching corpus: 8880, signal 265537/335351 (executing program) 2022/11/17 09:47:30 fetching corpus: 8930, signal 266041/335351 (executing program) 2022/11/17 09:47:31 fetching corpus: 8980, signal 266430/335351 (executing program) 2022/11/17 09:47:31 fetching corpus: 9030, signal 266897/335360 (executing program) 2022/11/17 09:47:31 fetching corpus: 9079, signal 267227/335367 (executing program) 2022/11/17 09:47:31 fetching corpus: 9129, signal 267591/335375 (executing program) 2022/11/17 09:47:31 fetching corpus: 9179, signal 268108/335375 (executing program) 2022/11/17 09:47:32 fetching corpus: 9229, signal 268457/335376 (executing program) 2022/11/17 09:47:32 fetching corpus: 9279, signal 268963/335377 (executing program) 2022/11/17 09:47:32 fetching corpus: 9327, signal 269429/335381 (executing program) 2022/11/17 09:47:33 fetching corpus: 9376, signal 269939/335414 (executing program) 2022/11/17 09:47:33 fetching corpus: 9426, signal 270379/335414 (executing program) 2022/11/17 09:47:33 fetching corpus: 9476, signal 270849/335414 (executing program) 2022/11/17 09:47:33 fetching corpus: 9526, signal 271161/335414 (executing program) 2022/11/17 09:47:33 fetching corpus: 9576, signal 271628/335423 (executing program) 2022/11/17 09:47:34 fetching corpus: 9626, signal 272001/335423 (executing program) 2022/11/17 09:47:34 fetching corpus: 9676, signal 272409/335464 (executing program) 2022/11/17 09:47:34 fetching corpus: 9726, signal 272887/335464 (executing program) 2022/11/17 09:47:34 fetching corpus: 9776, signal 273248/335465 (executing program) 2022/11/17 09:47:35 fetching corpus: 9826, signal 273599/335468 (executing program) 2022/11/17 09:47:35 fetching corpus: 9876, signal 274296/335478 (executing program) 2022/11/17 09:47:35 fetching corpus: 9926, signal 274604/335478 (executing program) 2022/11/17 09:47:35 fetching corpus: 9976, signal 274989/335478 (executing program) 2022/11/17 09:47:36 fetching corpus: 10026, signal 275520/335478 (executing program) 2022/11/17 09:47:36 fetching corpus: 10075, signal 275837/335486 (executing program) 2022/11/17 09:47:36 fetching corpus: 10125, signal 276181/335486 (executing program) 2022/11/17 09:47:36 fetching corpus: 10175, signal 276555/335497 (executing program) 2022/11/17 09:47:37 fetching corpus: 10225, signal 276907/335501 (executing program) 2022/11/17 09:47:37 fetching corpus: 10272, signal 277220/335505 (executing program) 2022/11/17 09:47:37 fetching corpus: 10322, signal 277566/335505 (executing program) 2022/11/17 09:47:38 fetching corpus: 10372, signal 278913/335507 (executing program) 2022/11/17 09:47:38 fetching corpus: 10422, signal 279206/335519 (executing program) 2022/11/17 09:47:38 fetching corpus: 10472, signal 279469/335519 (executing program) 2022/11/17 09:47:38 fetching corpus: 10522, signal 279849/335519 (executing program) 2022/11/17 09:47:39 fetching corpus: 10571, signal 280133/335520 (executing program) 2022/11/17 09:47:39 fetching corpus: 10619, signal 280465/335522 (executing program) 2022/11/17 09:47:39 fetching corpus: 10668, signal 280862/335529 (executing program) 2022/11/17 09:47:40 fetching corpus: 10716, signal 281200/335529 (executing program) 2022/11/17 09:47:40 fetching corpus: 10766, signal 281590/335529 (executing program) 2022/11/17 09:47:40 fetching corpus: 10816, signal 282009/335529 (executing program) 2022/11/17 09:47:40 fetching corpus: 10866, signal 282477/335529 (executing program) 2022/11/17 09:47:40 fetching corpus: 10916, signal 282865/335531 (executing program) 2022/11/17 09:47:41 fetching corpus: 10966, signal 285507/335553 (executing program) 2022/11/17 09:47:41 fetching corpus: 11016, signal 285910/335553 (executing program) 2022/11/17 09:47:41 fetching corpus: 11066, signal 286273/335553 (executing program) 2022/11/17 09:47:41 fetching corpus: 11116, signal 286542/335553 (executing program) 2022/11/17 09:47:41 fetching corpus: 11166, signal 286826/335553 (executing program) 2022/11/17 09:47:42 fetching corpus: 11216, signal 287136/335553 (executing program) 2022/11/17 09:47:42 fetching corpus: 11266, signal 287396/335553 (executing program) 2022/11/17 09:47:42 fetching corpus: 11316, signal 287715/335553 (executing program) 2022/11/17 09:47:42 fetching corpus: 11366, signal 288037/335553 (executing program) 2022/11/17 09:47:43 fetching corpus: 11416, signal 288302/335553 (executing program) 2022/11/17 09:47:43 fetching corpus: 11466, signal 288905/335553 (executing program) 2022/11/17 09:47:43 fetching corpus: 11515, signal 289260/335553 (executing program) 2022/11/17 09:47:44 fetching corpus: 11564, signal 289797/335553 (executing program) 2022/11/17 09:47:44 fetching corpus: 11613, signal 290039/335558 (executing program) 2022/11/17 09:47:44 fetching corpus: 11663, signal 290330/335558 (executing program) 2022/11/17 09:47:44 fetching corpus: 11713, signal 290674/335558 (executing program) 2022/11/17 09:47:45 fetching corpus: 11763, signal 290982/335559 (executing program) 2022/11/17 09:47:45 fetching corpus: 11812, signal 291263/335568 (executing program) 2022/11/17 09:47:45 fetching corpus: 11861, signal 291654/335568 (executing program) 2022/11/17 09:47:45 fetching corpus: 11911, signal 291916/335568 (executing program) 2022/11/17 09:47:46 fetching corpus: 11961, signal 292442/335568 (executing program) 2022/11/17 09:47:46 fetching corpus: 12011, signal 292810/335568 (executing program) 2022/11/17 09:47:46 fetching corpus: 12061, signal 293794/335576 (executing program) 2022/11/17 09:47:46 fetching corpus: 12111, signal 294019/335576 (executing program) 2022/11/17 09:47:46 fetching corpus: 12160, signal 294392/335577 (executing program) 2022/11/17 09:47:47 fetching corpus: 12209, signal 294656/335580 (executing program) 2022/11/17 09:47:47 fetching corpus: 12259, signal 295050/335591 (executing program) 2022/11/17 09:47:47 fetching corpus: 12309, signal 295308/335591 (executing program) 2022/11/17 09:47:47 fetching corpus: 12359, signal 295559/335595 (executing program) 2022/11/17 09:47:47 fetching corpus: 12409, signal 296003/335595 (executing program) 2022/11/17 09:47:47 fetching corpus: 12459, signal 296322/335599 (executing program) 2022/11/17 09:47:48 fetching corpus: 12509, signal 296654/335599 (executing program) 2022/11/17 09:47:48 fetching corpus: 12559, signal 296994/335600 (executing program) 2022/11/17 09:47:48 fetching corpus: 12609, signal 297274/335604 (executing program) 2022/11/17 09:47:48 fetching corpus: 12659, signal 297567/335604 (executing program) 2022/11/17 09:47:49 fetching corpus: 12709, signal 297862/335610 (executing program) 2022/11/17 09:47:49 fetching corpus: 12759, signal 298212/335616 (executing program) 2022/11/17 09:47:49 fetching corpus: 12809, signal 298489/335616 (executing program) 2022/11/17 09:47:49 fetching corpus: 12859, signal 298690/335616 (executing program) 2022/11/17 09:47:50 fetching corpus: 12909, signal 298957/335644 (executing program) 2022/11/17 09:47:50 fetching corpus: 12959, signal 299310/335667 (executing program) 2022/11/17 09:47:50 fetching corpus: 13009, signal 299707/335667 (executing program) 2022/11/17 09:47:50 fetching corpus: 13059, signal 300016/335667 (executing program) 2022/11/17 09:47:51 fetching corpus: 13109, signal 300229/335667 (executing program) 2022/11/17 09:47:51 fetching corpus: 13159, signal 300569/335667 (executing program) 2022/11/17 09:47:51 fetching corpus: 13209, signal 300866/335667 (executing program) 2022/11/17 09:47:51 fetching corpus: 13259, signal 301160/335667 (executing program) 2022/11/17 09:47:51 fetching corpus: 13309, signal 301404/335667 (executing program) 2022/11/17 09:47:52 fetching corpus: 13359, signal 301790/335667 (executing program) 2022/11/17 09:47:52 fetching corpus: 13409, signal 302053/335667 (executing program) 2022/11/17 09:47:52 fetching corpus: 13459, signal 302275/335667 (executing program) 2022/11/17 09:47:52 fetching corpus: 13509, signal 302597/335667 (executing program) 2022/11/17 09:47:52 fetching corpus: 13559, signal 302940/335667 (executing program) 2022/11/17 09:47:53 fetching corpus: 13609, signal 304171/335667 (executing program) 2022/11/17 09:47:53 fetching corpus: 13659, signal 304462/335667 (executing program) 2022/11/17 09:47:53 fetching corpus: 13709, signal 304787/335667 (executing program) 2022/11/17 09:47:53 fetching corpus: 13759, signal 305122/335667 (executing program) 2022/11/17 09:47:54 fetching corpus: 13809, signal 305470/335667 (executing program) 2022/11/17 09:47:54 fetching corpus: 13859, signal 305922/335667 (executing program) 2022/11/17 09:47:54 fetching corpus: 13909, signal 306177/335670 (executing program) 2022/11/17 09:47:54 fetching corpus: 13959, signal 306455/335670 (executing program) 2022/11/17 09:47:54 fetching corpus: 14009, signal 306835/335670 (executing program) 2022/11/17 09:47:55 fetching corpus: 14059, signal 307306/335670 (executing program) 2022/11/17 09:47:55 fetching corpus: 14109, signal 307563/335670 (executing program) 2022/11/17 09:47:55 fetching corpus: 14159, signal 307875/335671 (executing program) 2022/11/17 09:47:56 fetching corpus: 14208, signal 308356/335674 (executing program) 2022/11/17 09:47:56 fetching corpus: 14255, signal 308617/335675 (executing program) 2022/11/17 09:47:56 fetching corpus: 14304, signal 308892/335675 (executing program) 2022/11/17 09:47:56 fetching corpus: 14354, signal 309199/335675 (executing program) 2022/11/17 09:47:57 fetching corpus: 14403, signal 309475/335691 (executing program) 2022/11/17 09:47:57 fetching corpus: 14453, signal 309708/335691 (executing program) 2022/11/17 09:47:57 fetching corpus: 14503, signal 310063/335691 (executing program) 2022/11/17 09:47:57 fetching corpus: 14553, signal 310371/335691 (executing program) 2022/11/17 09:47:58 fetching corpus: 14603, signal 310603/335715 (executing program) 2022/11/17 09:47:58 fetching corpus: 14653, signal 310889/335715 (executing program) 2022/11/17 09:47:58 fetching corpus: 14703, signal 311144/335715 (executing program) 2022/11/17 09:47:58 fetching corpus: 14753, signal 311429/335715 (executing program) 2022/11/17 09:47:59 fetching corpus: 14803, signal 311691/335717 (executing program) 2022/11/17 09:47:59 fetching corpus: 14853, signal 311961/335754 (executing program) 2022/11/17 09:47:59 fetching corpus: 14901, signal 312266/335762 (executing program) 2022/11/17 09:47:59 fetching corpus: 14951, signal 312533/335762 (executing program) 2022/11/17 09:48:00 fetching corpus: 15001, signal 312738/335762 (executing program) 2022/11/17 09:48:00 fetching corpus: 15051, signal 313056/335762 (executing program) 2022/11/17 09:48:00 fetching corpus: 15101, signal 313426/335769 (executing program) 2022/11/17 09:48:00 fetching corpus: 15150, signal 313664/335783 (executing program) 2022/11/17 09:48:01 fetching corpus: 15199, signal 313906/335783 (executing program) 2022/11/17 09:48:01 fetching corpus: 15249, signal 314104/335785 (executing program) 2022/11/17 09:48:01 fetching corpus: 15298, signal 314318/335785 (executing program) 2022/11/17 09:48:01 fetching corpus: 15348, signal 314602/335794 (executing program) 2022/11/17 09:48:02 fetching corpus: 15398, signal 314832/335794 (executing program) 2022/11/17 09:48:02 fetching corpus: 15448, signal 315124/335798 (executing program) 2022/11/17 09:48:02 fetching corpus: 15498, signal 315462/335798 (executing program) 2022/11/17 09:48:03 fetching corpus: 15547, signal 315757/335826 (executing program) 2022/11/17 09:48:03 fetching corpus: 15597, signal 316002/335838 (executing program) 2022/11/17 09:48:03 fetching corpus: 15646, signal 316285/335838 (executing program) 2022/11/17 09:48:03 fetching corpus: 15696, signal 316467/335839 (executing program) 2022/11/17 09:48:04 fetching corpus: 15746, signal 316731/335839 (executing program) 2022/11/17 09:48:04 fetching corpus: 15796, signal 316992/335840 (executing program) 2022/11/17 09:48:04 fetching corpus: 15846, signal 317172/335840 (executing program) [ 132.710564][ T1249] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.716903][ T1249] ieee802154 phy1 wpan1: encryption failed: -22 2022/11/17 09:48:04 fetching corpus: 15896, signal 317435/335840 (executing program) 2022/11/17 09:48:04 fetching corpus: 15946, signal 317700/335840 (executing program) 2022/11/17 09:48:05 fetching corpus: 15996, signal 317987/335857 (executing program) 2022/11/17 09:48:05 fetching corpus: 16046, signal 318215/335857 (executing program) 2022/11/17 09:48:05 fetching corpus: 16096, signal 318478/335857 (executing program) 2022/11/17 09:48:05 fetching corpus: 16146, signal 318667/335857 (executing program) 2022/11/17 09:48:06 fetching corpus: 16196, signal 318924/335859 (executing program) 2022/11/17 09:48:06 fetching corpus: 16246, signal 319171/335860 (executing program) 2022/11/17 09:48:06 fetching corpus: 16296, signal 319458/335860 (executing program) 2022/11/17 09:48:06 fetching corpus: 16346, signal 319771/335861 (executing program) 2022/11/17 09:48:06 fetching corpus: 16395, signal 320064/335876 (executing program) 2022/11/17 09:48:06 fetching corpus: 16445, signal 320326/335876 (executing program) 2022/11/17 09:48:07 fetching corpus: 16495, signal 320615/335892 (executing program) 2022/11/17 09:48:07 fetching corpus: 16543, signal 320894/335893 (executing program) 2022/11/17 09:48:07 fetching corpus: 16593, signal 321124/335893 (executing program) 2022/11/17 09:48:08 fetching corpus: 16642, signal 321376/335913 (executing program) 2022/11/17 09:48:08 fetching corpus: 16692, signal 321619/335916 (executing program) 2022/11/17 09:48:08 fetching corpus: 16742, signal 321831/335916 (executing program) 2022/11/17 09:48:08 fetching corpus: 16792, signal 322052/335916 (executing program) 2022/11/17 09:48:09 fetching corpus: 16842, signal 322274/335916 (executing program) 2022/11/17 09:48:09 fetching corpus: 16892, signal 322543/335918 (executing program) 2022/11/17 09:48:09 fetching corpus: 16942, signal 322751/335918 (executing program) 2022/11/17 09:48:09 fetching corpus: 16992, signal 323236/335918 (executing program) 2022/11/17 09:48:10 fetching corpus: 17042, signal 323542/335919 (executing program) 2022/11/17 09:48:10 fetching corpus: 17092, signal 323770/335947 (executing program) 2022/11/17 09:48:10 fetching corpus: 17142, signal 324000/335947 (executing program) 2022/11/17 09:48:10 fetching corpus: 17191, signal 324332/335957 (executing program) 2022/11/17 09:48:10 fetching corpus: 17240, signal 324515/335957 (executing program) 2022/11/17 09:48:11 fetching corpus: 17290, signal 324706/335957 (executing program) 2022/11/17 09:48:11 fetching corpus: 17340, signal 324885/335962 (executing program) 2022/11/17 09:48:11 fetching corpus: 17389, signal 325068/335962 (executing program) 2022/11/17 09:48:11 fetching corpus: 17438, signal 325244/335962 (executing program) 2022/11/17 09:48:11 fetching corpus: 17488, signal 325418/335975 (executing program) 2022/11/17 09:48:12 fetching corpus: 17538, signal 325632/335975 (executing program) 2022/11/17 09:48:12 fetching corpus: 17587, signal 325821/335975 (executing program) 2022/11/17 09:48:12 fetching corpus: 17637, signal 326003/335981 (executing program) 2022/11/17 09:48:12 fetching corpus: 17687, signal 326353/335991 (executing program) 2022/11/17 09:48:12 fetching corpus: 17736, signal 326564/335991 (executing program) 2022/11/17 09:48:13 fetching corpus: 17786, signal 326914/336003 (executing program) 2022/11/17 09:48:13 fetching corpus: 17836, signal 327120/336021 (executing program) 2022/11/17 09:48:13 fetching corpus: 17886, signal 327382/336023 (executing program) 2022/11/17 09:48:13 fetching corpus: 17936, signal 327541/336023 (executing program) 2022/11/17 09:48:14 fetching corpus: 17986, signal 327838/336023 (executing program) 2022/11/17 09:48:14 fetching corpus: 18036, signal 328136/336023 (executing program) 2022/11/17 09:48:14 fetching corpus: 18086, signal 328375/336023 (executing program) 2022/11/17 09:48:14 fetching corpus: 18136, signal 328586/336023 (executing program) 2022/11/17 09:48:15 fetching corpus: 18186, signal 328851/336023 (executing program) 2022/11/17 09:48:15 fetching corpus: 18236, signal 329145/336023 (executing program) 2022/11/17 09:48:15 fetching corpus: 18286, signal 329326/336023 (executing program) 2022/11/17 09:48:15 fetching corpus: 18336, signal 329654/336023 (executing program) 2022/11/17 09:48:16 fetching corpus: 18386, signal 329823/336023 (executing program) 2022/11/17 09:48:16 fetching corpus: 18436, signal 330021/336023 (executing program) 2022/11/17 09:48:16 fetching corpus: 18486, signal 330211/336023 (executing program) 2022/11/17 09:48:16 fetching corpus: 18536, signal 330382/336023 (executing program) 2022/11/17 09:48:16 fetching corpus: 18586, signal 330745/336023 (executing program) 2022/11/17 09:48:17 fetching corpus: 18636, signal 330959/336023 (executing program) 2022/11/17 09:48:17 fetching corpus: 18686, signal 331387/336032 (executing program) 2022/11/17 09:48:17 fetching corpus: 18736, signal 331569/336032 (executing program) 2022/11/17 09:48:17 fetching corpus: 18786, signal 331752/336032 (executing program) 2022/11/17 09:48:18 fetching corpus: 18836, signal 331973/336032 (executing program) 2022/11/17 09:48:18 fetching corpus: 18886, signal 332173/336032 (executing program) 2022/11/17 09:48:18 fetching corpus: 18936, signal 332351/336032 (executing program) 2022/11/17 09:48:18 fetching corpus: 18986, signal 332585/336032 (executing program) 2022/11/17 09:48:18 fetching corpus: 19036, signal 332795/336032 (executing program) 2022/11/17 09:48:19 fetching corpus: 19086, signal 333039/336032 (executing program) 2022/11/17 09:48:19 fetching corpus: 19136, signal 333325/336043 (executing program) 2022/11/17 09:48:19 fetching corpus: 19172, signal 333464/336043 (executing program) 2022/11/17 09:48:19 fetching corpus: 19172, signal 333464/336043 (executing program) 2022/11/17 09:48:22 starting 6 fuzzer processes 09:48:22 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x6, 0x8000031, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000022c0)=""/4086, &(0x7f0000000000)=0xff6) 09:48:22 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:22 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="0212000003000000000000000000000001000008"], 0x18}}, 0x0) 09:48:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x4c, 0x2, 0x6, 0x5, 0x6c, 0x87400, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x40afc}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:48:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x20d) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)) write$ppp(r0, &(0x7f0000000080)='\x00!', 0x2) 09:48:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000008ec0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @private2}, 0x1c, 0x0}}], 0x1, 0x0) [ 151.067489][ T3675] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 151.076205][ T3675] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 151.084248][ T3675] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 151.092259][ T3675] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 151.100072][ T3675] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 151.107440][ T3675] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 151.116136][ T3672] Bluetooth: hci0: HCI_REQ-0x0c1a [ 151.144850][ T3677] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 151.193076][ T3688] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 151.201364][ T3688] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 151.215959][ T3690] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 151.225446][ T3690] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 151.233656][ T3690] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 151.241012][ T3690] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 151.248990][ T3690] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 151.257389][ T3690] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 151.267516][ T3690] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 151.275275][ T3690] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 151.282613][ T3690] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 151.290627][ T3690] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 151.298603][ T3690] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 151.306195][ T3690] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 151.316226][ T3690] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 151.325919][ T3690] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 151.333788][ T3690] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 151.341055][ T3690] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 151.348376][ T3690] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 151.356729][ T3690] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 151.364071][ T3690] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 151.367405][ T3672] chnl_net:caif_netlink_parms(): no params data found [ 151.371207][ T3690] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 151.385254][ T3691] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 151.386295][ T3690] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 151.393118][ T3691] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 151.400895][ T3690] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 151.414190][ T3675] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 151.422035][ T3678] Bluetooth: hci1: HCI_REQ-0x0c1a [ 151.428097][ T3680] Bluetooth: hci4: HCI_REQ-0x0c1a [ 151.435948][ T3679] Bluetooth: hci2: HCI_REQ-0x0c1a [ 151.435997][ T3681] Bluetooth: hci3: HCI_REQ-0x0c1a [ 151.454894][ T3691] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 151.462678][ T3691] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 151.471649][ T3692] Bluetooth: hci5: HCI_REQ-0x0c1a [ 151.572341][ T3672] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.580046][ T3672] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.588040][ T3672] device bridge_slave_0 entered promiscuous mode [ 151.600269][ T3672] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.607354][ T3672] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.615216][ T3672] device bridge_slave_1 entered promiscuous mode [ 151.706171][ T3672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 151.724164][ T3672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 151.778317][ T3672] team0: Port device team_slave_0 added [ 151.814711][ T3672] team0: Port device team_slave_1 added [ 151.877958][ T3672] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 151.885085][ T3672] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 151.911143][ T3672] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 151.962562][ T3672] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 151.969550][ T3672] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 151.995746][ T3672] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 152.138200][ T3672] device hsr_slave_0 entered promiscuous mode [ 152.145143][ T3672] device hsr_slave_1 entered promiscuous mode [ 152.154362][ T3679] chnl_net:caif_netlink_parms(): no params data found [ 152.182847][ T3681] chnl_net:caif_netlink_parms(): no params data found [ 152.297125][ T3692] chnl_net:caif_netlink_parms(): no params data found [ 152.377174][ T3679] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.384467][ T3679] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.392641][ T3679] device bridge_slave_0 entered promiscuous mode [ 152.400912][ T3678] chnl_net:caif_netlink_parms(): no params data found [ 152.427716][ T3679] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.436560][ T3679] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.450863][ T3679] device bridge_slave_1 entered promiscuous mode [ 152.524125][ T3681] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.531403][ T3681] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.539733][ T3681] device bridge_slave_0 entered promiscuous mode [ 152.548940][ T3680] chnl_net:caif_netlink_parms(): no params data found [ 152.589570][ T3681] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.596677][ T3681] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.605013][ T3681] device bridge_slave_1 entered promiscuous mode [ 152.626932][ T3679] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.684873][ T3679] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.723149][ T3692] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.730386][ T3692] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.738291][ T3692] device bridge_slave_0 entered promiscuous mode [ 152.748132][ T3692] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.755400][ T3692] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.763322][ T3692] device bridge_slave_1 entered promiscuous mode [ 152.772405][ T3681] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.789464][ T3681] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.806506][ T3678] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.813740][ T3678] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.823353][ T3678] device bridge_slave_0 entered promiscuous mode [ 152.838409][ T3678] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.846966][ T3678] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.857822][ T3678] device bridge_slave_1 entered promiscuous mode [ 152.892478][ T3679] team0: Port device team_slave_0 added [ 152.942849][ T3679] team0: Port device team_slave_1 added [ 152.971360][ T3678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.982684][ T3692] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.994946][ T3681] team0: Port device team_slave_0 added [ 153.054732][ T3680] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.074374][ T3680] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.086104][ T3680] device bridge_slave_0 entered promiscuous mode [ 153.104456][ T3678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 153.115484][ T3692] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 153.147371][ T3681] team0: Port device team_slave_1 added [ 153.154468][ T3679] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 153.165017][ T3679] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.198905][ T3679] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 153.210063][ T3694] Bluetooth: hci0: command 0x0409 tx timeout [ 153.226592][ T3680] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.245795][ T3680] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.256320][ T3680] device bridge_slave_1 entered promiscuous mode [ 153.335958][ T3679] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 153.343360][ T3679] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.369547][ T3679] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 153.399685][ T3678] team0: Port device team_slave_0 added [ 153.413753][ T3692] team0: Port device team_slave_0 added [ 153.485171][ T3678] team0: Port device team_slave_1 added [ 153.496090][ T3692] team0: Port device team_slave_1 added [ 153.509093][ T3694] Bluetooth: hci4: command 0x0409 tx timeout [ 153.515379][ T3694] Bluetooth: hci3: command 0x0409 tx timeout [ 153.522222][ T3688] Bluetooth: hci5: command 0x0409 tx timeout [ 153.528444][ T3688] Bluetooth: hci1: command 0x0409 tx timeout [ 153.535296][ T3691] Bluetooth: hci2: command 0x0409 tx timeout [ 153.539341][ T3681] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 153.548413][ T3681] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.581838][ T3681] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 153.614324][ T3680] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 153.641541][ T3681] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 153.648514][ T3681] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.675165][ T3681] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 153.695272][ T3679] device hsr_slave_0 entered promiscuous mode [ 153.702206][ T3679] device hsr_slave_1 entered promiscuous mode [ 153.708690][ T3679] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 153.716852][ T3679] Cannot create hsr debugfs directory [ 153.724154][ T3680] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 153.760428][ T3692] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 153.767417][ T3692] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.793551][ T3692] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 153.815396][ T3678] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 153.822551][ T3678] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.849202][ T3678] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 153.862679][ T3672] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 153.889546][ T3692] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 153.896526][ T3692] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.922663][ T3692] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 153.943644][ T3678] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 153.950666][ T3678] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.977756][ T3678] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 153.994899][ T3672] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 154.006901][ T3672] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 154.031102][ T3680] team0: Port device team_slave_0 added [ 154.048317][ T3672] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 154.063880][ T3681] device hsr_slave_0 entered promiscuous mode [ 154.071750][ T3681] device hsr_slave_1 entered promiscuous mode [ 154.078497][ T3681] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 154.088201][ T3681] Cannot create hsr debugfs directory [ 154.124164][ T3680] team0: Port device team_slave_1 added [ 154.152511][ T3692] device hsr_slave_0 entered promiscuous mode [ 154.159612][ T3692] device hsr_slave_1 entered promiscuous mode [ 154.166399][ T3692] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 154.174032][ T3692] Cannot create hsr debugfs directory [ 154.202326][ T3680] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 154.213637][ T3680] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 154.240148][ T3680] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 154.287307][ T3680] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 154.294472][ T3680] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 154.322050][ T3680] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 154.344524][ T3678] device hsr_slave_0 entered promiscuous mode [ 154.351578][ T3678] device hsr_slave_1 entered promiscuous mode [ 154.358187][ T3678] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 154.368894][ T3678] Cannot create hsr debugfs directory [ 154.504225][ T3680] device hsr_slave_0 entered promiscuous mode [ 154.511150][ T3680] device hsr_slave_1 entered promiscuous mode [ 154.517677][ T3680] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 154.528939][ T3680] Cannot create hsr debugfs directory [ 154.806307][ T3679] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 154.828241][ T3672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.837553][ T3679] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 154.861639][ T3679] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 154.876943][ T3679] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 154.894973][ T3672] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.917282][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.926942][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.964985][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.982806][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.992595][ T3726] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.999990][ T3726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.008694][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.018054][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.027320][ T3726] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.034470][ T3726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.074821][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.083005][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.092101][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.103043][ T3681] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 155.115079][ T3681] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 155.124325][ T3681] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 155.156391][ T3681] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 155.183192][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.201743][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.258160][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.267263][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.275282][ T3684] Bluetooth: hci0: command 0x041b tx timeout [ 155.283106][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.292720][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.301655][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.333551][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.342556][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.353768][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.368623][ T3692] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 155.386875][ T3692] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 155.426931][ T3679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.461232][ T3692] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 155.482722][ T3692] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 155.563801][ T3680] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 155.578288][ T3679] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.586112][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.594244][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.601647][ T3688] Bluetooth: hci1: command 0x041b tx timeout [ 155.607683][ T3688] Bluetooth: hci3: command 0x041b tx timeout [ 155.610540][ T3684] Bluetooth: hci2: command 0x041b tx timeout [ 155.614151][ T3688] Bluetooth: hci5: command 0x041b tx timeout [ 155.620220][ T3694] Bluetooth: hci4: command 0x041b tx timeout [ 155.648461][ T3680] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 155.674617][ T3680] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 155.693840][ T3680] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 155.776852][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.786046][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.795290][ T14] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.802489][ T14] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.810684][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.820764][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.838005][ T14] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.845278][ T14] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.853761][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.863997][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.926936][ T3679] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 155.937779][ T3679] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 155.955691][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.965860][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.975667][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.984591][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.994090][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.003243][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.012379][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.021405][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.030358][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.039939][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.047801][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.075702][ T3681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.104511][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 156.120189][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 156.134043][ T3672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.179414][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.187517][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.214056][ T3678] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 156.240673][ T3681] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.265034][ T3678] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 156.276790][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 156.286794][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.299665][ T3692] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.332408][ T3678] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 156.350276][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.359574][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.368604][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.376170][ T3299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.384838][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.395923][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.404644][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.411803][ T3299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.420518][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.433368][ T3299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.457029][ T3678] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 156.478132][ T3692] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.488467][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.500347][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 156.516296][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.526811][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.543306][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 156.556631][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.569065][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.577781][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.586588][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.594606][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.602981][ T3672] device veth0_vlan entered promiscuous mode [ 156.616143][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 156.625478][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.634626][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.643420][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.703009][ T3680] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.716805][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.727905][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.736544][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.745172][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.753876][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.761051][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.769024][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.777915][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.786518][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.793762][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.801984][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 156.809732][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 156.836277][ T3681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.851973][ T3672] device veth1_vlan entered promiscuous mode [ 156.862692][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.874759][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.907456][ T3679] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.919790][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.937229][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.945726][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.964447][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.974105][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 156.989115][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.027164][ T3680] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.035129][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.047291][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.056814][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.065947][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.074520][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.083712][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.122060][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.153758][ T3672] device veth0_macvtap entered promiscuous mode [ 157.164604][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 157.174943][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 157.193242][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.202911][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.212025][ T3726] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.219288][ T3726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.237780][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 157.246536][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.255191][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.278223][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.296101][ T3726] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.303286][ T3726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.311334][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.320368][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.329370][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.338033][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.348928][ T3684] Bluetooth: hci0: command 0x040f tx timeout [ 157.366679][ T3672] device veth1_macvtap entered promiscuous mode [ 157.414829][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 157.427425][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.437963][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.448421][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 157.464836][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 157.474421][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.528377][ T3681] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.538376][ T3680] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 157.549899][ T3680] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 157.577136][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.586915][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.604433][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.616291][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.633504][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.646613][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.655613][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 157.664526][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.672353][ T3684] Bluetooth: hci5: command 0x040f tx timeout [ 157.672394][ T3684] Bluetooth: hci3: command 0x040f tx timeout [ 157.672752][ T3684] Bluetooth: hci1: command 0x040f tx timeout [ 157.679499][ T3694] Bluetooth: hci4: command 0x040f tx timeout [ 157.689337][ T3672] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 157.691706][ T3684] Bluetooth: hci2: command 0x040f tx timeout [ 157.700346][ T3678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.723792][ T3679] device veth0_vlan entered promiscuous mode [ 157.738594][ T3672] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 157.747183][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.755410][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.763582][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.772057][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.781251][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.790551][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.801986][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.821398][ T3678] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.851333][ T3679] device veth1_vlan entered promiscuous mode [ 157.865931][ T3672] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 157.875951][ T3672] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 157.885485][ T3672] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 157.903227][ T3672] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 157.929562][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.937540][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.975350][ T3692] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.007680][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 158.016760][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 158.033395][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.046521][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.069816][ T155] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.077094][ T155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.099718][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 158.108607][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.186187][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.204293][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.213918][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.223261][ T14] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.230438][ T14] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.238068][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.247007][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.255513][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.290712][ T3681] device veth0_vlan entered promiscuous mode [ 158.302096][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.310744][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.319286][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.328319][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.338138][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.355847][ T3679] device veth0_macvtap entered promiscuous mode [ 158.402247][ T3681] device veth1_vlan entered promiscuous mode [ 158.426148][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 158.445354][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 158.458114][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 158.475461][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 158.483321][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.492784][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.501413][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.510616][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.521707][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.535465][ T3680] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.547075][ T3679] device veth1_macvtap entered promiscuous mode [ 158.611041][ T46] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 158.636793][ T46] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 158.646384][ T3729] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.670125][ T3729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.679140][ T3729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.709354][ T3729] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 158.749562][ T3729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.758166][ T3729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.811106][ T46] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 158.820360][ T3679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 158.826996][ T46] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 158.852903][ T3679] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 158.890432][ T3679] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 158.900981][ T3678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 158.917295][ T3681] device veth0_macvtap entered promiscuous mode [ 158.926277][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 158.934237][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 