[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.14' (ECDSA) to the list of known hosts. 2021/03/25 18:47:10 fuzzer started 2021/03/25 18:47:11 dialing manager at 10.128.0.169:33115 2021/03/25 18:47:11 syscalls: 123 2021/03/25 18:47:11 code coverage: enabled 2021/03/25 18:47:11 comparison tracing: enabled 2021/03/25 18:47:11 extra coverage: enabled 2021/03/25 18:47:11 setuid sandbox: enabled 2021/03/25 18:47:11 namespace sandbox: enabled 2021/03/25 18:47:11 Android sandbox: /sys/fs/selinux/policy does not exist 2021/03/25 18:47:11 fault injection: enabled 2021/03/25 18:47:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/25 18:47:11 net packet injection: enabled 2021/03/25 18:47:11 net device setup: enabled 2021/03/25 18:47:11 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/03/25 18:47:11 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/25 18:47:11 USB emulation: enabled 2021/03/25 18:47:11 hci packet injection: enabled 2021/03/25 18:47:11 wifi device emulation: enabled 2021/03/25 18:47:11 802.15.4 emulation: enabled 2021/03/25 18:47:11 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/25 18:47:11 fetching corpus: 50, signal 43296/46313 (executing program) 2021/03/25 18:47:11 fetching corpus: 100, signal 61150/64996 (executing program) 2021/03/25 18:47:11 fetching corpus: 150, signal 75457/79959 (executing program) 2021/03/25 18:47:11 fetching corpus: 200, signal 84148/89268 (executing program) 2021/03/25 18:47:12 fetching corpus: 250, signal 88812/94601 (executing program) 2021/03/25 18:47:12 fetching corpus: 299, signal 96575/102699 (executing program) 2021/03/25 18:47:12 fetching corpus: 349, signal 101679/108232 (executing program) 2021/03/25 18:47:12 fetching corpus: 399, signal 105255/112317 (executing program) 2021/03/25 18:47:12 fetching corpus: 449, signal 108747/116209 (executing program) syzkaller login: [ 71.391794][ T3236] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.398853][ T3236] ieee802154 phy1 wpan1: encryption failed: -22 2021/03/25 18:47:12 fetching corpus: 498, signal 113289/120937 (executing program) 2021/03/25 18:47:13 fetching corpus: 547, signal 116843/124671 (executing program) 2021/03/25 18:47:13 fetching corpus: 597, signal 120813/128708 (executing program) 2021/03/25 18:47:13 fetching corpus: 647, signal 124837/132660 (executing program) 2021/03/25 18:47:13 fetching corpus: 697, signal 127613/135460 (executing program) 2021/03/25 18:47:13 fetching corpus: 747, signal 130131/138040 (executing program) 2021/03/25 18:47:13 fetching corpus: 797, signal 131912/139930 (executing program) 2021/03/25 18:47:13 fetching corpus: 847, signal 133671/141772 (executing program) 2021/03/25 18:47:14 fetching corpus: 896, signal 135755/143882 (executing program) 2021/03/25 18:47:14 fetching corpus: 946, signal 137522/145671 (executing program) 2021/03/25 18:47:14 fetching corpus: 996, signal 139817/147818 (executing program) 2021/03/25 18:47:14 fetching corpus: 1046, signal 142232/149993 (executing program) 2021/03/25 18:47:14 fetching corpus: 1095, signal 143959/151675 (executing program) 2021/03/25 18:47:15 fetching corpus: 1145, signal 145399/153038 (executing program) 2021/03/25 18:47:15 fetching corpus: 1195, signal 146980/154452 (executing program) 2021/03/25 18:47:15 fetching corpus: 1244, signal 148267/155649 (executing program) 2021/03/25 18:47:15 fetching corpus: 1294, signal 149696/156887 (executing program) 2021/03/25 18:47:15 fetching corpus: 1344, signal 151269/158203 (executing program) 2021/03/25 18:47:15 fetching corpus: 1394, signal 152515/159249 (executing program) 2021/03/25 18:47:15 fetching corpus: 1444, signal 153770/160275 (executing program) 2021/03/25 18:47:15 fetching corpus: 1494, signal 155359/161506 (executing program) 2021/03/25 18:47:16 fetching corpus: 1544, signal 157197/162867 (executing program) 2021/03/25 18:47:16 fetching corpus: 1593, signal 158538/163858 (executing program) 2021/03/25 18:47:16 fetching corpus: 1641, signal 160111/164965 (executing program) 2021/03/25 18:47:16 fetching corpus: 1689, signal 161185/165782 (executing program) 2021/03/25 18:47:16 fetching corpus: 1739, signal 162505/166701 (executing program) 2021/03/25 18:47:16 fetching corpus: 1789, signal 163832/167577 (executing program) 2021/03/25 18:47:17 fetching corpus: 1838, signal 165431/168528 (executing program) 2021/03/25 18:47:17 fetching corpus: 1888, signal 166429/169167 (executing program) 2021/03/25 18:47:17 fetching corpus: 1937, signal 167782/170017 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168303/170324 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168303/170372 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168303/170431 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168303/170477 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168303/170516 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170555 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170608 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170657 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170708 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170761 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170804 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170865 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170907 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170953 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/170997 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171060 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171095 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171153 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171193 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171247 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171310 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171357 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171398 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171441 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171489 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171533 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171580 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171631 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171662 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171708 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171752 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171802 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171839 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171893 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/171941 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/172001 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/172053 