[ 87.711341][ T28] audit: type=1800 audit(1582047611.184:26): pid=9616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 88.602149][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 88.602160][ T28] audit: type=1800 audit(1582047612.094:29): pid=9616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 88.628558][ T28] audit: type=1800 audit(1582047612.094:30): pid=9616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.191' (ECDSA) to the list of known hosts. 2020/02/18 17:40:22 fuzzer started 2020/02/18 17:40:23 dialing manager at 10.128.0.26:33873 2020/02/18 17:40:23 syscalls: 2951 2020/02/18 17:40:23 code coverage: enabled 2020/02/18 17:40:23 comparison tracing: enabled 2020/02/18 17:40:23 extra coverage: enabled 2020/02/18 17:40:23 setuid sandbox: enabled 2020/02/18 17:40:23 namespace sandbox: enabled 2020/02/18 17:40:23 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/18 17:40:23 fault injection: enabled 2020/02/18 17:40:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/18 17:40:23 net packet injection: enabled 2020/02/18 17:40:23 net device setup: enabled 2020/02/18 17:40:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/18 17:40:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:43:57 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) 17:43:57 executing program 1: socket$kcm(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002c40)={&(0x7f0000001840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002b80)=[{&(0x7f00000018c0)=""/79, 0x4f}, {&(0x7f0000002940)}, {&(0x7f0000002980)=""/21, 0x15}, {&(0x7f00000029c0)=""/39, 0x27}, {&(0x7f0000002a80)=""/198, 0xc6}], 0x5, &(0x7f0000002c00)=""/59, 0x3b}, 0x102) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000040)=0x10100) recvmsg$kcm(r0, &(0x7f0000000cc0)={&(0x7f0000000b00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000b80)=""/44, 0x2c}, {&(0x7f0000000bc0)=""/38, 0x26}, {&(0x7f0000000c00)=""/48, 0x30}, {&(0x7f0000003c80)=""/4096, 0x1000}], 0x4, &(0x7f0000000c80)=""/1, 0x1}, 0x40000000) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f00000000c0)}, 0x8000) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000080)}, 0x0) recvmsg$kcm(r3, &(0x7f000000e080)={&(0x7f000000de00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000e000)=[{&(0x7f000000de80)=""/62, 0x3e}, {&(0x7f000000dec0)=""/117, 0x75}, {&(0x7f000000df40)=""/130, 0x82}], 0x3, &(0x7f000000e040)=""/29, 0x1d}, 0x40) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) ioctl$TUNSETFILTEREBPF(r6, 0x6611, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0x9, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000500d000000000000ff030000d7570700db00000095000000000000009500000000001c0018200000", @ANYRES32, @ANYBLOB="000000000300ff0781100000ffffffff9500000000000000"], &(0x7f0000000100)='GPL\x00', 0x80, 0x0, &(0x7f0000000140), 0x41000, 0x2, [], 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x5, 0x4, 0xfffffff8, 0x4}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x23, 0x4, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80}, [@ldst={0x2, 0x0, 0x2, 0x6, 0x0, 0x20, 0xfffffffffffffff0}]}, &(0x7f00000003c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x1d, r6, 0x8, &(0x7f0000000480)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x7, 0x6, 0x1}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e140)={0x5, 0xd, &(0x7f0000000580)=ANY=[@ANYBLOB="180000707c00ff01000000000000970a000081839bb40400000085100000040000001800000072000000000000000000e30085000000130000005538f8fff0ffffffdda80001080000001821", @ANYRES32=r2, @ANYBLOB="00000000ff000000cb760000100000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x9, 0xe0, &(0x7f00000009c0)=""/224, 0x41100, 0x4, [], r4, 0x1, r5, 0x8, &(0x7f000000e0c0)={0x2}, 0x8, 0x10, &(0x7f000000e100)={0x5, 0x0, 0x400, 0x8}, 0x10, r7}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r8, &(0x7f0000000000), 0x12) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r9, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x4, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x3ff, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x20000000001}}, 0x10) syzkaller login: [ 314.247360][ T9785] IPVS: ftp: loaded support on port[0] = 21 [ 314.412062][ T9785] chnl_net:caif_netlink_parms(): no params data found [ 314.547877][ T9788] IPVS: ftp: loaded support on port[0] = 21 [ 314.549917][ T9785] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.561831][ T9785] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.570392][ T9785] device bridge_slave_0 entered promiscuous mode [ 314.579713][ T9785] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.588143][ T9785] bridge0: port 2(bridge_slave_1) entered disabled state 17:43:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000580)=0x1) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='cgroup.controllers\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) close(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x9120, 0x9, 0x7, 0x7, 0x1000}, 0x0, 0x9, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a, 0x59}, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000100)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x1f, 0x0, &(0x7f0000001500)=ANY=[@ANYRES16], &(0x7f0000001400)='GPL\x00', 0x8000fd, 0x5c, &(0x7f0000001440)=""/92, 0x41000, 0x0, [], 0x0, 0x12, r5, 0x8, &(0x7f00000007c0)={0x3}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) r7 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x50, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087715082cf0400b0eb04002800160011000586f9835b3f2f009148790028f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r7, &(0x7f0000004dc0)={&(0x7f0000004b80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004a00)=[{0x0}, {0x0}], 0x2, &(0x7f0000004cc0)=""/54, 0x36}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000004e00)={0x9, 0x1, 0x4, 0x97c9, 0x408, 0x1, 0xffffffff, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x402) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r10, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x19, 0xf, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xee}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x8001, 0x7b, &(0x7f0000000640)=""/123, 0x40f00, 0x0, [], r8, 0x4, r10, 0x8, &(0x7f00000003c0)={0x7}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x9, 0x6ebe}, 0x10}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000001c0)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x3, 0xfffffff9, 0x402}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r4, r3, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) [ 314.596185][ T9785] device bridge_slave_1 entered promiscuous mode [ 314.629463][ T9785] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.649533][ T9785] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.707910][ T9785] team0: Port device team_slave_0 added [ 314.729741][ T9785] team0: Port device team_slave_1 added [ 314.773216][ T9785] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 314.794821][ T9785] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 314.844799][ T9785] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 314.877348][ T9785] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 314.884324][ T9785] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 314.930895][ T9785] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 17:43:58 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a, 0x59}, 0x2700) [ 314.971414][ T9795] IPVS: ftp: loaded support on port[0] = 21 [ 315.007998][ T9785] device hsr_slave_0 entered promiscuous mode [ 315.035174][ T9785] device hsr_slave_1 entered promiscuous mode [ 315.201719][ T9788] chnl_net:caif_netlink_parms(): no params data found [ 315.296714][ T9798] IPVS: ftp: loaded support on port[0] = 21 17:43:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x26c, 0x0, &(0x7f0000000080)="020043d05d25b666cd783f4b231c", 0x0, 0x8e}, 0x28) [ 315.422649][ T9795] chnl_net:caif_netlink_parms(): no params data found [ 315.494539][ T9788] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.504073][ T9788] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.517928][ T9788] device bridge_slave_0 entered promiscuous mode [ 315.533027][ T9785] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 315.591882][ T9788] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.618380][ T9788] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.626916][ T9788] device bridge_slave_1 entered promiscuous mode [ 315.636990][ T9785] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 315.718046][ T9785] netdevsim netdevsim0 netdevsim2: renamed from eth2 17:43:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001d80)={&(0x7f0000001b00)=@xdp, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000140)=""/176, 0xb0}, {&(0x7f0000001c40)=""/59, 0x3b}, {&(0x7f0000001c80)=""/82, 0x52}], 0x3, &(0x7f0000000240)=""/42, 0x2a}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000001980)={r0}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x5, 0x0, 0x3, 0x3, 0x0, 0x2, 0xd2100, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.swap.current\x00', 0x7a05, 0x1700) socketpair$tipc(0x1e, 0xeab271cc15b86ae8, 0x0, &(0x7f00000003c0)) [ 315.783653][ T9788] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.819186][ T9804] IPVS: ftp: loaded support on port[0] = 21 [ 315.833406][ T9785] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 315.895528][ T9788] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.992668][ T9788] team0: Port device team_slave_0 added [ 316.002322][ T9795] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.012185][ T9795] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.020481][ T9795] device bridge_slave_0 entered promiscuous mode [ 316.042979][ T9798] chnl_net:caif_netlink_parms(): no params data found [ 316.058948][ T9788] team0: Port device team_slave_1 added [ 316.065139][ T9795] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.072238][ T9795] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.081450][ T9795] device bridge_slave_1 entered promiscuous mode [ 316.094479][ T9811] IPVS: ftp: loaded support on port[0] = 21 [ 316.159302][ T9788] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 316.166452][ T9788] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 316.194308][ T9788] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 316.207486][ T9795] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.222236][ T9795] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.256425][ T9788] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 316.263404][ T9788] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 316.289455][ T9788] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 316.367873][ T9795] team0: Port device team_slave_0 added [ 316.387055][ T9804] chnl_net:caif_netlink_parms(): no params data found [ 316.456739][ T9788] device hsr_slave_0 entered promiscuous mode [ 316.515423][ T9788] device hsr_slave_1 entered promiscuous mode [ 316.574911][ T9788] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 316.582648][ T9788] Cannot create hsr debugfs directory [ 316.589814][ T9795] team0: Port device team_slave_1 added [ 316.602158][ T9798] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.610162][ T9798] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.618176][ T9798] device bridge_slave_0 entered promiscuous mode [ 316.670598][ T9798] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.679266][ T9798] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.687274][ T9798] device bridge_slave_1 entered promiscuous mode [ 316.712164][ T9795] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 316.719328][ T9795] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 316.745980][ T9795] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 316.775733][ T9798] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.790006][ T9795] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 316.798430][ T9795] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 316.825616][ T9795] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 316.849999][ T9798] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.878539][ T9798] team0: Port device team_slave_0 added [ 316.905556][ T9804] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.912851][ T9804] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.921196][ T9804] device bridge_slave_0 entered promiscuous mode [ 316.933034][ T9798] team0: Port device team_slave_1 added [ 316.976951][ T9804] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.984054][ T9804] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.992405][ T9804] device bridge_slave_1 entered promiscuous mode [ 317.066849][ T9795] device hsr_slave_0 entered promiscuous mode [ 317.125218][ T9795] device hsr_slave_1 entered promiscuous mode [ 317.164915][ T9795] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 317.172525][ T9795] Cannot create hsr debugfs directory [ 317.211940][ T9798] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 317.219086][ T9798] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.245058][ T9798] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 317.258345][ T9804] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 317.275585][ T9785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.288965][ T9804] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.303312][ T9798] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 317.310447][ T9798] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.336601][ T9798] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 317.348251][ T9811] chnl_net:caif_netlink_parms(): no params data found [ 317.478146][ T9798] device hsr_slave_0 entered promiscuous mode [ 317.535220][ T9798] device hsr_slave_1 entered promiscuous mode [ 317.585108][ T9798] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 317.592690][ T9798] Cannot create hsr debugfs directory [ 317.607915][ T9804] team0: Port device team_slave_0 added [ 317.646548][ T9804] team0: Port device team_slave_1 added [ 317.689917][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 317.699537][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.719277][ T9788] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 317.772056][ T9788] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 317.830516][ T9804] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 317.837789][ T9804] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.863801][ T9804] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 317.876709][ T9785] 8021q: adding VLAN 0 to HW filter on device team0 [ 317.884065][ T9804] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 317.891091][ T9804] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.921445][ T9804] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 317.942440][ T9811] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.949622][ T9811] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.957754][ T9811] device bridge_slave_0 entered promiscuous mode [ 317.965062][ T9788] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 318.029253][ T9788] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 318.095394][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.104054][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.112705][ T9823] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.120062][ T9823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.128116][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.137416][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.146540][ T9823] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.153719][ T9823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.177674][ T9811] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.188279][ T9811] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.196386][ T9811] device bridge_slave_1 entered promiscuous mode [ 318.214058][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 318.248798][ T9811] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 318.260615][ T9811] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 318.318068][ T9804] device hsr_slave_0 entered promiscuous mode [ 318.345388][ T9804] device hsr_slave_1 entered promiscuous mode [ 318.395011][ T9804] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 318.402599][ T9804] Cannot create hsr debugfs directory [ 318.423388][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 318.432059][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 318.472214][ T9811] team0: Port device team_slave_0 added [ 318.487158][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 318.496283][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 318.504863][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 318.514148][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 318.522870][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 318.531296][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.540855][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 318.558902][ T9811] team0: Port device team_slave_1 added [ 318.581551][ T9785] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 318.593431][ T9785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 318.634631][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 318.647063][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.676510][ T9795] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 318.737565][ T9811] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 318.744554][ T9811] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 318.771849][ T9811] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 318.785529][ T9811] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 318.792515][ T9811] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 318.819564][ T9811] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 318.845373][ T9795] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 318.908744][ T9795] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 318.987934][ T9795] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 319.088609][ T9811] device hsr_slave_0 entered promiscuous mode [ 319.135565][ T9811] device hsr_slave_1 entered promiscuous mode [ 319.185390][ T9811] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 319.192989][ T9811] Cannot create hsr debugfs directory [ 319.246225][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 319.253813][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 319.319011][ T9785] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 319.334340][ T9798] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 319.419121][ T9804] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 319.488905][ T9804] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 319.558279][ T9804] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 319.616458][ T9798] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 319.678180][ T9804] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 319.726619][ T9798] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 319.788146][ T9788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.799021][ T9798] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 319.863197][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 319.873279][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 319.944197][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 319.954131][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.970509][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.978658][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 319.999191][ T9788] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.012600][ T9811] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 320.047127][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.055997][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.074910][ T9795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.082385][ T9785] device veth0_vlan entered promiscuous mode [ 320.095083][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.103948][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.112776][ T9792] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.119907][ T9792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.128036][ T9811] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 320.171246][ T9811] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 320.217871][ T9811] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 320.306068][ T9785] device veth1_vlan entered promiscuous mode [ 320.314871][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 320.323067][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.331468][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.339413][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.390201][ T9795] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.404166][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 320.414903][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.423513][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.435599][ T9818] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.442770][ T9818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.482847][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.534594][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.543498][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.553328][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.563196][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.572397][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.581236][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.590163][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.598950][ T9823] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.606172][ T9823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.618318][ T9785] device veth0_macvtap entered promiscuous mode [ 320.648196][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 320.659009][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.667497][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.677541][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.686251][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.695177][ T2852] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.702370][ T2852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.710700][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.719413][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.733508][ T9785] device veth1_macvtap entered promiscuous mode [ 320.777411][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 320.790159][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.799711][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.812394][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.822390][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.833638][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.842869][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.854611][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.864331][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.884662][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.898968][ T9811] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.911546][ T9798] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.932220][ T9785] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 320.961639][ T9804] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.968769][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.981132][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.990266][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.998939][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 321.016126][ T9785] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 321.045411][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.054523][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.063252][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.072778][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.081993][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.090175][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.098388][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.107641][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.116498][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.124323][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.136442][ T9811] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.151225][ T9795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 321.163664][ T9795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 321.180291][ T9798] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.188583][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 321.196826][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 321.204374][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.212791][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.225781][ T9788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.238210][ T9804] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.262440][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.272988][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.281736][ T2852] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.288832][ T2852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.298883][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.307755][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.316504][ T2852] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.323580][ T2852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.405622][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.413606][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.422088][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.431863][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.441779][ T9806] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.448905][ T9806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.457428][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.466298][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.474702][ T9806] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.482009][ T9806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.489629][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.499312][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.508428][ T9806] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.515618][ T9806] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.524391][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.533133][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.541705][ T9806] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.548859][ T9806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.556880][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.566063][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.575340][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.584123][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 321.690133][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.698639][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 321.706289][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 321.713904][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 321.727666][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.736677][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 321.750460][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.759666][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.768731][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 321.777710][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.786339][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.876808][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.896058][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.908004][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.917721][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.926562][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.935983][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.944371][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.957053][ T9795] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.973591][ T9788] device veth0_vlan entered promiscuous mode [ 322.000685][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.008659][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 322.018432][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.027878][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 322.036907][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.046442][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 322.055743][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.064300][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.073014][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.083589][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.097299][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.107090][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.117650][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.142582][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.175059][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.183603][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.193987][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.203100][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.221746][ T9788] device veth1_vlan entered promiscuous mode 17:44:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) [ 322.238190][ T9811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.250264][ T9798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.266301][ T9804] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 322.279187][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:44:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) [ 322.295028][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 322.303301][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.328735][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.337850][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 322.348189][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 17:44:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) [ 322.434146][ T9795] device veth0_vlan entered promiscuous mode 17:44:06 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040), 0x157) [ 322.497075][ T9811] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.504339][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 322.518262][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 322.545954][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 322.553520][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 322.571198][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 17:44:06 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040), 0x157) [ 322.590996][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.615856][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.633719][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.641894][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.669964][ T9795] device veth1_vlan entered promiscuous mode [ 322.702417][ T9788] device veth0_macvtap entered promiscuous