158.943898][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.953937][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.962677][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.976922][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 159.013372][ T3679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 159.041201][ T3679] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.055847][ T3679] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 159.067335][ T3679] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.088847][ T3679] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.097608][ T3679] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.129095][ T3679] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.160445][ T3727] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.180237][ T3727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.199890][ T3681] device veth1_macvtap entered promiscuous mode [ 159.261851][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 159.277859][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.315152][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.350164][ T3727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 159.360056][ T3727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.395968][ T3692] device veth0_vlan entered promiscuous mode [ 159.429051][ T3694] Bluetooth: hci0: command 0x0419 tx timeout 09:48:31 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x6, 0x8000031, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000022c0)=""/4086, &(0x7f0000000000)=0xff6) [ 159.447147][ T3681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 159.463435][ T3681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.474884][ T3681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 159.486452][ T3681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:48:31 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x6, 0x8000031, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000022c0)=""/4086, &(0x7f0000000000)=0xff6) [ 159.498422][ T3681] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 159.524051][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 09:48:31 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x6, 0x8000031, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000022c0)=""/4086, &(0x7f0000000000)=0xff6) [ 159.554702][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.590225][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 09:48:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001a40)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x3c, 0x0, 0xa, 0x5, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}], {0x14, 0x11, 0x1, 0xf000000}}, 0x78}}, 0x0) [ 159.615634][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 09:48:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001a40)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x3c, 0x0, 0xa, 0x5, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}], {0x14, 0x11, 0x1, 0xf000000}}, 0x78}}, 0x0) [ 159.662161][ T3692] device veth1_vlan entered promiscuous mode [ 159.673364][ T3681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 159.684735][ T3681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.695313][ T3681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 159.706315][ T3681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:48:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001a40)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x3c, 0x0, 0xa, 0x5, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}], {0x14, 0x11, 0x1, 0xf000000}}, 0x78}}, 0x0) [ 159.735993][ T3681] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 159.750338][ T3694] Bluetooth: hci2: command 0x0419 tx timeout [ 159.756407][ T3694] Bluetooth: hci4: command 0x0419 tx timeout [ 159.764823][ T3684] Bluetooth: hci1: command 0x0419 tx timeout [ 159.771360][ T3691] Bluetooth: hci3: command 0x0419 tx timeout [ 159.771382][ T3688] Bluetooth: hci5: command 0x0419 tx timeout 09:48:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001a40)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x3c, 0x0, 0xa, 0x5, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}], {0x14, 0x11, 0x1, 0xf000000}}, 0x78}}, 0x0) [ 159.810348][ T3735] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.828114][ T3735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.837771][ T3735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.869266][ T3735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.897783][ T3735] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 159.906211][ T3735] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 159.918130][ T102] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 159.927682][ T3681] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.937571][ T3681] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.943747][ T102] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 159.946976][ T3681] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.962835][ T3681] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.001329][ T3729] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 160.023342][ T3678] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.052132][ T3727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 160.062945][ T3727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.100728][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.108704][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.146238][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 160.159779][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 160.169470][ T3692] device veth0_macvtap entered promiscuous mode [ 160.181881][ T3680] device veth0_vlan entered promiscuous mode [ 160.210847][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 160.212843][ T102] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 160.226148][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 160.230558][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 160.235960][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 160.249820][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 160.267480][ T3692] device veth1_macvtap entered promiscuous mode [ 160.268580][ T102] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 160.297870][ T3680] device veth1_vlan entered promiscuous mode [ 160.307640][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 160.316707][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 160.325041][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 160.333483][ T3730] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 160.348308][ T3678] device veth0_vlan entered promiscuous mode [ 160.430045][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 160.438143][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 160.446714][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.455703][ T3692] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 160.466621][ T3692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.480613][ T3692] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 160.491553][ T3692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.501934][ T3692] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 160.513093][ T3692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.527632][ T3692] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 160.541952][ T3678] device veth1_vlan entered promiscuous mode [ 160.560214][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.563263][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 160.568241][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.575998][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 160.593417][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 160.602214][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 160.613463][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 160.622376][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 160.634414][ T3692] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 160.647046][ T3692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.658061][ T3692] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 160.671394][ T3692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.681844][ T3692] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 160.695971][ T3692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.707778][ T3692] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 160.724065][ T3692] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.732878][ T3692] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.743863][ T3692] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.756994][ T3692] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.774177][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 160.783345][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 160.798226][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.807270][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 160.816016][ T3726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 160.827952][ T3680] device veth0_macvtap entered promiscuous mode [ 160.875569][ T3680] device veth1_macvtap entered promiscuous mode [ 160.971328][ T3680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 160.985933][ T3680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.998550][ T3680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.009620][ T3680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.019735][ T3680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.034919][ T3680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.046694][ T3680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.057499][ T3680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.069734][ T3680] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 161.084371][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 161.094059][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.102906][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.111915][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.121399][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.138643][ T3678] device veth0_macvtap entered promiscuous mode [ 161.162651][ T3680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.174039][ T3680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.184343][ T3680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.196564][ T3680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.206570][ T3680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.217160][ T3680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.227066][ T3680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.237650][ T3680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.249482][ T3680] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 161.259664][ T3678] device veth1_macvtap entered promiscuous mode [ 161.277918][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 161.287681][ T46] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 161.292001][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.302225][ T46] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 161.305609][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.320618][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.333631][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 161.344690][ T3680] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.356333][ T3680] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.365337][ T3680] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.377032][ T3680] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.414994][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 161.423987][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 161.430406][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.444033][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.454682][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.465422][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.477953][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.488636][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.498967][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.512862][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.522993][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.533686][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.544939][ T3678] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 161.556415][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 161.564563][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.573376][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.615061][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.626168][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.636626][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.647306][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.657236][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.667825][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.678538][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.689148][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.701422][ T3678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.712542][ T3678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.724091][ T3678] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 161.740320][ T3755] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.756698][ T3755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.775853][ T3678] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.786230][ T3678] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.795893][ T3678] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.804715][ T3678] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.893438][ T3777] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 161.906944][ T3777] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 161.927505][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 162.009417][ T3777] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 162.018353][ T3777] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 162.021956][ T102] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 162.033684][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 162.069828][ T102] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 162.090615][ T3729] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 162.106031][ T46] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 09:48:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:33 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) [ 162.122896][ T46] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 162.134734][ T937] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:48:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x4c, 0x2, 0x6, 0x5, 0x6c, 0x87400, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x40afc}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:48:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x20d) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)) write$ppp(r0, &(0x7f0000000080)='\x00!', 0x2) 09:48:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="0212000003000000000000000000000001000008"], 0x18}}, 0x0) 09:48:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x20d) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)) write$ppp(r0, &(0x7f0000000080)='\x00!', 0x2) 09:48:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:34 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) 09:48:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="0212000003000000000000000000000001000008"], 0x18}}, 0x0) 09:48:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:34 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) 09:48:34 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) 09:48:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x20d) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)) write$ppp(r0, &(0x7f0000000080)='\x00!', 0x2) 09:48:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x4c, 0x2, 0x6, 0x5, 0x6c, 0x87400, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x40afc}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:48:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="0212000003000000000000000000000001000008"], 0x18}}, 0x0) 09:48:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x20d) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)) write$ppp(r0, &(0x7f0000000080)='\x00!', 0x2) 09:48:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:34 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:34 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=@newtaction={0x48, 0x31, 0x53b, 0x0, 0x0, {}, [{0x34, 0x1, [@m_sample={0x30, 0x1, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 09:48:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x20d) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)) write$ppp(r0, &(0x7f0000000080)='\x00!', 0x2) 09:48:34 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x4c, 0x2, 0x6, 0x5, 0x6c, 0x87400, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x40afc}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:48:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x20d) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)) write$ppp(r0, &(0x7f0000000080)='\x00!', 0x2) 09:48:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x45, &(0x7f0000000000), 0x4) 09:48:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:34 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 09:48:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x45, &(0x7f0000000000), 0x4) 09:48:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) splice(r2, 0x0, r0, 0x0, 0x10000, 0x0) 09:48:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="000000000300034000", 0x9) 09:48:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000140)='\\', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:48:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) 09:48:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x45, &(0x7f0000000000), 0x4) 09:48:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) splice(r2, 0x0, r0, 0x0, 0x10000, 0x0) 09:48:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="000000000300034000", 0x9) 09:48:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) splice(r2, 0x0, r0, 0x0, 0x10000, 0x0) 09:48:35 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x45, &(0x7f0000000000), 0x4) 09:48:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) splice(r2, 0x0, r0, 0x0, 0x10000, 0x0) 09:48:35 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="000000000300034000", 0x9) 09:48:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) splice(r2, 0x0, r0, 0x0, 0x10000, 0x0) [ 163.247456][ T27] audit: type=1804 audit(1668678514.988:2): pid=3863 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2620065377/syzkaller.SV9ZFw/4/cgroup.controllers" dev="sda1" ino=1177 res=1 errno=0 09:48:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) splice(r2, 0x0, r0, 0x0, 0x10000, 0x0) 09:48:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) 09:48:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="918333bfd788fa571b4dea5d27c893812127ce4a14218d35e32749f7d0e80f586237bde3954fb07fff06447040661ae406accf5032dcdfa83d000000000000060d65", @ANYRES16, @ANYBLOB="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"], 0x18}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x234}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1e}}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x50}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400), 0x10, &(0x7f0000000540)={&(0x7f00000006c0)=ANY=[@ANYBLOB="06000033853729a11f5ca837156fa614a73bd90024000000080000000003000079ba731a79656bc8ee84c9d94de3806114fc3ba61ffe58ba292a954486133ec5bdfcec629e9d60d3e2b3d9d7516c20d8ccf9c54dc66ead04006c643225dd4171a7835916681562872a25ad596467e28c2ec858b6bb25f9b23fd4a841fbf945cc6eab6809e2de86d801494f668fac84cb0da4ff7602599f904dd2", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="040000c0010000000000002006020000e372f26257e01c35"], 0x48}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000480)='rpcgss_import_ctx\x00'}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20080001) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0x421, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad, 0x60e1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffe}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}, @IFLA_GROUP={0x8, 0x1b, 0x7fff}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x78}}, 0x2) 09:48:35 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="000000000300034000", 0x9) 09:48:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) splice(r2, 0x0, r0, 0x0, 0x10000, 0x0) 09:48:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) 09:48:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) 09:48:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, 0x2, 0x6, 0x7, 0x5, 0x9000000, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x54}}, 0x0) 09:48:35 executing program 2: r0 = socket(0x22, 0x2, 0x2) syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), r0) [ 164.011258][ T3893] device vlan2 entered promiscuous mode 09:48:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, 0x2, 0x6, 0x7, 0x5, 0x9000000, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x54}}, 0x0) 09:48:35 executing program 2: r0 = socket(0x22, 0x2, 0x2) syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), r0) [ 164.080767][ T3893] device team0 entered promiscuous mode [ 164.133567][ T3893] device team_slave_0 entered promiscuous mode 09:48:36 executing program 2: r0 = socket(0x22, 0x2, 0x2) syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), r0) [ 164.189223][ T3893] device team_slave_1 entered promiscuous mode [ 164.206814][ T27] audit: type=1804 audit(1668678515.948:3): pid=3899 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir1688402279/syzkaller.RFdulK/5/cgroup.controllers" dev="sda1" ino=1168 res=1 errno=0 09:48:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, 0x2, 0x6, 0x7, 0x5, 0x9000000, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x54}}, 0x0) [ 164.302358][ T27] audit: type=1804 audit(1668678515.978:4): pid=3894 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2620065377/syzkaller.SV9ZFw/5/cgroup.controllers" dev="sda1" ino=1177 res=1 errno=0 [ 164.424014][ T27] audit: type=1804 audit(1668678516.008:5): pid=3896 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2801600919/syzkaller.3la7Df/11/cgroup.controllers" dev="sda1" ino=1178 res=1 errno=0 09:48:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) 09:48:36 executing program 2: r0 = socket(0x22, 0x2, 0x2) syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), r0) 09:48:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, 0x2, 0x6, 0x7, 0x5, 0x9000000, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x54}}, 0x0) 09:48:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="918333bfd788fa571b4dea5d27c893812127ce4a14218d35e32749f7d0e80f586237bde3954fb07fff06447040661ae406accf5032dcdfa83d000000000000060d65", @ANYRES16, @ANYBLOB="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"], 0x18}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x234}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1e}}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x50}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400), 0x10, &(0x7f0000000540)={&(0x7f00000006c0)=ANY=[@ANYBLOB="06000033853729a11f5ca837156fa614a73bd90024000000080000000003000079ba731a79656bc8ee84c9d94de3806114fc3ba61ffe58ba292a954486133ec5bdfcec629e9d60d3e2b3d9d7516c20d8ccf9c54dc66ead04006c643225dd4171a7835916681562872a25ad596467e28c2ec858b6bb25f9b23fd4a841fbf945cc6eab6809e2de86d801494f668fac84cb0da4ff7602599f904dd2", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="040000c0010000000000002006020000e372f26257e01c35"], 0x48}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000480)='rpcgss_import_ctx\x00'}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20080001) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0x421, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad, 0x60e1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffe}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}, @IFLA_GROUP={0x8, 0x1b, 0x7fff}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x78}}, 0x2) 09:48:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="918333bfd788fa571b4dea5d27c893812127ce4a14218d35e32749f7d0e80f586237bde3954fb07fff06447040661ae406accf5032dcdfa83d000000000000060d65", @ANYRES16, @ANYBLOB="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"], 0x18}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x234}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1e}}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x50}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400), 0x10, &(0x7f0000000540)={&(0x7f00000006c0)=ANY=[@ANYBLOB="06000033853729a11f5ca837156fa614a73bd90024000000080000000003000079ba731a79656bc8ee84c9d94de3806114fc3ba61ffe58ba292a954486133ec5bdfcec629e9d60d3e2b3d9d7516c20d8ccf9c54dc66ead04006c643225dd4171a7835916681562872a25ad596467e28c2ec858b6bb25f9b23fd4a841fbf945cc6eab6809e2de86d801494f668fac84cb0da4ff7602599f904dd2", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="040000c0010000000000002006020000e372f26257e01c35"], 0x48}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000480)='rpcgss_import_ctx\x00'}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20080001) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0x421, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad, 0x60e1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffe}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}, @IFLA_GROUP={0x8, 0x1b, 0x7fff}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x78}}, 0x2) 09:48:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) 09:48:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) 09:48:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) [ 164.803087][ T3925] device vlan2 entered promiscuous mode [ 164.817476][ T3925] device team0 entered promiscuous mode 09:48:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="918333bfd788fa571b4dea5d27c893812127ce4a14218d35e32749f7d0e80f586237bde3954fb07fff06447040661ae406accf5032dcdfa83d000000000000060d65", @ANYRES16, @ANYBLOB="cbd000000000000000001e335c303300ee52947d5e517a000000000000000000000000d834d136ef1de152ac9402107817f5cbfab5f835fe5e3da48f01b23691e644fcc40c8d976096c535c8aa20539f24a1ad8f0b1f852eb916cb368080270851c0cbc98773cdf98f22a8d669e9093dbab1993b47d08f1eb6f75da2c458754347170dff9cc804322470f9bd00496179d3f379a294ba3305ab043adf98aa12ef0a16acb8b8d2f4890f02cf1c39f3c6e47222a3795733e0bd3b7ca8371c2db868bba8f875ff6b92d59e4683cee64ad1fb1e7e4f04b5af3365bdfa0331e313e6cf610b9041888828721a776600455bf5346c4a8f9eccde8779199feb2fc8c8049025680164ab41ffa8e124e3aac512d1fd4b056e144a1bf49b96382138ec496ee4cb616e3b20ee0f309e3a4f5faf504b5527bd80c7e449fa337ddc19a9b66d6ce49bc80f2b901b6aee52b90d1cd412a8"], 0x18}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x234}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1e}}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x50}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400), 0x10, &(0x7f0000000540)={&(0x7f00000006c0)=ANY=[@ANYBLOB="06000033853729a11f5ca837156fa614a73bd90024000000080000000003000079ba731a79656bc8ee84c9d94de3806114fc3ba61ffe58ba292a954486133ec5bdfcec629e9d60d3e2b3d9d7516c20d8ccf9c54dc66ead04006c643225dd4171a7835916681562872a25ad596467e28c2ec858b6bb25f9b23fd4a841fbf945cc6eab6809e2de86d801494f668fac84cb0da4ff7602599f904dd2", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="040000c0010000000000002006020000e372f26257e01c35"], 0x48}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000480)='rpcgss_import_ctx\x00'}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20080001) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0x421, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad, 0x60e1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffe}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}, @IFLA_GROUP={0x8, 0x1b, 0x7fff}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x78}}, 0x2) [ 164.857974][ T3925] device team_slave_0 entered promiscuous mode [ 164.878263][ T3925] device team_slave_1 entered promiscuous mode [ 164.933244][ T27] audit: type=1804 audit(1668678516.668:6): pid=3923 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir1688402279/syzkaller.RFdulK/6/cgroup.controllers" dev="sda1" ino=1167 res=1 errno=0 [ 165.037781][ T27] audit: type=1804 audit(1668678516.778:7): pid=3930 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2620065377/syzkaller.SV9ZFw/6/cgroup.controllers" dev="sda1" ino=1161 res=1 errno=0 09:48:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="918333bfd788fa571b4dea5d27c893812127ce4a14218d35e32749f7d0e80f586237bde3954fb07fff06447040661ae406accf5032dcdfa83d000000000000060d65", @ANYRES16, @ANYBLOB="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"], 0x18}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x234}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1e}}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x50}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400), 0x10, &(0x7f0000000540)={&(0x7f00000006c0)=ANY=[@ANYBLOB="06000033853729a11f5ca837156fa614a73bd90024000000080000000003000079ba731a79656bc8ee84c9d94de3806114fc3ba61ffe58ba292a954486133ec5bdfcec629e9d60d3e2b3d9d7516c20d8ccf9c54dc66ead04006c643225dd4171a7835916681562872a25ad596467e28c2ec858b6bb25f9b23fd4a841fbf945cc6eab6809e2de86d801494f668fac84cb0da4ff7602599f904dd2", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="040000c0010000000000002006020000e372f26257e01c35"], 0x48}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000480)='rpcgss_import_ctx\x00'}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20080001) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0x421, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad, 0x60e1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffe}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}, @IFLA_GROUP={0x8, 0x1b, 0x7fff}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x78}}, 0x2) 09:48:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="918333bfd788fa571b4dea5d27c893812127ce4a14218d35e32749f7d0e80f586237bde3954fb07fff06447040661ae406accf5032dcdfa83d000000000000060d65", @ANYRES16, @ANYBLOB="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"], 0x18}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x234}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1e}}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x50}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400), 0x10, &(0x7f0000000540)={&(0x7f00000006c0)=ANY=[@ANYBLOB="06000033853729a11f5ca837156fa614a73bd90024000000080000000003000079ba731a79656bc8ee84c9d94de3806114fc3ba61ffe58ba292a954486133ec5bdfcec629e9d60d3e2b3d9d7516c20d8ccf9c54dc66ead04006c643225dd4171a7835916681562872a25ad596467e28c2ec858b6bb25f9b23fd4a841fbf945cc6eab6809e2de86d801494f668fac84cb0da4ff7602599f904dd2", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="040000c0010000000000002006020000e372f26257e01c35"], 0x48}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000480)='rpcgss_import_ctx\x00'}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20080001) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0x421, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad, 0x60e1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffe}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}, @IFLA_GROUP={0x8, 0x1b, 0x7fff}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x78}}, 0x2) 09:48:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) [ 165.228243][ T27] audit: type=1804 audit(1668678516.968:8): pid=3937 