mode 17:44:06 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040), 0x157) [ 322.713939][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 322.730734][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 322.746041][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 322.753697][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 322.762439][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 322.770776][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 322.793302][ T9798] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.807563][ T9804] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.830209][ T9788] device veth1_macvtap entered promiscuous mode 17:44:06 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) [ 322.897866][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 322.913916][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.972723][ T9788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.994284][ T9788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.016487][ T9788] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 323.039559][ T9795] device veth0_macvtap entered promiscuous mode [ 323.049150][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.062583][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.071643][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 323.080773][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 323.090387][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 323.105857][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 323.151482][ T9788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 323.168620][ T9788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.181946][ T9788] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 323.194034][ T9795] device veth1_macvtap entered promiscuous mode [ 323.203744][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 323.212161][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 323.220636][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 323.229370][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 323.269659][ T9798] device veth0_vlan entered promiscuous mode [ 323.284999][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.293685][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.303157][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.312121][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.321400][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.329844][ T9828] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.361189][ T9795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 323.372006][ T9795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.383229][ T9795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 323.394403][ T9795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.406999][ T9795] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 323.487013][ T9798] device veth1_vlan entered promiscuous mode [ 323.494253][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 323.502762][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 323.512259][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 323.521015][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.530511][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.541252][ T9795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 323.552557][ T9795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.562726][ T9795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 323.573793][ T9795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.586322][ T9795] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 323.709040][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 323.717344][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 323.726247][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 323.753969][ T9811] device veth0_vlan entered promiscuous mode [ 323.772042][ T9804] device veth0_vlan entered promiscuous mode [ 323.795867][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.804393][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.836093][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.858264][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.882634][ T9811] device veth1_vlan entered promiscuous mode [ 323.894084][ C1] hrtimer: interrupt took 26975 ns [ 323.912145][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.922321][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.933595][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 323.950070][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.960676][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.973525][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.008202][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.048183][ T9798] device veth0_macvtap entered promiscuous mode [ 324.118405][ T9798] device veth1_macvtap entered promiscuous mode [ 324.136104][ T9804] device veth1_vlan entered promiscuous mode [ 324.231757][ T9798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 324.249400][ T9798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.260597][ T9798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 324.277414][ T9798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.290239][ T9798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 324.302936][ T9798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.316780][ T9798] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 324.333619][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 324.345752][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.354351][ T9823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 17:44:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x1011}}}}}}]}, 0x48}, 0x1, 0x6000000}, 0x0) [ 324.378173][ T9798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.398667][ T9798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.424882][ T9798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.435902][ T9798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.446119][ T9798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.456977][ T9798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.469826][ T9798] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 324.499416][ T9811] device veth0_macvtap entered promiscuous mode [ 324.725751][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.734363][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.743784][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.752623][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.763659][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 324.783027][ T9804] device veth0_macvtap entered promiscuous mode [ 324.798725][ T9811] device veth1_macvtap entered promiscuous mode [ 324.868378][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 324.879982][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.888847][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.908744][ T9804] device veth1_macvtap entered promiscuous mode [ 324.920311][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 324.930564][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 324.979193][ T9804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 324.992073][ T9804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.002376][ T9804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.023118][ T9804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.033825][ T9804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.045833][ T9804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.057478][ T9804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.067974][ T9804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.079742][ T9804] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 325.154200][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 325.163335][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 325.175294][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.188250][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.199683][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.210720][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.221333][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.232192][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.242563][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.253397][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.263384][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.274357][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.287277][ T9811] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 325.339631][ T9804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.353580][ T9804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.364351][ T9804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.374963][ T9804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.384918][ T9804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.395437][ T9804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.405331][ T9804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.416764][ T9804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.428634][ T9804] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 325.436344][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 325.445639][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 325.454398][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 325.463577][ T9818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 325.476904][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.488779][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.499189][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.510502][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.522016][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.536995][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.549454][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.562218][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.574248][ T9811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.587026][ T9811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.598776][ T9811] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 325.666627][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 325.679082][ T2740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 326.327375][ T9900] @: renamed from team0 [ 326.449131][ T9900] 8021q: adding VLAN 0 to HW filter