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2801600919/syzkaller.3la7Df/12/cgroup.controllers" dev="sda1" ino=1183 res=1 errno=0 09:48:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) [ 165.518993][ T27] audit: type=1804 audit(1668678517.248:9): pid=3944 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2620065377/syzkaller.SV9ZFw/7/cgroup.controllers" dev="sda1" ino=1166 res=1 errno=0 09:48:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="918333bfd788fa571b4dea5d27c893812127ce4a14218d35e32749f7d0e80f586237bde3954fb07fff06447040661ae406accf5032dcdfa83d000000000000060d65", @ANYRES16, @ANYBLOB="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"], 0x18}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x234}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1e}}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x50}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400), 0x10, &(0x7f0000000540)={&(0x7f00000006c0)=ANY=[@ANYBLOB="06000033853729a11f5ca837156fa614a73bd90024000000080000000003000079ba731a79656bc8ee84c9d94de3806114fc3ba61ffe58ba292a954486133ec5bdfcec629e9d60d3e2b3d9d7516c20d8ccf9c54dc66ead04006c643225dd4171a7835916681562872a25ad596467e28c2ec858b6bb25f9b23fd4a841fbf945cc6eab6809e2de86d801494f668fac84cb0da4ff7602599f904dd2", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="040000c0010000000000002006020000e372f26257e01c35"], 0x48}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000480)='rpcgss_import_ctx\x00'}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20080001) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0x421, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad, 0x60e1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffe}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}, @IFLA_GROUP={0x8, 0x1b, 0x7fff}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x78}}, 0x2) [ 165.613646][ T27] audit: type=1804 audit(1668678517.288:10): pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir1688402279/syzkaller.RFdulK/7/cgroup.controllers" dev="sda1" ino=1181 res=1 errno=0 09:48:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 09:48:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@migrate={0xa0, 0x21, 0xd39, 0x0, 0x0, {{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@migrate={0x50, 0x11, [{@in6=@local, @in=@broadcast, @in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}]}, 0xa0}}, 0x0) 09:48:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@migrate={0xa0, 0x21, 0xd39, 0x0, 0x0, {{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@migrate={0x50, 0x11, [{@in6=@local, @in=@broadcast, @in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}]}, 0xa0}}, 0x0) 09:48:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x401, 0x8e3, 0x8, 0x7, 0xeb, 0x42, 0x8001}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) mmap(&(0x7f0000652000/0x1000)=nil, 0x1000, 0x3000006, 0x13, r0, 0x10746000) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x20, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4001) r5 = socket(0x18, 0x0, 0x2) getpeername$inet(r5, 0x0, &(0x7f0000000140)) connect$netlink(r5, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x78}]}, 0x2c}}, 0x40880) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r1, 0x0, 0x10000a006) 09:48:37 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000004680)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x0, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @generic, @pad1]}}}], 0x20}}], 0x1, 0x0) 09:48:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@migrate={0xa0, 0x21, 0xd39, 0x0, 0x0, {{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@migrate={0x50, 0x11, [{@in6=@local, @in=@broadcast, @in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}]}, 0xa0}}, 0x0) 09:48:37 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_smc(0x2b, 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 09:48:37 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000004680)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x0, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @generic, @pad1]}}}], 0x20}}], 0x1, 0x0) 09:48:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@migrate={0xa0, 0x21, 0xd39, 0x0, 0x0, {{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@migrate={0x50, 0x11, [{@in6=@local, @in=@broadcast, @in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}]}, 0xa0}}, 0x0) 09:48:37 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet_mreqn(r0, 0x0, 0x480, 0x0, &(0x7f00000000c0)=0x300) 09:48:37 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000004680)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x0, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @generic, @pad1]}}}], 0x20}}], 0x1, 0x0) 09:48:38 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet_mreqn(r0, 0x0, 0x480, 0x0, &(0x7f00000000c0)=0x300) [ 166.270945][ T27] audit: type=1804 audit(1668678518.018:11): pid=3960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2801600919/syzkaller.3la7Df/13/cgroup.controllers" dev="sda1" ino=1152 res=1 errno=0 09:48:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 09:48:38 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0xfffffffffffffffd) 09:48:38 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000004680)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x0, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @generic, @pad1]}}}], 0x20}}], 0x1, 0x0) 09:48:38 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet_mreqn(r0, 0x0, 0x480, 0x0, &(0x7f00000000c0)=0x300) 09:48:38 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) 09:48:38 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet_mreqn(r0, 0x0, 0x480, 0x0, &(0x7f00000000c0)=0x300) 09:48:38 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) 09:48:38 executing program 3: unshare(0x40000400) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'mangle\x00'}, &(0x7f0000000280)=0x54) 09:48:38 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_smc(0x2b, 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 09:48:38 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0xfffffffffffffffd) 09:48:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000007fd16cb10a165d47bdc80c84b7c35404e70c43b20743c8bf733cf9"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff34}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000900)={@ipv4={""/10, ""/2, @remote}}, &(0x7f0000000940)=0x14) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004003632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 09:48:38 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0xfffffffffffffffd) 09:48:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 09:48:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) 09:48:39 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0xfffffffffffffffd) 09:48:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000007fd16cb10a165d47bdc80c84b7c35404e70c43b20743c8bf733cf9"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff34}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000900)={@ipv4={""/10, ""/2, @remote}}, &(0x7f0000000940)=0x14) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004003632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 09:48:39 executing program 3: unshare(0x40000400) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'mangle\x00'}, &(0x7f0000000280)=0x54) 09:48:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) 09:48:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x7ff, 0x7ffff, 0x80}, 0x48) 09:48:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8, 0x12, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 09:48:39 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_smc(0x2b, 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 09:48:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket(0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x80000000007) 09:48:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000007fd16cb10a165d47bdc80c84b7c35404e70c43b20743c8bf733cf9"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff34}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000900)={@ipv4={""/10, ""/2, @remote}}, &(0x7f0000000940)=0x14) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004003632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) [ 167.902513][ T4023] (unnamed net_device) (uninitialized): option min_links: invalid value (18446744073709551615) [ 167.933419][ T4023] (unnamed net_device) (uninitialized): option min_links: allowed values 0 - 2147483647 09:48:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8, 0x12, 0xffffffff}]}}}]}, 0x3c}}, 0x0) [ 168.222642][ T4032] (unnamed net_device) (uninitialized): option min_links: invalid value (18446744073709551615) [ 168.252564][ T4032] (unnamed net_device) (uninitialized): option min_links: allowed values 0 - 2147483647 09:48:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000007fd16cb10a165d47bdc80c84b7c35404e70c43b20743c8bf733cf9"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff34}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000900)={@ipv4={""/10, ""/2, @remote}}, &(0x7f0000000940)=0x14) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500002000000000c74396c8e3ebbadc20e5a7625ecffe7ba8337249fe564e0b9cc7553358380b3a1f59916fdf9bf0bdf81509f07fb2819bf5774fedda52e39c90fcffffffffffffff6b4673b4e8d5467e114604ea09b290a248a120c9c6e69f403ff0e80677eeba68562eaeae2bcd87cef9000000a39ca7ef365cc27dfeac7bb40e9048517354b0ca4f9c84b619e40af8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19e9b5381791ef7a61cbf0ceb42122b8635a66ce6b5b92356085530f18a0ca83dbc08c2daeb060000000000009813c1efa26001b3f486eb6954871b4344faae85c4d0b967784784ce355e6f923b1105696904ed93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d00000000000039d085b47e4b834a421e8b444208a680a929eb7b396e5f9950cdcbcf59957ffb034cdbeb28ac4acbf6090a83664bf03b8db948b4f38d417296742f6177cc9277a11a1c462c70bc561e95a32578e242383e3ab31a0dd41542c9225cd6a33d0ce72590a972f77240dd04319ea26a1ab09b024f7fcd990dee9177ea47cfb731b5325754cee028e2a680a9262f8704c37d5f220044e580dcabb1c87f189131b61e1b66b67f13ab8faf740af6008d425fb7e21acbcf30eb8f830ffa2000000049fba4a2d07180340d40562859167f9eae76bfb92d1617f95dae5e0b8b0efeaeed"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004003632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 09:48:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8, 0x12, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 09:48:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket(0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x80000000007) 09:48:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket(0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x80000000007) [ 168.601955][ T4041] (unnamed net_device) (uninitialized): option min_links: invalid value (18446744073709551615) [ 168.645472][ T4041] (unnamed net_device) (uninitialized): option min_links: allowed values 0 - 2147483647 [ 168.795770][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 168.795789][ T27] audit: type=1804 audit(1668678520.538:13): pid=4039 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2801600919/syzkaller.3la7Df/19/cgroup.controllers" dev="sda1" ino=1171 res=1 errno=0 [ 168.961785][ T27] audit: type=1804 audit(1668678520.708:14): pid=4043 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2676881250/syzkaller.pdezg6/26/cgroup.controllers" dev="sda1" ino=1182 res=1 errno=0 09:48:41 executing program 3: unshare(0x40000400) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'mangle\x00'}, &(0x7f0000000280)=0x54) 09:48:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8, 0x12, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 09:48:41 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_smc(0x2b, 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 09:48:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002400)=[{{&(0x7f0000000080)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0x4, [@rand_addr, @private]}]}}}], 0x20}}], 0x1, 0x0) [ 169.318644][ T4052] (unnamed net_device) (uninitialized): option min_links: invalid value (18446744073709551615) 09:48:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002400)=[{{&(0x7f0000000080)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0x4, [@rand_addr, @private]}]}}}], 0x20}}], 0x1, 0x0) [ 169.400399][ T4052] (unnamed net_device) (uninitialized): option min_links: allowed values 0 - 2147483647 09:48:41 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000006600)={0x15, 0x4, &(0x7f00000063c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2e}]}, &(0x7f0000006440)='syzkaller\x00', 0x4, 0xc9, &(0x7f0000001900)=""/201, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:48:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket(0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x80000000007) 09:48:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002400)=[{{&(0x7f0000000080)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0x4, [@rand_addr, @private]}]}}}], 0x20}}], 0x1, 0x0) 09:48:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002400)=[{{&(0x7f0000000080)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0x4, [@rand_addr, @private]}]}}}], 0x20}}], 0x1, 0x0) 09:48:41 executing program 4: r0 = socket$kcm(0x21, 0x2, 0x2) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x110, 0x6, 0x0, 0x20000000) 09:48:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket(0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x80000000007) 09:48:41 executing program 4: r0 = socket$kcm(0x21, 0x2, 0x2) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x110, 0x6, 0x0, 0x20000000) [ 169.890660][ T27] audit: type=1804 audit(1668678521.638:15): pid=4065 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2801600919/syzkaller.3la7Df/20/cgroup.controllers" dev="sda1" ino=1173 res=1 errno=0 [ 170.079618][ T27] audit: type=1804 audit(1668678521.818:16): pid=4073 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2676881250/syzkaller.pdezg6/27/cgroup.controllers" dev="sda1" ino=1160 res=1 errno=0 09:48:42 executing program 3: unshare(0x40000400) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'mangle\x00'}, &(0x7f0000000280)=0x54) 09:48:42 executing program 4: r0 = socket$kcm(0x21, 0x2, 0x2) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x110, 0x6, 0x0, 0x20000000) 09:48:42 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x28011, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00'}) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000001800dd8d00000000fefffffb020000000001fe02000300000c00090008000000", @ANYRES32], 0x28}}, 0x0) 09:48:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x8}]}, 0x1c}}, 0x0) 09:48:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket(0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x80000000007) 09:48:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket(0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x80000000007) [ 170.961638][ T4088] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:48:42 executing program 4: r0 = socket$kcm(0x21, 0x2, 0x2) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x110, 0x6, 0x0, 0x20000000) 09:48:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x8}]}, 0x1c}}, 0x0) 09:48:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000300)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'pim6reg1\x00', 0x1}) close(r1) 09:48:42 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xf}, 0x33fe0}}, 0x0) [ 171.167015][ T27] audit: type=1804 audit(1668678522.908:17): pid=4083 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2676881250/syzkaller.pdezg6/28/cgroup.controllers" dev="sda1" ino=1177 res=1 errno=0 [ 171.206225][ T4098] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:48:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x94, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4e00}]}, @IFLA_AF_SPEC={0x6c, 0x1a, 0x0, 0x1, [@AF_INET6={0x54, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_TOKEN={0xffffffffffffff92, 0x7, @private1}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_BRIDGE={0x4}, @AF_INET6={0xc}, @AF_MPLS={0x4}]}]}, 0x94}}, 0x0) 09:48:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x8}]}, 0x1c}}, 0x0) [ 171.356537][ T27] audit: type=1804 audit(1668678523.098:18): pid=4086 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2801600919/syzkaller.3la7Df/21/cgroup.controllers" dev="sda1" ino=1178 res=1 errno=0 [ 171.502209][ T4107] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.613736][ T4109] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:48:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x94, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4e00}]}, @IFLA_AF_SPEC={0x6c, 0x1a, 0x0, 0x1, [@AF_INET6={0x54, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_TOKEN={0xffffffffffffff92, 0x7, @private1}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_BRIDGE={0x4}, @AF_INET6={0xc}, @AF_MPLS={0x4}]}]}, 0x94}}, 0x0) 09:48:44 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) sendmsg$inet(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000980)='R', 0x1}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)="cd", 0x1}], 0x1}, 0x240448c4) 09:48:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x8}]}, 0x1c}}, 0x0) 09:48:44 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) sendmmsg$inet(r1, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 09:48:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x30, 0x3, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}]}]}, 0x30}}, 0x0) [ 172.343134][ T4117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:48:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x200, 0x80, 0x20000}, 0x1c) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7de954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d707859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d974927676468582d8621c3ac94712ed9cf6b40b350fd733c43b4289c2ac3863fead5f688cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b00127473e6ba922aff649609d40b449ccba3ce8d530ffff19a6471baae2a83b2d36bff764b138310346dbc0a40e78bfb34095be5794a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261e0010000000000000926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e846cb03d9cd483b6b1e462397db6d8123927196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893db626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d273650bf7b2ff4602aec50000000000000000495e053539a42ba87f5d1488cc1d96348cd615b26f21ca3d37b530ad25f628d4c30602"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x20e, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x43, 0xfffffffffffffe7e, 0x1d4}, 0x28) 09:48:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x30, 0x3, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}]}]}, 0x30}}, 0x0) 09:48:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x94, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4e00}]}, @IFLA_AF_SPEC={0x6c, 0x1a, 0x0, 0x1, [@AF_INET6={0x54, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_TOKEN={0xffffffffffffff92, 0x7, @private1}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_BRIDGE={0x4}, @AF_INET6={0xc}, @AF_MPLS={0x4}]}]}, 0x94}}, 0x0) 09:48:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@ipv6_getaddr={0x20, 0x16, 0x10b, 0x0, 0x0, {0xc}, [@IFA_RT_PRIORITY={0x8}]}, 0x20}}, 0x0) 09:48:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd6a, 0x0, &(0x7f0000000100)="c9", 0x0}, 0x48) 09:48:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x30, 0x3, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}]}]}, 0x30}}, 0x0) 09:48:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd6a, 0x0, &(0x7f0000000100)="c9", 0x0}, 0x48) 09:48:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@ipv6_getaddr={0x20, 0x16, 0x10b, 0x0, 0x0, {0xc}, [@IFA_RT_PRIORITY={0x8}]}, 0x20}}, 0x0) [ 172.590408][ T4134] bridge0: port 1(bridge_slave_0) entered disabled state 09:48:44 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) sendmsg$inet(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000980)='R', 0x1}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)="cd", 0x1}], 0x1}, 0x240448c4) 09:48:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x94, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4e00}]}, @IFLA_AF_SPEC={0x6c, 0x1a, 0x0, 0x1, [@AF_INET6={0x54, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_TOKEN={0xffffffffffffff92, 0x7, @private1}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_BRIDGE={0x4}, @AF_INET6={0xc}, @AF_MPLS={0x4}]}]}, 0x94}}, 0x0) 09:48:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x30, 0x3, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}]}]}, 0x30}}, 0x0) 09:48:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@ipv6_getaddr={0x20, 0x16, 0x10b, 0x0, 0x0, {0xc}, [@IFA_RT_PRIORITY={0x8}]}, 0x20}}, 0x0) 09:48:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd6a, 0x0, &(0x7f0000000100)="c9", 0x0}, 0x48) 09:48:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x200, 0x80, 0x20000}, 0x1c) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x20e, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x43, 0xfffffffffffffe7e, 0x1d4}, 0x28) 09:48:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@ipv6_getaddr={0x20, 0x16, 0x10b, 0x0, 0x0, {0xc}, [@IFA_RT_PRIORITY={0x8}]}, 0x20}}, 0x0) 09:48:45 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x200, 0x80, 0x20000}, 0x1c) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x20e, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x43, 0xfffffffffffffe7e, 0x1d4}, 0x28) 09:48:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd6a, 0x0, &(0x7f0000000100)="c9", 0x0}, 0x48) [ 173.223627][ T4149] bridge0: port 1(bridge_slave_0) entered disabled state 09:48:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f0000005200)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x101}, @NFT_MSG_NEWOBJ={0x1c, 0x12, 0xa, 0x101, 0x0, 0x0, {}, @NFT_OBJECT_CT_EXPECT=@NFTA_OBJ_TYPE={0x8}}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x201, 0x0, 0x0, {0x3}, [@NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_NEWSETELEM={0x24, 0xc, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x9c}}, 0x0) 09:48:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="ec", 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={0x0, 0x0, 0x1, '>'}, 0x9) 09:48:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x3c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100000000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) [ 173.604913][ T27] audit: type=1804 audit(1668678525.348:19): pid=4167 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2801600919/syzkaller.3la7Df/27/cgroup.controllers" dev="sda1" ino=1181 res=1 errno=0 [ 173.655232][ T4167] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 173.665712][ T4167] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4167, name: syz-executor.1 [ 173.678443][ T4167] preempt_count: 1, expected: 0 [ 173.685776][ T4167] RCU nest depth: 0, expected: 0 [ 173.690809][ T4167] 3 locks held by syz-executor.1/4167: [ 173.696314][ T4167] #0: ffffffff8df6b530 (cb_lock){++++}-{3:3}, at: genl_rcv+0x19/0x40 [ 173.704648][ T4167] #1: ffffffff8df6b5e8 (genl_mutex){+.+.}-{3:3}, at: genl_rcv_msg+0x50d/0x780 [ 173.713755][ T4167] #2: ffff88807373b678 (k-clock-AF_INET){+++.}-{2:2}, at: l2tp_tunnel_register+0x126/0x1210 [ 173.724107][ T4167] Preemption disabled at: [ 173.724121][ T4167] [<0000000000000000>] 0x0 [ 173.732938][ T4167] CPU: 0 PID: 4167 Comm: syz-executor.1 Not tainted 6.1.0-rc4-syzkaller-00212-g064bc7312bd0 #0 [ 173.743307][ T4167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 173.753405][ T4167] Call Trace: [ 173.756710][ T4167] [ 173.759670][ T4167] dump_stack_lvl+0xd1/0x138 [ 173.764320][ T4167] __might_resched.cold+0x222/0x26b [ 173.769582][ T4167] cpus_read_lock+0x1b/0x140 [ 173.774228][ T4167] static_key_slow_inc+0x12/0x20 [ 173.779195][ T4167] setup_udp_tunnel_sock+0x3e1/0x550 [ 173.784536][ T4167] l2tp_tunnel_register+0xc51/0x1210 [ 173.789890][ T4167] ? l2tp_tunnel_del_work+0x780/0x780 [ 173.795326][ T4167] ? debug_object_free+0x360/0x360 [ 173.800478][ T4167] ? l2tp_recv_common+0x3100/0x3100 [ 173.805733][ T4167] ? l2tp_tunnel_delete+0x50/0x50 [ 173.810832][ T4167] ? l2tp_tunnel_create+0x2bf/0x4b0 [ 173.816070][ T4167] ? l2tp_tunnel_create+0x3c6/0x4b0 [ 173.821299][ T4167] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 173.827000][ T4167] ? l2tp_tunnel_notify.constprop.0+0x160/0x160 [ 173.833282][ T4167] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1b7/0x290 [ 173.840674][ T4167] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x290 [ 173.848007][ T4167] genl_family_rcv_msg_doit+0x228/0x320 [ 173.853588][ T4167] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 173.861005][ T4167] ? ns_capable+0xdd/0x100 [ 173.865457][ T4167] genl_rcv_msg+0x445/0x780 [ 173.869991][ T4167] ? genl_start+0x670/0x670 [ 173.874562][ T4167] ? l2tp_tunnel_notify.constprop.0+0x160/0x160 [ 173.880849][ T4167] ? ref_tracker_free+0x374/0x6b0 [ 173.885902][ T4167] ? lock_release+0x810/0x810 [ 173.890614][ T4167] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 173.896023][ T4167] netlink_rcv_skb+0x157/0x430 [ 173.900819][ T4167] ? genl_start+0x670/0x670 [ 173.905352][ T4167] ? netlink_ack+0xd60/0xd60 [ 173.909975][ T4167] ? netlink_deliver_tap+0x1b1/0xc50 [ 173.915295][ T4167] genl_rcv+0x28/0x40 [ 173.919305][ T4167] netlink_unicast+0x547/0x7f0 [ 173.924101][ T4167] ? netlink_attachskb+0x890/0x890 [ 173.929236][ T4167] ? find_vmap_area+0xf8/0x130 [ 173.934034][ T4167] ? __phys_addr_symbol+0x30/0x70 [ 173.939090][ T4167] ? __check_object_size+0x2e2/0x5a0 [ 173.944419][ T4167] netlink_sendmsg+0x91b/0xe10 [ 173.949219][ T4167] ? netlink_unicast+0x7f0/0x7f0 [ 173.954794][ T4167] ? __x64_sys_sendfile64+0x1d0/0x210 [ 173.960211][ T4167] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 173.965532][ T4167] ? netlink_unicast+0x7f0/0x7f0 [ 173.970501][ T4167] sock_sendmsg+0xd3/0x120 [ 173.974957][ T4167] sock_no_sendpage+0x10c/0x160 [ 173.979839][ T4167] ? sock_kzfree_s+0x60/0x60 [ 173.984458][ T4167] ? mark_held_locks+0x9f/0xe0 [ 173.989284][ T4167] ? kasan_quarantine_put+0xf9/0x220 [ 173.994609][ T4167] ? lockdep_hardirqs_on+0x7d/0x100 [ 173.999837][ T4167] kernel_sendpage.part.0+0x1d5/0x700 [ 174.005284][ T4167] sock_sendpage+0xe3/0x140 [ 174.009837][ T4167] ? kernel_sendpage+0xd0/0xd0 [ 174.014651][ T4167] pipe_to_sendpage+0x2b1/0x380 [ 174.019555][ T4167] ? propagate_umount+0x19f0/0x19f0 [ 174.024872][ T4167] ? splice_from_pipe_next.part.0+0x167/0x520 [ 174.030985][ T4167] __splice_from_pipe+0x449/0x8a0 [ 174.036049][ T4167] ? propagate_umount+0x19f0/0x19f0 [ 174.041289][ T4167] generic_splice_sendpage+0xd8/0x140 [ 174.046717][ T4167] ? __do_sys_vmsplice+0xa90/0xa90 [ 174.051880][ T4167] ? security_file_permission+0xaf/0xd0 [ 174.057473][ T4167] ? __do_sys_vmsplice+0xa90/0xa90 [ 174.062653][ T4167] direct_splice_actor+0x114/0x180 [ 174.067804][ T4167] splice_direct_to_actor+0x335/0x8a0 [ 174.073213][ T4167] ? do_splice_direct+0x280/0x280 [ 174.078274][ T4167] ? folio_flags.constprop.0+0x150/0x150 [ 174.083938][ T4167] ? bpf_lsm_file_permission+0x9/0x10 [ 174.089333][ T4167] ? security_file_permission+0xaf/0xd0 [ 174.094952][ T4167] do_splice_direct+0x1ab/0x280 [ 174.099837][ T4167] ? splice_direct_to_actor+0x8a0/0x8a0 [ 174.105422][ T4167] ? bpf_lsm_file_permission+0x9/0x10 [ 174.110819][ T4167] ? security_file_permission+0xaf/0xd0 [ 174.116420][ T4167] do_sendfile+0xb19/0x1270 [ 174.120969][ T4167] ? vfs_iocb_iter_write+0x480/0x480 [ 174.126289][ T4167] ? xfd_validate_state+0x5d/0x180 [ 174.131446][ T4167] ? restore_fpregs_from_fpstate+0xc1/0x1c0 [ 174.137414][ T4167] __x64_sys_sendfile64+0x1d0/0x210 [ 174.142664][ T4167] ? __ia32_sys_sendfile+0x220/0x220 [ 174.148026][ T4167] ? syscall_enter_from_user_mode+0x26/0xb0 [ 174.153955][ T4167] do_syscall_64+0x39/0xb0 [ 174.158405][ T4167] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 174.164338][ T4167] RIP: 0033:0x7f6ac588b639 [ 174.168776][ T4167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 174.188413][ T4167] RSP: 002b:00007f6ac6541168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 174.196853][ T4167] RAX: ffffffffffffffda RBX: 00007f6ac59abf80 RCX: 00007f6ac588b639 09:48:46 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) sendmsg$inet(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000980)='R', 0x1}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)="cd", 0x1}], 0x1}, 0x240448c4) 09:48:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="ec", 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={0x0, 0x0, 0x1, '>'}, 0x9) 09:48:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f0000005200)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x101}, @NFT_MSG_NEWOBJ={0x1c, 0x12, 0xa, 0x101, 0x0, 0x0, {}, @NFT_OBJECT_CT_EXPECT=@NFTA_OBJ_TYPE={0x8}}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x201, 0x0, 0x0, {0x3}, [@NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_NEWSETELEM={0x24, 0xc, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x9c}}, 0x0) 09:48:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x200, 0x80, 0x20000}, 0x1c) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x20e, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x43, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 174.204845][ T4167] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 174.212838][ T4167] RBP: 00007f6ac58e6ae9 R08: 0000000000000000 R09: 0000000000000000 [ 174.220827][ T4167] R10: 0000000100000000 R11: 0000000000000246 R12: 0000000000000000 [ 174.228819][ T4167] R13: 00007ffeb6ea978f R14: 00007f6ac6541300 R15: 0000000000022000 [ 174.236836][ T4167] 09:48:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x200, 0x80, 0x20000}, 0x1c) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x20e, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x43, 0xfffffffffffffe7e, 0x1d4}, 0x28) 09:48:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f0000005200)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x101}, @NFT_MSG_NEWOBJ={0x1c, 0x12, 0xa, 0x101, 0x0, 0x0, {}, @NFT_OBJECT_CT_EXPECT=@NFTA_OBJ_TYPE={0x8}}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x201, 0x0, 0x0, {0x3}, [@NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_NEWSETELEM={0x24, 0xc, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x9c}}, 0x0) 09:48:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="ec", 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={0x0, 0x0, 0x1, '>'}, 0x9) 09:48:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x3c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100000000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 09:48:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="ec", 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={0x0, 0x0, 0x1, '>'}, 0x9) 09:48:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f0000005200)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x101}, @NFT_MSG_NEWOBJ={0x1c, 0x12, 0xa, 0x101, 0x0, 0x0, {}, @NFT_OBJECT_CT_EXPECT=@NFTA_OBJ_TYPE={0x8}}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x201, 0x0, 0x0, {0x3}, [@NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_NEWSETELEM={0x24, 0xc, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x9c}}, 0x0) [ 174.662339][ T27] audit: type=1804 audit(1668678526.408:20): pid=4189 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2801600919/syzkaller.3la7Df/28/cgroup.controllers" dev="sda1" ino=1181 res=1 errno=0 [ 174.753554][ T4186] [ 174.755930][ T4186] ====================================================== [ 174.762960][ T4186] WARNING: possible circular locking dependency detected [ 174.769999][ T4186] 6.1.0-rc4-syzkaller-00212-g064bc7312bd0 #0 Tainted: G W [ 174.778521][ T4186] ------------------------------------------------------ [ 174.785598][ T4186] syz-executor.1/4186 is trying to acquire lock: [ 174.791940][ T4186] ffff888145da2cb0 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: sk_common_release+0x68/0x390 [ 174.801523][ T4186] [ 174.801523][ T4186] but task is already holding lock: [ 174.808890][ T4186] ffff888145da2f38 (k-clock-AF_INET){+++.