on device @ 17:44:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000580)=0x1) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='cgroup.controllers\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) close(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x9120, 0x9, 0x7, 0x7, 0x1000}, 0x0, 0x9, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a, 0x59}, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000100)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x1f, 0x0, &(0x7f0000001500)=ANY=[@ANYRES16], &(0x7f0000001400)='GPL\x00', 0x8000fd, 0x5c, &(0x7f0000001440)=""/92, 0x41000, 0x0, [], 0x0, 0x12, r5, 0x8, &(0x7f00000007c0)={0x3}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c003054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c3d22c0f9bc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b0000f00f1ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df271"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) r7 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x50, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087715082cf0400b0eb04002800160011000586f9835b3f2f009148790028f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r7, &(0x7f0000004dc0)={&(0x7f0000004b80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004a00)=[{0x0}, {0x0}], 0x2, &(0x7f0000004cc0)=""/54, 0x36}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000004e00)={0x9, 0x1, 0x4, 0x97c9, 0x408, 0x1, 0xffffffff, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x402) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r10, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x19, 0xf, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xee}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x8001, 0x7b, &(0x7f0000000640)=""/123, 0x40f00, 0x0, [], r8, 0x4, r10, 0x8, &(0x7f00000003c0)={0x7}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x9, 0x6ebe}, 0x10}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000001c0)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x3, 0xfffffff9, 0x402}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r4, r3, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) 17:44:10 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a, 0x59}, 0x2700) 17:44:10 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) [ 327.066057][ T9900] syz-executor.5 (9900) used greatest stack depth: 22584 bytes left [ 327.070193][ T9917] 8021q: adding VLAN 0 to HW filter on device @ 17:44:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001d80)={&(0x7f0000001b00)=@xdp, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000140)=""/176, 0xb0}, {&(0x7f0000001c40)=""/59, 0x3b}, {&(0x7f0000001c80)=""/82, 0x52}], 0x3, &(0x7f0000000240)=""/42, 0x2a}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000001980)={r0}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x5, 0x0, 0x3, 0x3, 0x0, 0x2, 0xd2100, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.swap.current\x00', 0x7a05, 0x1700) socketpair$tipc(0x1e, 0xeab271cc15b86ae8, 0x0, &(0x7f00000003c0)) 17:44:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000006c0)={0x1, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 17:44:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() prlimit64(r3, 0x0, &(0x7f0000000040), 0x0) 17:44:10 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) 17:44:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() prlimit64(r3, 0x0, &(0x7f0000000040), 0x0) 17:44:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) 17:44:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) 17:44:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)=r0, 0x157) 17:44:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001d80)={&(0x7f0000001b00)=@xdp, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000140)=""/176, 0xb0}, {&(0x7f0000001c40)=""/59, 0x3b}, {&(0x7f0000001c80)=""/82, 0x52}], 0x3, &(0x7f0000000240)=""/42, 0x2a}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000001980)={r0}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x5, 0x0, 0x3, 0x3, 0x0, 0x2, 0xd2100, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.swap.current\x00', 0x7a05, 0x1700) socketpair$tipc(0x1e, 0xeab271cc15b86ae8, 0x0, &(0x7f00000003c0)) [ 327.835820][ T9940] 8021q: adding VLAN 0 to HW filter on device @ 17:44:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000006c0)={0x1, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 17:44:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a, 0x59}, 0x2700) 17:44:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000006c0)={0x1, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 17:44:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000006c0)={0x1, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 17:44:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, 0x0, 0x0) 17:44:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, 0x0, 0x0) 17:44:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, 0x0, 0x0) [ 328.581215][ T9961] @: renamed from team0 17:44:12 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000580)=0x1) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='cgroup.controllers\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) close(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x9120, 0x9, 0x7, 0x7, 0x1000}, 0x0, 0x9, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a, 0x59}, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000100)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x1f, 0x0, &(0x7f0000001500)=ANY=[@ANYRES16], &(0x7f0000001400)='GPL\x00', 0x8000fd, 0x5c, &(0x7f0000001440)=""/92, 0x41000, 0x0, [], 0x0, 0x12, r5, 0x8, &(0x7f00000007c0)={0x3}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) r7 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x50, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087715082cf0400b0eb04002800160011000586f9835b3f2f009148790028f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r7, &(0x7f0000004dc0)={&(0x7f0000004b80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004a00)=[{0x0}, {0x0}], 0x2, &(0x7f0000004cc0)=""/54, 0x36}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000004e00)={0x9, 0x1, 0x4, 0x97c9, 0x408, 0x1, 0xffffffff, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x402) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r10, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x19, 0xf, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xee}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x8001, 0x7b, &(0x7f0000000640)=""/123, 0x40f00, 0x0, [], r8, 0x4, r10, 0x8, &(0x7f00000003c0)={0x7}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x9, 0x6ebe}, 0x10}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000001c0)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x3, 0xfffffff9, 0x402}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r4, r3, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) 17:44:12 executing program 1: ustat(0x1, &(0x7f0000000240)) 17:44:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040), 0x157) [ 328.903713][ T9961] 8021q: adding VLAN 0 to HW filter on device @ 17:44:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x20000000000004}, 0x1c) sendmmsg(r2, &(0x7f0000001300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)}}], 0x1, 0x0) 17:44:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="3401000010000507be00"/20, @ANYRES32=0x0, @ANYBLOB="0000000004000000080112000c0001006d6163766c616e00f80002004c0005000a00040000000000000000000a00ebffd11bf5466bca000002000400ea9c2f85340b00000a000400aaaaaaaaaaaa00000a000400aaaaaaaaaabb20000a000400aaaaaac8aabb00000a000400aaaaaaaaaabb000008000100100000000a000400aaaaaaaaaaaa00000a000400aaaaaaaaaa230000080003000300000009bc030002000000640005000a1904000180c200000300000a000400ffffffffffff00000a00bb00aaaaaaaaaa2400000a000400ffffffffffff00000a00040000000000000000000afd030000000000000000000a0004000180c200000200000a00040010c78401156400000800030051480c710a00050004000000000000008cebcfede90c55c31ad137113554103dd0e6e3aef5c1ef84f27b535b60131f591dd4464468822ffb399f5b35992fce4ba75b5d4549fe212ccbfb1fe64794c22c97601edd8c5be3ac4e10d40001b58b222c3b29b009bc07e0a5b801000000000000008e82c976fb92f6934ba62de4ab266be7a8aacd9fe1cb8a55e4645005d16a4eab6cf578ca8801000000c6766e4b4e0d58dd22a49d9492daf93eab6586dded12b188d31f89c15054f7c532e20f90412d1d9446a593efb12e65ae2b01f9a74299c31e0fb5991300000000f6603b389e34f193cc94f61527418a02a89935ff0dec3ad48e2628d0d27ca32c719cb9c6b93177246e46e94a0d4e230e3de615035665b2feb8add3cf3bce0ed5853a8b21e8541b046d5ecaebf9832f0b"], 0x134}}, 0x10) syz_genetlink_get_family_id$batadv(0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:44:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d20680648c63940d0424fc60040012400a001600063582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 17:44:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)='%V', 0x2}, {&(0x7f0000002900)="c9", 0x1}], 0x2}], 0x1, 0x0) 17:44:12 executing program 1: getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x200}, &(0x7f0000000300)=0x10) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) pipe(0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 17:44:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040), 0x157) [ 329.291003][T10010] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 329.341443][T10021] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 329.351126][T10010] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.3'. 17:44:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040), 0x157) [ 329.401037][T10021] netlink: 16638 bytes leftover after parsing attributes in process `syz-executor.2'. 