}-{2:2}, at: l2tp_tunnel_register+0x126/0x1210 [ 174.818679][ T4186] [ 174.818679][ T4186] which lock already depends on the new lock. [ 174.818679][ T4186] [ 174.829086][ T4186] [ 174.829086][ T4186] the existing dependency chain (in reverse order) is: [ 174.838103][ T4186] [ 174.838103][ T4186] -> #1 (k-clock-AF_INET){+++.}-{2:2}: [ 174.845769][ T4186] _raw_write_lock_bh+0x33/0x40 [ 174.851184][ T4186] __tcp_close+0x43b/0xf50 [ 174.856134][ T4186] tcp_close+0x2d/0xc0 [ 174.860738][ T4186] inet_release+0x132/0x270 [ 174.865783][ T4186] sock_release+0x8b/0x1b0 [ 174.870748][ T4186] smc_clcsock_release+0xb7/0xe0 [ 174.876232][ T4186] __smc_release+0x5b9/0x890 [ 174.881367][ T4186] smc_release+0x203/0x630 [ 174.886323][ T4186] __sock_release+0xcd/0x280 [ 174.891457][ T4186] sock_close+0x1c/0x20 [ 174.896179][ T4186] __fput+0x27c/0xa90 [ 174.900713][ T4186] task_work_run+0x16f/0x270 [ 174.905844][ T4186] exit_to_user_mode_prepare+0x23c/0x250 [ 174.912011][ T4186] syscall_exit_to_user_mode+0x1d/0x50 [ 174.918007][ T4186] do_syscall_64+0x46/0xb0 [ 174.922971][ T4186] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 174.929408][ T4186] [ 174.929408][ T4186] -> #0 (k-sk_lock-AF_INET){+.+.}-{0:0}: [ 174.937335][ T4186] __lock_acquire+0x2a43/0x56d0 [ 174.942736][ T4186] lock_acquire+0x1e3/0x630 [ 174.947790][ T4186] udp_destroy_sock+0x34/0x250 [ 174.953097][ T4186] sk_common_release+0x68/0x390 [ 174.958489][ T4186] inet_release+0x132/0x270 [ 174.963530][ T4186] sock_release+0x8b/0x1b0 [ 174.968579][ T4186] l2tp_tunnel_register+0xc75/0x1210 [ 174.974417][ T4186] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 174.980598][ T4186] genl_family_rcv_msg_doit+0x228/0x320 [ 174.986686][ T4186] genl_rcv_msg+0x445/0x780 [ 174.991726][ T4186] netlink_rcv_skb+0x157/0x430 [ 174.997048][ T4186] genl_rcv+0x28/0x40 [ 175.001564][ T4186] netlink_unicast+0x547/0x7f0 [ 175.006865][ T4186] netlink_sendmsg+0x91b/0xe10 [ 175.012188][ T4186] sock_sendmsg+0xd3/0x120 [ 175.017158][ T4186] sock_no_sendpage+0x10c/0x160 [ 175.022550][ T4186] kernel_sendpage.part.0+0x1d5/0x700 [ 175.028474][ T4186] sock_sendpage+0xe3/0x140 [ 175.033528][ T4186] pipe_to_sendpage+0x2b1/0x380 [ 175.038950][ T4186] __splice_from_pipe+0x449/0x8a0 [ 175.044530][ T4186] generic_splice_sendpage+0xd8/0x140 [ 175.050446][ T4186] direct_splice_actor+0x114/0x180 [ 175.056094][ T4186] splice_direct_to_actor+0x335/0x8a0 [ 175.062005][ T4186] do_splice_direct+0x1ab/0x280 [ 175.067525][ T4186] do_sendfile+0xb19/0x1270 [ 175.072586][ T4186] __x64_sys_sendfile64+0x1d0/0x210 [ 175.078348][ T4186] do_syscall_64+0x39/0xb0 [ 175.083311][ T4186] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 175.089748][ T4186] [ 175.089748][ T4186] other info that might help us debug this: [ 175.089748][ T4186] [ 175.099996][ T4186] Possible unsafe locking scenario: [ 175.099996][ T4186] [ 175.107454][ T4186] CPU0 CPU1 [ 175.112825][ T4186] ---- ---- [ 175.118192][ T4186] lock(k-clock-AF_INET); [ 175.122624][ T4186] lock(k-sk_lock-AF_INET); [ 175.129754][ T4186] lock(k-clock-AF_INET); [ 175.136714][ T4186] lock(k-sk_lock-AF_INET); [ 175.141318][ T4186] [ 175.141318][ T4186] *** DEADLOCK *** [ 175.141318][ T4186] [ 175.149463][ T4186] 3 locks held by syz-executor.1/4186: [ 175.154931][ T4186] #0: ffffffff8df6b530 (cb_lock){++++}-{3:3}, at: genl_rcv+0x19/0x40 [ 175.163155][ T4186] #1: ffffffff8df6b5e8 (genl_mutex){+.+.}-{3:3}, at: genl_rcv_msg+0x50d/0x780 [ 175.172195][ T4186] #2: ffff888145da2f38 (k-clock-AF_INET){+++.}-{2:2}, at: l2tp_tunnel_register+0x126/0x1210 [ 175.182439][ T4186] [ 175.182439][ T4186] stack backtrace: [ 175.188333][ T4186] CPU: 1 PID: 4186 Comm: syz-executor.1 Tainted: G W 6.1.0-rc4-syzkaller-00212-g064bc7312bd0 #0 [ 175.200240][ T4186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 175.210395][ T4186] Call Trace: [ 175.213692][ T4186] [ 175.216636][ T4186] dump_stack_lvl+0xd1/0x138 [ 175.221258][ T4186] check_noncircular+0x25f/0x2e0 [ 175.226233][ T4186] ? print_circular_bug+0x1e0/0x1e0 [ 175.231507][ T4186] ? mark_lock.part.0+0xee/0x1910 [ 175.236657][ T4186] ? mark_lock.part.0+0xee/0x1910 [ 175.241720][ T4186] ? lock_chain_count+0x20/0x20 [ 175.246616][ T4186] ? __local_bh_enable_ip+0xa4/0x130 [ 175.251917][ T4186] __lock_acquire+0x2a43/0x56d0 [ 175.256831][ T4186] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 175.263145][ T4186] lock_acquire+0x1e3/0x630 [ 175.267793][ T4186] ? sk_common_release+0x68/0x390 [ 175.272848][ T4186] ? lock_release+0x810/0x810 [ 175.277558][ T4186] ? find_held_lock+0x2d/0x110 [ 175.282357][ T4186] udp_destroy_sock+0x34/0x250 [ 175.287154][ T4186] ? sk_common_release+0x68/0x390 [ 175.292212][ T4186] ? udp_flush_pending_frames+0xb0/0xb0 [ 175.297815][ T4186] sk_common_release+0x68/0x390 [ 175.302693][ T4186] inet_release+0x132/0x270 [ 175.307218][ T4186] sock_release+0x8b/0x1b0 [ 175.311662][ T4186] l2tp_tunnel_register+0xc75/0x1210 [ 175.316981][ T4186] ? l2tp_tunnel_del_work+0x780/0x780 [ 175.322380][ T4186] ? debug_object_free+0x360/0x360 [ 175.327534][ T4186] ? lockdep_init_map_type+0x21e/0x800 [ 175.333023][ T4186] ? lockdep_init_map_type+0x21e/0x800 [ 175.338517][ T4186] ? l2tp_tunnel_create+0x2bf/0x4b0 [ 175.343826][ T4186] ? l2tp_tunnel_create+0x3c6/0x4b0 [ 175.349138][ T4186] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 175.354809][ T4186] ? l2tp_tunnel_notify.constprop.0+0x160/0x160 [ 175.361088][ T4186] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1b7/0x290 [ 175.368485][ T4186] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x290 [ 175.375796][ T4186] genl_family_rcv_msg_doit+0x228/0x320 [ 175.381381][ T4186] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 175.388811][ T4186] ? ns_capable+0xdd/0x100 [ 175.393257][ T4186] genl_rcv_msg+0x445/0x780 [ 175.397792][ T4186] ? genl_start+0x670/0x670 [ 175.402312][ T4186] ? l2tp_tunnel_notify.constprop.0+0x160/0x160 [ 175.408676][ T4186] ? ref_tracker_free+0x374/0x6b0 [ 175.413745][ T4186] ? lock_release+0x810/0x810 [ 175.418452][ T4186] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 175.423846][ T4186] netlink_rcv_skb+0x157/0x430 [ 175.428627][ T4186] ? genl_start+0x670/0x670 [ 175.433146][ T4186] ? netlink_ack+0xd60/0xd60 [ 175.437755][ T4186] ? netlink_deliver_tap+0x1b1/0xc50 [ 175.443057][ T4186] genl_rcv+0x28/0x40 [ 175.447144][ T4186] netlink_unicast+0x547/0x7f0 [ 175.451930][ T4186] ? netlink_attachskb+0x890/0x890 [ 175.457071][ T4186] ? find_vmap_area+0xf8/0x130 [ 175.461903][ T4186] ? __phys_addr_symbol+0x30/0x70 [ 175.466947][ T4186] ? __check_object_size+0x2e2/0x5a0 [ 175.472263][ T4186] netlink_sendmsg+0x91b/0xe10 [ 175.477050][ T4186] ? netlink_unicast+0x7f0/0x7f0 [ 175.482013][ T4186] ? __x64_sys_sendfile64+0x1d0/0x210 [ 175.487416][ T4186] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 175.492725][ T4186] ? netlink_unicast+0x7f0/0x7f0 [ 175.497679][ T4186] sock_sendmsg+0xd3/0x120 [ 175.502166][ T4186] sock_no_sendpage+0x10c/0x160 [ 175.507045][ T4186] ? sock_kzfree_s+0x60/0x60 [ 175.511658][ T4186] ? mark_held_locks+0x9f/0xe0 [ 175.516500][ T4186] ? kasan_quarantine_put+0xf9/0x220 [ 175.521817][ T4186] ? lockdep_hardirqs_on+0x7d/0x100 [ 175.527056][ T4186] kernel_sendpage.part.0+0x1d5/0x700 [ 175.532466][ T4186] sock_sendpage+0xe3/0x140 [ 175.537004][ T4186] ? kernel_sendpage+0xd0/0xd0 [ 175.541806][ T4186] pipe_to_sendpage+0x2b1/0x380 [ 175.546765][ T4186] ? propagate_umount+0x19f0/0x19f0 [ 175.551992][ T4186] ? splice_from_pipe_next.part.0+0x167/0x520 [ 175.558088][ T4186] __splice_from_pipe+0x449/0x8a0 [ 175.563139][ T4186] ? propagate_umount+0x19f0/0x19f0 [ 175.568358][ T4186] generic_splice_sendpage+0xd8/0x140 [ 175.575923][ T4186] ? __do_sys_vmsplice+0xa90/0xa90 [ 175.581068][ T4186] ? security_file_permission+0xaf/0xd0 [ 175.586645][ T4186] ? __do_sys_vmsplice+0xa90/0xa90 [ 175.591786][ T4186] direct_splice_actor+0x114/0x180 [ 175.596924][ T4186] splice_direct_to_actor+0x335/0x8a0 [ 175.602320][ T4186] ? do_splice_direct+0x280/0x280 [ 175.607366][ T4186] ? folio_flags.constprop.0+0x150/0x150 [ 175.613018][ T4186] ? bpf_lsm_file_permission+0x9/0x10 [ 175.618406][ T4186] ? security_file_permission+0xaf/0xd0 [ 175.623989][ T4186] do_splice_direct+0x1ab/0x280 [ 175.628881][ T4186] ? splice_direct_to_actor+0x8a0/0x8a0 [ 175.634450][ T4186] ? bpf_lsm_file_permission+0x9/0x10 [ 175.639835][ T4186] ? security_file_permission+0xaf/0xd0 [ 175.645427][ T4186] do_sendfile+0xb19/0x1270 [ 175.649958][ T4186] ? vfs_iocb_iter_write+0x480/0x480 [ 175.655275][ T4186] ? xfd_validate_state+0x5d/0x180 [ 175.660419][ T4186] ? restore_fpregs_from_fpstate+0xc1/0x1c0 [ 175.666342][ T4186] __x64_sys_sendfile64+0x1d0/0x210 [ 175.671584][ T4186] ? __ia32_sys_sendfile+0x220/0x220 [ 175.676906][ T4186] ? syscall_enter_from_user_mode+0x26/0xb0 [ 175.682823][ T4186] do_syscall_64+0x39/0xb0 [ 175.687270][ T4186] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 175.693219][ T4186] RIP: 0033:0x7f6ac588b639 [ 175.697643][ T4186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 175.717271][ T4186] RSP: 002b:00007f6ac6541168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 175.725699][ T4186] RAX: ffffffffffffffda RBX: 00007f6ac59abf80 RCX: 00007f6ac588b639 [ 175.733685][ T4186] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 175.741667][ T4186] RBP: 00007f6ac58e6ae9 R08: 0000000000000000 R09: 0000000000000000 [ 175.749648][ T4186] R10: 0000000100000000 R11: 0000000000000246 R12: 0000000000000000 [ 175.757632][ T4186] R13: 00007ffeb6ea978f R14: 00007f6ac6541300 R15: 0000000000022000 [ 175.765631][ T4186] [ 175.772845][ T4186] BUG: sleeping function called from invalid context at net/core/sock.c:3479 [ 175.783631][ T4186] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4186, name: syz-executor.1 [ 175.793086][ T4186] preempt_count: 1, expected: 0 [ 175.797957][ T4186] RCU nest depth: 0, expected: 0 [ 175.802950][ T4186] INFO: lockdep is turned off. 09:48:47 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) sendmsg$inet(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000980)='R', 0x1}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)="cd", 0x1}], 0x1}, 0x240448c4) [ 175.807725][ T4186] Preemption disabled at: [ 175.807737][ T4186] [<0000000000000000>] 0x0 [ 175.816538][ T4186] CPU: 1 PID: 4186 Comm: syz-executor.1 Tainted: G W 6.1.0-rc4-syzkaller-00212-g064bc7312bd0 #0 [ 175.828366][ T4186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 175.838452][ T4186] Call Trace: [ 175.841751][ T4186] [ 175.844706][ T4186] dump_stack_lvl+0xd1/0x138 [ 175.849526][ T4186] __might_resched.cold+0x222/0x26b [ 175.854780][ T4186] __lock_sock_fast+0x25/0xe0 [ 175.859512][ T4186] udp_destroy_sock+0x3c/0x250 [ 175.864327][ T4186] ? sk_common_release+0x68/0x390 [ 175.869423][ T4186] ? udp_flush_pending_frames+0xb0/0xb0 [ 175.875062][ T4186] sk_common_release+0x68/0x390 [ 175.879967][ T4186] inet_release+0x132/0x270 [ 175.884522][ T4186] sock_release+0x8b/0x1b0 [ 175.888998][ T4186] l2tp_tunnel_register+0xc75/0x1210 [ 175.894353][ T4186] ? l2tp_tunnel_del_work+0x780/0x780 [ 175.899774][ T4186] ? debug_object_free+0x360/0x360 [ 175.904944][ T4186] ? lockdep_init_map_type+0x21e/0x800 [ 175.910461][ T4186] ? lockdep_init_map_type+0x21e/0x800 [ 175.915982][ T4186] ? l2tp_tunnel_create+0x2bf/0x4b0 [ 175.921230][ T4186] ? l2tp_tunnel_create+0x3c6/0x4b0 [ 175.926482][ T4186] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 175.932191][ T4186] ? l2tp_tunnel_notify.constprop.0+0x160/0x160 [ 175.938505][ T4186] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1b7/0x290 [ 175.945924][ T4186] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x290 [ 175.953343][ T4186] genl_family_rcv_msg_doit+0x228/0x320 [ 175.959027][ T4186] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x290/0x290 [ 175.966461][ T4186] ? ns_capable+0xdd/0x100 [ 175.970933][ T4186] genl_rcv_msg+0x445/0x780 [ 175.975485][ T4186] ? genl_start+0x670/0x670 [ 175.980032][ T4186] ? l2tp_tunnel_notify.constprop.0+0x160/0x160 [ 175.986341][ T4186] ? ref_tracker_free+0x374/0x6b0 [ 175.991419][ T4186] ? lock_release+0x810/0x810 [ 175.996165][ T4186] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 176.001678][ T4186] netlink_rcv_skb+0x157/0x430 [ 176.006496][ T4186] ? genl_start+0x670/0x670 [ 176.011042][ T4186] ? netlink_ack+0xd60/0xd60 [ 176.015679][ T4186] ? netlink_deliver_tap+0x1b1/0xc50 [ 176.021004][ T4186] genl_rcv+0x28/0x40 [ 176.025152][ T4186] netlink_unicast+0x547/0x7f0 [ 176.029970][ T4186] ? netlink_attachskb+0x890/0x890 [ 176.035123][ T4186] ? find_vmap_area+0xf8/0x130 [ 176.039936][ T4186] ? __phys_addr_symbol+0x30/0x70 [ 176.045031][ T4186] ? __check_object_size+0x2e2/0x5a0 [ 176.050369][ T4186] netlink_sendmsg+0x91b/0xe10 [ 176.055180][ T4186] ? netlink_unicast+0x7f0/0x7f0 [ 176.060146][ T4186] ? __x64_sys_sendfile64+0x1d0/0x210 [ 176.065571][ T4186] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 176.070901][ T4186] ? netlink_unicast+0x7f0/0x7f0 [ 176.075963][ T4186] sock_sendmsg+0xd3/0x120 [ 176.080428][ T4186] sock_no_sendpage+0x10c/0x160 [ 176.085315][ T4186] ? sock_kzfree_s+0x60/0x60 [ 176.090310][ T4186] ? mark_held_locks+0x9f/0xe0 [ 176.095153][ T4186] ? kasan_quarantine_put+0xf9/0x220 [ 176.100493][ T4186] ? lockdep_hardirqs_on+0x7d/0x100 [ 176.105742][ T4186] kernel_sendpage.part.0+0x1d5/0x700 [ 176.111170][ T4186] sock_sendpage+0xe3/0x140 [ 176.115722][ T4186] ? kernel_sendpage+0xd0/0xd0 [ 176.120534][ T4186] pipe_to_sendpage+0x2b1/0x380 [ 176.125610][ T4186] ? propagate_umount+0x19f0/0x19f0 [ 176.130869][ T4186] ? splice_from_pipe_next.part.0+0x167/0x520 [ 176.136996][ T4186] __splice_from_pipe+0x449/0x8a0 [ 176.142127][ T4186] ? propagate_umount+0x19f0/0x19f0 [ 176.147379][ T4186] generic_splice_sendpage+0xd8/0x140 [ 176.152796][ T4186] ? __do_sys_vmsplice+0xa90/0xa90 [ 176.157954][ T4186] ? security_file_permission+0xaf/0xd0 [ 176.163549][ T4186] ? __do_sys_vmsplice+0xa90/0xa90 [ 176.168701][ T4186] direct_splice_actor+0x114/0x180 [ 176.173853][ T4186] splice_direct_to_actor+0x335/0x8a0 [ 176.179295][ T4186] ? do_splice_direct+0x280/0x280 [ 176.184360][ T4186] ? folio_flags.constprop.0+0x150/0x150 [ 176.190035][ T4186] ? bpf_lsm_file_permission+0x9/0x10 [ 176.195440][ T4186] ? security_file_permission+0xaf/0xd0 [ 176.201038][ T4186] do_splice_direct+0x1ab/0x280 [ 176.205926][ T4186] ? splice_direct_to_actor+0x8a0/0x8a0 [ 176.211512][ T4186] ? bpf_lsm_file_permission+0x9/0x10 [ 176.216916][ T4186] ? security_file_permission+0xaf/0xd0 [ 176.222527][ T4186] do_sendfile+0xb19/0x1270 [ 176.227085][ T4186] ? vfs_iocb_iter_write+0x480/0x480 [ 176.232408][ T4186] ? xfd_validate_state+0x5d/0x180 [ 176.237554][ T4186] ? restore_fpregs_from_fpstate+0xc1/0x1c0 [ 176.243653][ T4186] __x64_sys_sendfile64+0x1d0/0x210 [ 176.248881][ T4186] ? __ia32_sys_sendfile+0x220/0x220 [ 176.254198][ T4186] ? syscall_enter_from_user_mode+0x26/0xb0 [ 176.260124][ T4186] do_syscall_64+0x39/0xb0 [ 176.264575][ T4186] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 176.270495][ T4186] RIP: 0033:0x7f6ac588b639 [ 176.274923][ T4186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 176.294721][ T4186] RSP: 002b:00007f6ac6541168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 176.303158][ T4186] RAX: ffffffffffffffda RBX: 00007f6ac59abf80 RCX: 00007f6ac588b639 [ 176.311146][ T4186] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 176.319219][ T4186] RBP: 00007f6ac58e6ae9 R08: 0000000000000000 R09: 0000000000000000 [ 176.327205][ T4186] R10: 0000000100000000 R11: 0000000000000246 R12: 0000000000000000 [ 176.335192][ T4186] R13: 00007ffeb6ea978f R14: 00007f6ac6541300 R15: 0000000000022000 [ 176.343185][ T4186]