17:44:13 executing program 4: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) chmod(&(0x7f0000000080)='./bus\x00', 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 17:44:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="500000001000210400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002800128008000100677470001c00028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="524940d32de2f97b54704b"], 0x50}}, 0x0) [ 329.625801][T10023] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 329.653334][T10023] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.3'. [ 329.713498][T10038] Invalid argument reading file caps for ./bus 17:44:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000580)=0x1) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='cgroup.controllers\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) close(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x9120, 0x9, 0x7, 0x7, 0x1000}, 0x0, 0x9, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a, 0x59}, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000100)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x1f, 0x0, &(0x7f0000001500)=ANY=[@ANYRES16], &(0x7f0000001400)='GPL\x00', 0x8000fd, 0x5c, &(0x7f0000001440)=""/92, 0x41000, 0x0, [], 0x0, 0x12, r5, 0x8, &(0x7f00000007c0)={0x3}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) r7 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x50, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087715082cf0400b0eb04002800160011000586f9835b3f2f009148790028f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r7, &(0x7f0000004dc0)={&(0x7f0000004b80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004a00)=[{0x0}, {0x0}], 0x2, &(0x7f0000004cc0)=""/54, 0x36}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000004e00)={0x9, 0x1, 0x4, 0x97c9, 0x408, 0x1, 0xffffffff, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x402) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r10, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x19, 0xf, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xee}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x8001, 0x7b, &(0x7f0000000640)=""/123, 0x40f00, 0x0, [], r8, 0x4, r10, 0x8, &(0x7f00000003c0)={0x7}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x9, 0x6ebe}, 0x10}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000001c0)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x3, 0xfffffff9, 0x402}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r4, r3, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) 17:44:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x11, 0x0, 0x300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 17:44:13 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000480)=""/13, 0xd}], 0x1, 0x0) 17:44:13 executing program 4: 17:44:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="500000001000210400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002800128008000100677470001c00028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="524940d32de2f97b54704b"], 0x50}}, 0x0) 17:44:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="500000001000210400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002800128008000100677470001c00028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="524940d32de2f97b54704b"], 0x50}}, 0x0) 17:44:13 executing program 4: 17:44:14 executing program 2: 17:44:14 executing program 3: 17:44:14 executing program 4: 17:44:14 executing program 2: 17:44:14 executing program 4: 17:44:15 executing program 5: 17:44:15 executing program 2: 17:44:15 executing program 3: 17:44:15 executing program 4: 17:44:15 executing program 0: 17:44:15 executing program 1: 17:44:15 executing program 2: 17:44:15 executing program 3: 17:44:15 executing program 4: 17:44:15 executing program 0: 17:44:15 executing program 1: 17:44:15 executing program 5: 17:44:15 executing program 2: 17:44:15 executing program 3: 17:44:15 executing program 0: 17:44:15 executing program 4: 17:44:15 executing program 5: 17:44:15 executing program 1: 17:44:15 executing program 2: 17:44:15 executing program 3: 17:44:15 executing program 0: 17:44:15 executing program 5: 17:44:15 executing program 2: 17:44:15 executing program 4: 17:44:15 executing program 1: 17:44:15 executing program 3: 17:44:15 executing program 0: 17:44:16 executing program 5: 17:44:16 executing program 1: 17:44:16 executing program 2: 17:44:16 executing program 3: 17:44:16 executing program 4: 17:44:16 executing program 0: 17:44:16 executing program 5: 17:44:16 executing program 1: 17:44:16 executing program 2: 17:44:16 executing program 4: 17:44:16 executing program 3: 17:44:16 executing program 0: 17:44:16 executing program 5: 17:44:16 executing program 4: 17:44:16 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x54) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000140)={0x6, 0x20}) clone(0x2a00b480, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x119481, 0x0) socket(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) 17:44:16 executing program 1: r0 = socket(0x6000000000010, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492778, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x13, r2, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:44:16 executing program 3: 17:44:16 executing program 0: 17:44:16 executing program 5: 17:44:16 executing program 4: 17:44:16 executing program 3: 17:44:16 executing program 0: 17:44:16 executing program 5: 17:44:16 executing program 1: 17:44:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x54) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000140)={0x6, 0x20}) clone(0x2a00b480, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x119481, 0x0) socket(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) 17:44:17 executing program 4: 17:44:17 executing program 3: 17:44:17 executing program 5: 17:44:17 executing program 1: 17:44:17 executing program 0: 17:44:17 executing program 4: 17:44:17 executing program 3: 17:44:17 executing program 5: 17:44:17 executing program 1: 17:44:17 executing program 0: 17:44:17 executing program 4: 17:44:17 executing program 2: 17:44:17 executing program 1: 17:44:17 executing program 0: 17:44:17 executing program 3: 17:44:17 executing program 4: 17:44:17 executing program 5: 17:44:17 executing program 4: 17:44:17 executing program 3: 17:44:17 executing program 1: 17:44:17 executing program 0: 17:44:18 executing program 5: 17:44:18 executing program 2: 17:44:18 executing program 3: 17:44:18 executing program 4: 17:44:18 executing program 1: 17:44:18 executing program 0: 17:44:18 executing program 5: 17:44:18 executing program 4: 17:44:18 executing program 3: 17:44:18 executing program 1: 17:44:18 executing program 2: 17:44:18 executing program 0: 17:44:18 executing program 5: 17:44:18 executing program 4: 17:44:18 executing program 3: 17:44:18 executing program 1: 17:44:18 executing program 0: 17:44:18 executing program 2: 17:44:18 executing program 5: 17:44:18 executing program 4: 17:44:18 executing program 3: 17:44:18 executing program 1: 17:44:18 executing program 0: 17:44:19 executing program 5: 17:44:19 executing program 2: 17:44:19 executing program 3: 17:44:19 executing program 4: 17:44:19 executing program 1: 17:44:19 executing program 0: 17:44:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="34e7ff000000350000007f12b579fbec9961f0bf6401caa02b8c15eeb8e20093750ecbd956df78a949b7d0e2cd5c389c1f42d3a9bdd962f67087f744de2c074877826f45a535626e05b645ca18b67561e2fcda4806d40ce1fb6cc6fe46b80000f2682d1ae8ba91597b94d13733b381a9b6600d019f0bc48589227096f0f1e5c046812081b646b82ec728705be751423250b8b837a8c0b5c77297cd01471840150735eb5f1fa6ad8a96e86276fcaf4d9a013424200d2d11af25098583fa490d5e00000000010000008b92fece177ea5fc939666fc3bcd753641bf5dd7eca702026774e5b3431f354304000000e87152de010002000000000088d25d5bc60c5c07945e591ac86758f6856d94177cb686946c209934ad2b157a100df8cfffff4753c735eb6f215353783141df1eb49aabf1aaec3b65515003d7d360e279bd45ed25bbeaefc6befd00000000004a61f21d6c64263240000000f4e50000d6b156bff4d7e1f9179ebf4018f5d7f9cd7b6a8100ff3a81e3746b242894de7b3279013432115237505fb2c012b7260342638e47c7774a0fc317e75d67f410c29d06dcfcb1aa3692e0d5995800d6696c739ad2c3d55a7c4ac2f9ba900b855d96b9dc51724edb61b99ee619410acf21c46e5eed3db1ca654f58e67bdb00be3ec4278180246fb233bbc55c23dae83c5cd8f150ab60b68708fe98a0cd2882a46831f55ca720da524f54e56f088ddb3b33eb6aa6d9aaf86356c1ce75481a6c51c81206f47e2571caa40ab28998931f142cb6f69de115007a9929cc281755d2694462142cb9124fc306593167d3a25d5bb4a31d764b7928e852e4d97b647ce70ce0dfc66e01c8d98d9fa587a6a6e90104497d583e1a8cd54e01eca17be329dbc085959e5c76315e2bad4a2092005f2ae22d2f584fc97f23b80a167f6753aa59de97cbd74f9a6f2835cf515566ecf7618fb80037e6472aee7c8c92fdc3abf41c607c43b766e95ab76c0793ab2f7d5a002bd892c52caae31487af8c3c0fbc85779d58cfbbccfc0bd9b9ae221e261893778782201b9a09f991aeb6e2ea"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)) 17:44:19 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 17:44:19 executing program 3: 17:44:19 executing program 4: 17:44:19 executing program 1: 17:44:19 executing program 0: 17:44:19 executing program 3: tkill(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) 17:44:19 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)={[{@nr_inodes={'nr_inodes', 0x3d, [0x3]}}]}) 17:44:19 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000003140)={0x3, @pix_mp}) 17:44:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @local, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:44:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x3}}, 0x2e) dup2(r2, r3) socket$inet_sctp(0x2, 0x0, 0x84) [ 336.357372][T10328] tmpfs: Bad value for 'nr_inodes' 17:44:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) dup2(r2, r3) [ 336.486861][T10328] tmpfs: Bad value for 'nr_inodes' 17:44:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="34e7ff000000350000007f12b579fbec9961f0bf6401caa02b8c15eeb8e20093750ecbd956df78a949b7d0e2cd5c389c1f42d3a9bdd962f67087f744de2c074877826f45a535626e05b645ca18b67561e2fcda4806d40ce1fb6cc6fe46b80000f2682d1ae8ba91597b94d13733b381a9b6600d019f0bc48589227096f0f1e5c046812081b646b82ec728705be751423250b8b837a8c0b5c77297cd01471840150735eb5f1fa6ad8a96e86276fcaf4d9a013424200d2d11af25098583fa490d5e00000000010000008b92fece177ea5fc939666fc3bcd753641bf5dd7eca702026774e5b3431f354304000000e87152de010002000000000088d25d5bc60c5c07945e591ac86758f6856d94177cb686946c209934ad2b157a100df8cfffff4753c735eb6f215353783141df1eb49aabf1aaec3b65515003d7d360e279bd45ed25bbeaefc6befd00000000004a61f21d6c64263240000000f4e50000d6b156bff4d7e1f9179ebf4018f5d7f9cd7b6a8100ff3a81e3746b242894de7b3279013432115237505fb2c012b7260342638e47c7774a0fc317e75d67f410c29d06dcfcb1aa3692e0d5995800d6696c739ad2c3d55a7c4ac2f9ba900b855d96b9dc51724edb61b99ee619410acf21c46e5eed3db1ca654f58e67bdb00be3ec4278180246fb233bbc55c23dae83c5cd8f150ab60b68708fe98a0cd2882a46831f55ca720da524f54e56f088ddb3b33eb6aa6d9aaf86356c1ce75481a6c51c81206f47e2571caa40ab28998931f142cb6f69de115007a9929cc281755d2694462142cb9124fc306593167d3a25d5bb4a31d764b7928e852e4d97b647ce70ce0dfc66e01c8d98d9fa587a6a6e90104497d583e1a8cd54e01eca17be329dbc085959e5c76315e2bad4a2092005f2ae22d2f584fc97f23b80a167f6753aa59de97cbd74f9a6f2835cf515566ecf7618fb80037e6472aee7c8c92fdc3abf41c607c43b766e95ab76c0793ab2f7d5a002bd892c52caae31487af8c3c0fbc85779d58cfbbccfc0bd9b9ae221e261893778782201b9a09f991aeb6e2ea"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)) 17:44:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}]}, 0x5c}}, 0x0) 17:44:20 executing program 2: r0 = socket(0x1, 0x5, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) 17:44:20 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x3}}, 0x2e) 17:44:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x3}}, 0x2e) dup2(r2, r3) socket$inet_sctp(0x2, 0x0, 0x84) 17:44:20 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) dup2(r2, r3) [ 336.862578][T10356] block nbd0: shutting down sockets [ 336.975942][T10356] block nbd0: shutting down sockets 17:44:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000080)={0x0, 0x5, 0x2}) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x200, 0x0) 17:44:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 17:44:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3742, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) poll(&(0x7f0000004380)=[{r0, 0x2014}, {r1, 0x224}], 0x2, 0x0) 17:44:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x3}}, 0x2e) dup2(r2, r3) 17:44:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket(0x0, 0x3, 0x2) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3742, 0x0) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000040)={0xfffff801, 0x0, "cf8fb72e90e5f9401d7d9269c764e8b68da5b0ede8949d4f99c40b4e412c90f9"}) 17:44:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x3}}, 0x2e) dup2(r2, r3) 17:44:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)) 17:44:21 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x882, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f0000000380), 0x1006) r1 = socket$alg(0x26, 0x5, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 17:44:21 executing program 3: open(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000200)="ee", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0, 0x0) 17:44:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x3}}, 0x2e) dup2(r2, r3) 17:44:21 executing program 4: 17:44:21 executing program 0: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) io_setup(0x7ff, &(0x7f0000000000)=0x0) r2 = socket(0x1, 0x5, 0x0) dup3(r2, r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040)='b', 0x1}]) 17:44:21 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], &(0x7f0000000100)='u*\x04\xd0Hsy\xcc\x00', 0x9, 0x3) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 337.905260][ T28] audit: type=1804 audit(1582047861.394:31): pid=10425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir821520576/syzkaller.7OOVUZ/29/bus" dev="sda1" ino=16603 res=1 17:44:21 executing program 2: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x36a) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000040), 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) 17:44:21 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003000000c763bf0c0079be7a2ce3c134108fe74950f9b13a5ea0cee7257825501bb77bf723be80699ab51e67f4fee76bb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b953a500000000000086314219123c233beca448dd9f82c124c794f7091e2b1023e629b0ad0ff74ed7d8102e0cbe3166973841c157945f577ea3aeba088227b92e995e037bde20c8ceb6039d7a01ae3efc82e30d345cbc9a14e11dd91ce716d1d19e059363ca36ea2e099cd3740210f66f32e73b897cca2b1550053d9e9edebbfcaa5e49b6d53b8a4cc76efbeb16e3e4fd678792d290e73cb5ac598c861910db40cc7acbe3ef56f8e7b0bbfd7cdff112f906d369c82e03adc1b159b8f5b6670f2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ef3c64b249ddeff68200000007926172a71b7352cded84d4a4a5ed360834d5c802613a8984fdc57d958246ea0e632cf33194cae5fdc614766b334c5d18fa05bf41d6001550f00b285dd001aa6c334380000000000003cef53baf50f21397786474a5cbf031f5082a2f80eef99cc22873091415b93a182659554f6bfae312e1be51285e0bbefb5563b3d00c723b4812692f69e8faec289ae7b271e2e4b15b0f6ab9b1904b67862e13801c770206378e468511a84421b8ea4d797a0d22f6043c013ef87d1a8a8c5ec0000008100000000f6d56531c9afa8a87891761d5db8f71c2f70c049324a4024a0bd90410ea72ced1e631b6d222914499586226969692ecf637fda420d9ca76e670db7157eb39645334db2c23285f17e331210d4d72d0f4c0388216ea877878eef19b9c4279682da12ccf9c71ba39b7a98f7c75929e892b126c6fcc40176459cfb86f7ec8f8a69e65d38ab13360e800af529dc2a0ff44d92bac515bb4a38b5afb9fb9c1989acc2d1c3367240f50fc50b460b6c24b42934a97e40ba129fb8b8c42237e2a948a07176e819e8d70ec368dc902b634524e2000000bf0f5645f1348fab967a2893fafa7d39aeb3cca9623bafb4b48bcdb8bc6c5a5d2bcd6303623194e0ac2e3b825d7fea9d12d77e3023d03fa4d78cb8b2dae12aebaf54f4b9c5f43c3fea13a66131ac7c500fc430c6b3efbbbb9731f2a08215648e29f83198df103296e93abfcaf752a9f532036135e5cff562c1f061ebee1d0fa70d541a74d0d721c58b0e1e27d0ed03d3c902480c978b27bbbb386d76108ac4da3d31ef529f5fea6304f2aa7d315740984d596fcfee951843416b69f3d1e90ae6cae942a60cc3d5e97da9a2693485c6b2f79658fde133e7f45e53c347980f6ed762a963829a2988312d545eba2386034b63dd0db38ed9c2b3304a279e28fe556e44b92d64087778d75ffae7f0d664b29aafa57dc26efcba6d6d2726da8b8d85c7548cc3d412e18996ef61949bab80baf550769c6533e1db138e2e48414abe54838a66ae2877d832e6d8c85205fb65b841585c220bea87c4391b3514f12c043aea4cd9206552b839c8082978eb94fc0000000000"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') [ 338.056088][ T28] audit: type=1804 audit(1582047861.554:32): pid=10440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir821520576/syzkaller.7OOVUZ/29/bus" dev="sda1" ino=16603 res=1 17:44:21 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x882, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f0000000380), 0x1006) r1 = socket$alg(0x26, 0x5, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup2(r1, r0) [ 338.209771][T10451] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.0 proc:/self/fd/4' not defined. 17:44:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x240007ed, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 17:44:21 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') [ 338.360442][ T28] audit: type=1804 audit(1582047861.854:33): pid=10457 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir821520576/syzkaller.7OOVUZ/30/bus" dev="sda1" ino=16613 res=1 17:44:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)) 17:44:22 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], &(0x7f0000000100)='u*\x04\xd0Hsy\xcc\x00', 0x9, 0x3) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 17:44:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f0000006f40)=[{{&(0x7f00000000c0)=@hci, 0x80, 0x0}}, {{&(0x7f0000001340)=@hci, 0x80, 0x0}}], 0x568, 0x0) 17:44:22 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x882, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f0000000380), 0x1006) r1 = socket$alg(0x26, 0x5, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 17:44:22 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') 17:44:22 executing program 3: open(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000200)="ee", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0, 0x0) 17:44:22 executing program 2: open(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000200)="ee", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0, 0x0) [ 338.979584][ T28] audit: type=1804 audit(1582047862.474:34): pid=10491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir821520576/syzkaller.7OOVUZ/31/bus" dev="sda1" ino=16620 res=1 17:44:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) sendto$inet(r0, 0x0, 0x0, 0x240007ed, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 17:44:22 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') 17:44:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x3}}, 0x2e) dup2(r2, r3) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:44:22 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x882, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f0000000380), 0x1006) r1 = socket$alg(0x26, 0x5, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 17:44:22 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') [ 339.484572][ T28] audit: type=1804 audit(1582047862.974:35): pid=10526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir821520576/syzkaller.7OOVUZ/32/bus" dev="sda1" ino=16614 res=1 17:44:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)) 17:44:23 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x3, 0x1}}, 0x2e) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'wg0\x00'}) 17:44:23 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) r1 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3742, 0x0) poll(&(0x7f0000004380)=[{0xffffffffffffffff, 0x2014}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x9018}, {0xffffffffffffffff, 0x8088}, {r1, 0x224}, {0xffffffffffffffff, 0x4105}, {}], 0x7, 0xed6) 17:44:23 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003000000c763bf0c0079be7a2ce3c134108fe74950f9b13a5ea0cee7257825501bb77bf723be80699ab51e67f4fee76bb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b953a500000000000086314219123c233beca448dd9f82c124c794f7091e2b1023e629b0ad0ff74ed7d8102e0cbe3166973841c157945f577ea3aeba088227b92e995e037bde20c8ceb6039d7a01ae3efc82e30d345cbc9a14e11dd91ce716d1d19e059363ca36ea2e099cd3740210f66f32e73b897cca2b1550053d9e9edebbfcaa5e49b6d53b8a4cc76efbeb16e3e4fd678792d290e73cb5ac598c861910db40cc7acbe3ef56f8e7b0bbfd7cdff112f906d369c82e03adc1b159b8f5b6670f2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ef3c64b249ddeff68200000007926172a71b7352cded84d4a4a5ed360834d5c802613a8984fdc57d958246ea0e632cf33194cae5fdc614766b334c5d18fa05bf41d6001550f00b285dd001aa6c334380000000000003cef53baf50f21397786474a5cbf031f5082a2f80eef99cc22873091415b93a182659554f6bfae312e1be51285e0bbefb5563b3d00c723b4812692f69e8faec289ae7b271e2e4b15b0f6ab9b1904b67862e13801c770206378e468511a84421b8ea4d797a0d22f6043c013ef87d1a8a8c5ec0000008100000000f6d56531c9afa8a87891761d5db8f71c2f70c049324a4024a0bd90410ea72ced1e631b6d222914499586226969692ecf637fda420d9ca76e670db7157eb39645334db2c23285f17e331210d4d72d0f4c0388216ea877878eef19b9c4279682da12ccf9c71ba39b7a98f7c75929e892b126c6fcc40176459cfb86f7ec8f8a69e65d38ab13360e800af529dc2a0ff44d92bac515bb4a38b5afb9fb9c1989acc2d1c3367240f50fc50b460b6c24b42934a97e40ba129fb8b8c42237e2a948a07176e819e8d70ec368dc902b634524e2000000bf0f5645f1348fab967a2893fafa7d39aeb3cca9623bafb4b48bcdb8bc6c5a5d2bcd6303623194e0ac2e3b825d7fea9d12d77e3023d03fa4d78cb8b2dae12aebaf54f4b9c5f43c3fea13a66131ac7c500fc430c6b3efbbbb9731f2a08215648e29f83198df103296e93abfcaf752a9f532036135e5cff562c1f061ebee1d0fa70d541a74d0d721c58b0e1e27d0ed03d3c902480c978b27bbbb386d76108ac4da3d31ef529f5fea6304f2aa7d315740984d596fcfee951843416b69f3d1e90ae6cae942a60cc3d5e97da9a2693485c6b2f79658fde133e7f45e53c347980f6ed762a963829a2988312d545eba2386034b63dd0db38ed9c2b3304a279e28fe556e44b92d64087778d75ffae7f0d664b29aafa57dc26efcba6d6d2726da8b8d85c7548cc3d412e18996ef61949bab80baf550769c6533e1db138e2e48414abe54838a66ae2877d832e6d8c85205fb65b841585c220bea87c4391b3514f12c043aea4cd9206552b839c8082978eb94fc0000000000"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') 17:44:23 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x882, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f0000000380), 0x1006) r1 = socket$alg(0x26, 0x5, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) dup2(r1, r0) 17:44:23 executing program 3: open(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000200)="ee", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0, 0x0) 17:44:23 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') 17:44:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\vey\xc0\xc1\xf8\xa6\x8dN\xfft\x86N\xdf\xe3\v\xc4\xff\xc0\xa3u\t8V\xc4R\x96<\xc64\aB3\v\x16w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)) 17:44:23 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x882, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f0000000380), 0x1006) r1 = socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) dup2(r1, r0) 17:44:23 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x1, 0xfffffffffffffff8}) 17:44:23 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003000000c763bf0c0079be7a2ce3c134108fe74950f9b13a5ea0cee7257825501bb77bf723be80699ab51e67f4fee76bb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b953a500000000000086314219123c233beca448dd9f82c124c794f7091e2b1023e629b0ad0ff74ed7d8102e0cbe3166973841c157945f577ea3aeba088227b92e995e037bde20c8ceb6039d7a01ae3efc82e30d345cbc9a14e11dd91ce716d1d19e059363ca36ea2e099cd3740210f66f32e73b897cca2b1550053d9e9edebbfcaa5e49b6d53b8a4cc76efbeb16e3e4fd678792d290e73cb5ac598c861910db40cc7acbe3ef56f8e7b0bbfd7cdff112f906d369c82e03adc1b159b8f5b6670f2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ef3c64b249ddeff68200000007926172a71b7352cded84d4a4a5ed360834d5c802613a8984fdc57d958246ea0e632cf33194cae5fdc614766b334c5d18fa05bf41d6001550f00b285dd001aa6c334380000000000003cef53baf50f21397786474a5cbf031f5082a2f80eef99cc22873091415b93a182659554f6bfae312e1be51285e0bbefb5563b3d00c723b4812692f69e8faec289ae7b271e2e4b15b0f6ab9b1904b67862e13801c770206378e468511a84421b8ea4d797a0d22f6043c013ef87d1a8a8c5ec0000008100000000f6d56531c9afa8a87891761d5db8f71c2f70c049324a4024a0bd90410ea72ced1e631b6d222914499586226969692ecf637fda420d9ca76e670db7157eb39645334db2c23285f17e331210d4d72d0f4c0388216ea877878eef19b9c4279682da12ccf9c71ba39b7a98f7c75929e892b126c6fcc40176459cfb86f7ec8f8a69e65d38ab13360e800af529dc2a0ff44d92bac515bb4a38b5afb9fb9c1989acc2d1c3367240f50fc50b460b6c24b42934a97e40ba129fb8b8c42237e2a948a07176e819e8d70ec368dc902b634524e2000000bf0f5645f1348fab967a2893fafa7d39aeb3cca9623bafb4b48bcdb8bc6c5a5d2bcd6303623194e0ac2e3b825d7fea9d12d77e3023d03fa4d78cb8b2dae12aebaf54f4b9c5f43c3fea13a66131ac7c500fc430c6b3efbbbb9731f2a08215648e29f83198df103296e93abfcaf752a9f532036135e5cff562c1f061ebee1d0fa70d541a74d0d721c58b0e1e27d0ed03d3c902480c978b27bbbb386d76108ac4da3d31ef529f5fea6304f2aa7d315740984d596fcfee951843416b69f3d1e90ae6cae942a60cc3d5e97da9a2693485c6b2f79658fde133e7f45e53c347980f6ed762a963829a2988312d545eba2386034b63dd0db38ed9c2b3304a279e28fe556e44b92d64087778d75ffae7f0d664b29aafa57dc26efcba6d6d2726da8b8d85c7548cc3d412e18996ef61949bab80baf550769c6533e1db138e2e48414abe54838a66ae2877d832e6d8c85205fb65b841585c220bea87c4391b3514f12c043aea4cd9206552b839c8082978eb94fc0000000000"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') 17:44:23 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x882, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f0000000380), 0x1006) r1 = socket$alg(0x26, 0x5, 0x0) dup2(r1, r0) [ 340.638698][ T9818] divide error: 0000 [#1] PREEMPT SMP KASAN [ 340.644630][ T9818] CPU: 1 PID: 9818 Comm: kworker/1:2 Not tainted 5.6.0-rc2-syzkaller #0 [ 340.652955][ T9818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.663133][ T9818] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 340.669658][ T9818] RIP: 0010:encrypt_packet+0xf8/0x920 [ 340.675035][ T9818] Code: 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 49 06 00 00 8b 4b 3c 44 89 f0 31 d2 48 89 df f1 44 8d 62 0f 41 83 e4 f0 44 39 e1 44 0f 46 e1 41 29 d4 45 8d [ 340.694749][ T9818] RSP: 0018:ffffc900063af7a8 EFLAGS: 00010246 [ 340.700818][ T9818] RAX: 0000000000000000 RBX: ffff8880a22ec440 RCX: 0000000000000000 [ 340.708887][ T9818] RDX: 0000000000000000 RSI: ffffffff84ba472f RDI: ffff8880a22ec440 [ 340.716863][ T9818] RBP: ffffc900063afc08 R08: 1ffffffff16a338d R09: fffffbfff16a338e [ 340.724834][ T9818] R10: fffffbfff16a338d R11: ffffffff8b519c6f R12: dffffc0000000000 [ 340.732812][ T9818] R13: ffffc900063afbe0 R14: 0000000000000000 R15: dffffc0000000000 [ 340.740790][ T9818] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 340.749807][ T9818] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 340.756399][ T9818] CR2: 0000000000719158 CR3: 000000005ce67000 CR4: 00000000001406e0 [ 340.764379][ T9818] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 340.772356][ T9818] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 340.780460][ T9818] Call Trace: [ 340.784890][ T9818] ? wg_packet_send_handshake_initiation+0x250/0x250 [ 340.791648][ T9818] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.797276][ T9818] ? __kasan_check_read+0x11/0x20 [ 340.802330][ T9818] ? mark_lock+0xc2/0x1220 [ 340.806754][ T9818] ? __kasan_check_read+0x11/0x20 [ 340.811787][ T9818] ? mark_lock+0xc2/0x1220 [ 340.816217][ T9818] ? __kasan_check_read+0x11/0x20 [ 340.821245][ T9818] ? mark_lock+0xc2/0x1220 [ 340.825669][ T9818] ? __kasan_check_read+0x11/0x20 [ 340.830719][ T9818] ? __kasan_check_read+0x11/0x20 [ 340.835785][ T9818] ? mark_lock+0xc2/0x1220 [ 340.840226][ T9818] ? __kasan_check_read+0x11/0x20 [ 340.845065][T10581] ISOFS: Unable to identify CD-ROM format. [ 340.845261][ T9818] ? __lock_acquire+0x16f2/0x4a00 [ 340.856107][ T9818] ? __kasan_check_read+0x11/0x20 [ 340.861139][ T9818] ? mark_lock+0xc2/0x1220 [ 340.865560][ T9818] ? find_held_lock+0x35/0x130 [ 340.870335][ T9818] ? __kasan_check_read+0x11/0x20 [ 340.875364][ T9818] ? __lock_acquire+0x16f2/0x4a00 [ 340.880499][ T9818] ? __schedule+0x88e/0x1f90 [ 340.885105][ T9818] ? lock_downgrade+0x920/0x920 [ 340.890082][ T9818] ? __kasan_check_read+0x11/0x20 [ 340.895215][ T9818] ? mark_lock+0xc2/0x1220 [ 340.899634][ T9818] ? find_held_lock+0x35/0x130 [ 340.904409][ T9818] ? mark_held_locks+0xa4/0xf0 [ 340.909325][ T9818] ? __local_bh_enable_ip+0x15a/0x270 [ 340.914704][ T9818] ? _raw_spin_unlock_bh+0x2c/0x30 [ 340.919824][ T9818] ? __local_bh_enable_ip+0x15a/0x270 [ 340.925236][ T9818] ? lockdep_hardirqs_on+0x421/0x5e0 [ 340.930560][ T9818] ? wg_packet_encrypt_worker+0x2c6/0xe00 [ 340.936358][ T9818] ? trace_hardirqs_on+0x67/0x240 [ 340.941397][ T9818] ? wg_packet_encrypt_worker+0x2c6/0xe00 [ 340.947125][ T9818] ? __local_bh_enable_ip+0x15a/0x270 [ 340.952510][ T9818] wg_packet_encrypt_worker+0x33f/0xe00 [ 340.958080][ T9818] ? wg_packet_tx_worker+0xc00/0xc00 [ 340.963443][ T9818] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 340.969001][ T9818] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 340.975064][ T9818] process_one_work+0xa05/0x17a0 [ 340.980014][ T9818] ? mark_held_locks+0xf0/0xf0 [ 340.984862][ T9818] ? pwq_dec_nr_in_flight+0x320/0x320 17:44:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)) 17:44:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@sbsector={'sbsector'}}]}) 17:44:24 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x882, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f0000000380), 0x1006) r1 = socket$alg(0x26, 0x5, 0x0) dup2(r1, r0) 17:44:24 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') 17:44:24 executing program 3: open(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000200)="ee", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0, 0x0) 17:44:24 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x882, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f0000000380), 0x1006) r1 = socket$alg(0x26, 0x5, 0x0) dup2(r1, r0) 17:44:24 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\t\x00ste`\xad\x96\x9aum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') fchdir(r3) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='autogroup\x00') [ 340.990240][ T9818] ? lock_acquire+0x190/0x410 [ 340.994935][ T9818] worker_thread+0x98/0xe40 [ 340.999444][ T9818] ? trace_hardirqs_on+0x67/0x240 [ 341.004586][ T9818] kthread+0x361/0x430 [ 341.008675][ T9818] ? process_one_work+0x17a0/0x17a0 [ 341.013874][ T9818] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 341.019619][ T9818] ret_from_fork+0x24/0x30 [ 341.024043][ T9818] Modules linked in: [ 341.042109][ T9818] ---[ end trace a81c93b6ae700916 ]--- [ 341.047853][ T9818] RIP: 0010:encrypt_packet+0xf8/0x920 [ 341.053336][ T9818] Code: 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 49 06 00 00 8b 4b 3c 44 89 f0 31 d2 48 89 df f1 44 8d 62 0f 41 83 e4 f0 44 39 e1 44 0f 46 e1 41 29 d4 45 8d [ 341.074926][ T9818] RSP: 0018:ffffc900063af7a8 EFLAGS: 00010246 [ 341.081049][ T9818] RAX: 0000000000000000 RBX: ffff8880a22ec440 RCX: 0000000000000000 [ 341.089280][ T9818] RDX: 0000000000000000 RSI: ffffffff84ba472f RDI: ffff8880a22ec440 [ 341.097873][ T9818] RBP: ffffc900063afc08 R08: 1ffffffff16a338d R09: fffffbfff16a338e [ 341.108713][ T9818] R10: fffffbfff16a338d R11: ffffffff8b519c6f R12: dffffc0000000000 [ 341.118934][ T9818] R13: ffffc900063afbe0 R14: 0000000000000000 R15: dffffc0000000000 [ 341.129197][ T9818] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 341.139936][ T9818] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 341.148751][ T9818] CR2: 0000000020000540 CR3: 000000009f540000 CR4: 00000000001406e0 [ 341.157696][ T9818] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 341.167739][ T9818] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 341.176192][ T9818] Kernel panic - not syncing: Fatal exception [ 341.183713][ T9818] Kernel Offset: disabled [ 341.188051][ T9818] Rebooting in 86400 seconds..