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/172111 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/172152 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/172202 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/172276 (executing program) 2021/03/25 18:47:17 fetching corpus: 1967, signal 168320/172332 (executing program) 2021/03/25 18:47:17 fetching corpus: 1968, signal 168323/172417 (executing program) 2021/03/25 18:47:17 fetching corpus: 1968, signal 168323/172482 (executing program) 2021/03/25 18:47:17 fetching corpus: 1968, signal 168323/172519 (executing program) 2021/03/25 18:47:17 fetching corpus: 1968, signal 168323/172519 (executing program) 2021/03/25 18:47:18 starting 6 fuzzer processes 18:47:18 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 18:47:19 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x151}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x300) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, r2, 0x0, 0xa, &(0x7f0000000200)='-{^%)-@#+\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xf7, 0x7, 0x40, 0x8, 0x0, 0xd0, 0x2000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x5, 0x6}, 0x4, 0x80000000, 0x0, 0x0, 0x0, 0x5, 0x7}, r1, 0x4, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000080, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 18:47:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x100, 0x7, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0xcb, 0xff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x41d895d346bc2a8e, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x4, 0x7, 0x9, 0x0, 0x2}, 0x0, 0x0, r1, 0x1) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000ac0), 0xe) sendmsg$inet(r0, &(0x7f0000002f00)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000500)=[{&(0x7f0000002d00)="13", 0x1}], 0x15}, 0x0) 18:47:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x400c6615, 0x0) 18:47:19 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) 18:47:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe088ca1f74ffff10000000632177fbac14140ce0", 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 78.935537][ T8415] IPVS: ftp: loaded support on port[0] = 21 [ 79.173398][ T8417] IPVS: ftp: loaded support on port[0] = 21 [ 79.236400][ T8415] chnl_net:caif_netlink_parms(): no params data found [ 79.387129][ T8415] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.398353][ T8415] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.408406][ T8415] device bridge_slave_0 entered promiscuous mode [ 79.452596][ T8419] IPVS: ftp: loaded support on port[0] = 21 [ 79.456900][ T8415] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.466833][ T8415] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.475395][ T8415] device bridge_slave_1 entered promiscuous mode [ 79.494640][ T8417] chnl_net:caif_netlink_parms(): no params data found [ 79.532148][ T8415] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.557551][ T8415] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.647546][ T8421] IPVS: ftp: loaded support on port[0] = 21 [ 79.684350][ T8415] team0: Port device team_slave_0 added [ 79.727519][ T8415] team0: Port device team_slave_1 added [ 79.765681][ T8415] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 79.776805][ T8415] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 79.807723][ T8415] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 79.826976][ T8417] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.836111][ T8417] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.852802][ T8417] device bridge_slave_0 entered promiscuous mode [ 79.873796][ T8415] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 79.882906][ T8415] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 79.913579][ T8415] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 79.949032][ T8417] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.957935][ T8417] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.967328][ T8417] device bridge_slave_1 entered promiscuous mode [ 79.996547][ T8423] IPVS: ftp: loaded support on port[0] = 21 [ 80.067364][ T8415] device hsr_slave_0 entered promiscuous mode [ 80.076043][ T8415] device hsr_slave_1 entered promiscuous mode [ 80.128438][ T8417] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.178855][ T8419] chnl_net:caif_netlink_parms(): no params data found [ 80.193915][ T8417] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.240986][ T8437] IPVS: ftp: loaded support on port[0] = 21 [ 80.344682][ T8417] team0: Port device team_slave_0 added [ 80.397092][ T8417] team0: Port device team_slave_1 added [ 80.439977][ T8421] chnl_net:caif_netlink_parms(): no params data found [ 80.473646][ T8417] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 80.480794][ T8417] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 80.508954][ T8417] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 80.532753][ T8417] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 80.543995][ T8417] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 80.571730][ T8417] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 80.738730][ T8419] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.762625][ T8419] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.775297][ T8419] device bridge_slave_0 entered promiscuous mode [ 80.785869][ T8419] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.794024][ T8419] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.802698][ T8419] device bridge_slave_1 entered promiscuous mode [ 80.822219][ T8417] device hsr_slave_0 entered promiscuous mode [ 80.834163][ T8417] device hsr_slave_1 entered promiscuous mode [ 80.840780][ T8417] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 80.848568][ T8417] Cannot create hsr debugfs directory [ 80.855602][ T8423] chnl_net:caif_netlink_parms(): no params data found [ 80.920338][ T4803] Bluetooth: hci0: command 0x0409 tx timeout [ 80.934439][ T8419] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.963879][ T8421] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.972810][ T8421] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.981527][ T8421] device bridge_slave_0 entered promiscuous mode [ 80.994621][ T8421] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.001770][ T8421] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.010930][ T8421] device bridge_slave_1 entered promiscuous mode [ 81.034849][ T8419] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.064528][ T8419] team0: Port device team_slave_0 added [ 81.092264][ T8419] team0: Port device team_slave_1 added [ 81.158494][ T8415] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.159169][ T5] Bluetooth: hci1: command 0x0409 tx timeout [ 81.207449][ T8421] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.233558][ T8415] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.247193][ T8419] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.259698][ T8419] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.286487][ T8419] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.299888][ T8421] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.311903][ T8419] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 81.318861][ T8419] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.346049][ T8419] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 81.362694][ T8415] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.374194][ T8437] chnl_net:caif_netlink_parms(): no params data found [ 81.389270][ T251] Bluetooth: hci2: command 0x0409 tx timeout [ 81.432639][ T8415] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.475053][ T8419] device hsr_slave_0 entered promiscuous mode [ 81.483338][ T8419] device hsr_slave_1 entered promiscuous mode [ 81.491174][ T8419] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 81.498767][ T8419] Cannot create hsr debugfs directory [ 81.513325][ T8423] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.534657][ T8423] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.545244][ T8423] device bridge_slave_0 entered promiscuous mode [ 81.555262][ T8423] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.563146][ T8423] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.571576][ T8423] device bridge_slave_1 entered promiscuous mode [ 81.580851][ T8421] team0: Port device team_slave_0 added [ 81.612591][ T8421] team0: Port device team_slave_1 added [ 81.629781][ T36] Bluetooth: hci3: command 0x0409 tx timeout [ 81.676189][ T8423] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.710572][ T8421] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.717553][ T8421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.745099][ T8421] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.761878][ T8423] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.788903][ T8421] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 81.800133][ T8421] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.827677][ T8421] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 81.863211][ T8437] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.869839][ T36] Bluetooth: hci4: command 0x0409 tx timeout [ 81.870765][ T8437] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.886086][ T8437] device bridge_slave_0 entered promiscuous mode [ 81.929575][ T8437] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.936931][ T8437] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.947388][ T8437] device bridge_slave_1 entered promiscuous mode [ 81.966408][ T8421] device hsr_slave_0 entered promiscuous mode [ 81.974604][ T8421] device hsr_slave_1 entered promiscuous mode [ 81.981652][ T8421] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 81.989933][ T8421] Cannot create hsr debugfs directory [ 82.001171][ T8423] team0: Port device team_slave_0 added [ 82.019914][ T8417] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.056642][ T8437] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.067886][ T8423] team0: Port device team_slave_1 added [ 82.075419][ T8417] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.093074][ T8417] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.113283][ T8437] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.122995][ T5] Bluetooth: hci5: command 0x0409 tx timeout [ 82.137708][ T8417] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.195043][ T8423] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.204268][ T8423] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.231911][ T8423] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.249215][ T8423] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.256192][ T8423] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.283038][ T8423] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.309926][ T8437] team0: Port device team_slave_0 added [ 82.319860][ T8437] team0: Port device team_slave_1 added [ 82.346500][ T8437] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.359738][ T8437] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.386852][ T8437] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.444345][ T8437] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.453981][ T8437] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.482822][ T8437] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.532775][ T8423] device hsr_slave_0 entered promiscuous mode [ 82.540126][ T8423] device hsr_slave_1 entered promiscuous mode [ 82.546757][ T8423] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 82.554458][ T8423] Cannot create hsr debugfs directory [ 82.567410][ T8437] device hsr_slave_0 entered promiscuous mode [ 82.578019][ T8437] device hsr_slave_1 entered promiscuous mode [ 82.585487][ T8437] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 82.594848][ T8437] Cannot create hsr debugfs directory [ 82.682576][ T8419] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 82.719846][ T8419] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 82.771621][ T8419] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 82.790331][ T8419] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 82.883289][ T8421] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 82.956884][ T8421] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 82.993393][ T8415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.000171][ T9560] Bluetooth: hci0: command 0x041b tx timeout [ 83.019682][ T8421] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 83.064574][ T8437] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 83.079896][ T8421] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 83.098084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.109918][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.135951][ T8417] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.144876][ T8437] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 83.163950][ T8437] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 83.176487][ T8415] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.210438][ T8437] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 83.230794][ T8417] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.249008][ T9718] Bluetooth: hci1: command 0x041b tx timeout [ 83.262412][ T8419] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.275399][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.283850][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.292955][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.301832][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.310800][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.318123][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.326977][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.336348][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.345046][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.352189][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.361984][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.391725][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.409456][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.417996][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.427878][ T9719] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.435021][ T9719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.442908][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.451876][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.460655][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.469214][ T9719] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.476284][ T9719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.484682][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.492620][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.500776][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.508701][ T9719] Bluetooth: hci2: command 0x041b tx timeout [ 83.521235][ T8423] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 83.545673][ T8419] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.570366][ T9720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.581364][ T9720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.590324][ T9720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.601057][ T8423] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 83.613390][ T8423] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 83.640350][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.648252][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.658114][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.671566][ T9719] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.678641][ T9719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.687976][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.696974][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.710427][ T36] Bluetooth: hci3: command 0x041b tx timeout [ 83.720008][ T8423] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 83.749684][ T9720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.757622][ T9720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.768686][ T9720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.778036][ T9720] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.785227][ T9720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.795732][ T9720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.804298][ T9720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.814129][ T9720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.855219][ T8415] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.866864][ T8415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.877371][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.887162][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.895959][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.904779][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.914508][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.923900][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.932959][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.942555][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.952384][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.962359][ T4820] Bluetooth: hci4: command 0x041b tx timeout [ 83.978393][ T8417] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.992017][ T8417] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.021697][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.031568][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.042216][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.052754][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.061806][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 84.071774][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 84.080845][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 84.091252][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 84.099941][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.108189][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.122291][ T8421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.141963][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.149957][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 84.189171][ T251] Bluetooth: hci5: command 0x041b tx timeout [ 84.191338][ T8419] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.208611][ T8419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.243342][ T8419] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.251486][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.261527][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.272060][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 84.280513][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 84.297683][ T8415] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.317208][ T8417] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.344484][ T8421] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.353369][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 84.362425][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 84.370757][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 84.378177][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 84.386228][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.394783][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.416625][ T8437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.457646][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.466877][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.475837][ T4820] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.482999][ T4820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.490824][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.499744][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.510100][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 84.556967][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.565745][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.575490][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.585898][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.595458][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.605089][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.614461][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.623975][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.633417][ T251] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.640576][ T251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.648540][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.657598][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.666282][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.700450][ T8437] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.711332][ T8415] device veth0_vlan entered promiscuous mode [ 84.730835][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.741614][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.750340][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 84.761203][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.770479][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.784106][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.792734][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.802402][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.811623][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.822417][ T9719] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.829756][ T9719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.839266][ T9385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 84.856843][ T8419] device veth0_vlan entered promiscuous mode [ 84.866026][ T8417] device veth0_vlan entered promiscuous mode [ 84.881269][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.893600][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.903639][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 84.916885][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 84.926620][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.940644][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.953111][ T251] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.960213][ T251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.981057][ T8419] device veth1_vlan entered promiscuous mode [ 84.992525][ T8415] device veth1_vlan entered promiscuous mode [ 85.032221][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 85.040473][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.048119][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.057191][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 85.066556][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.075362][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 85.084335][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.093300][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.102741][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.111977][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.120909][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.130430][ T20] Bluetooth: hci0: command 0x040f tx timeout [ 85.159246][ T8423] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.200410][ T8417] device veth1_vlan entered promiscuous mode [ 85.256919][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 85.280338][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 85.288455][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 85.305567][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.315048][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.323641][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.331786][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.340268][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 85.349862][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.358246][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 85.367938][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.377107][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 85.385993][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 85.402601][ T8423] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.410445][ T9604] Bluetooth: hci1: command 0x040f tx timeout [ 85.418621][ T8421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.447546][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 85.456776][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.465390][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.475438][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.491564][ T8415] device veth0_macvtap entered promiscuous mode [ 85.521495][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 85.530380][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.538729][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.547423][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.557127][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.566617][ T4820] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.573769][ T4820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.581948][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 85.591953][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 85.601160][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.610907][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.620012][ T4820] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.627077][ T4820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.636329][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.648686][ T8415] device veth1_macvtap entered promiscuous mode [ 85.656827][ T4820] Bluetooth: hci2: command 0x040f tx timeout [ 85.667143][ T8419] device veth0_macvtap entered promiscuous mode [ 85.685292][ T8437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.697664][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.707145][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 85.715959][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.726952][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 85.736416][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 85.748474][ T8419] device veth1_macvtap entered promiscuous mode [ 85.760249][ T8417] device veth0_macvtap entered promiscuous mode [ 85.782885][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 85.791367][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 85.799466][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 85.807019][ T4820] Bluetooth: hci3: command 0x040f tx timeout [ 85.813349][ T8421] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.825003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 85.839734][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.848305][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.869775][ T8415] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 85.888158][ T8419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 85.899908][ T8419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 85.916201][ T8419] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 85.925904][ T8417] device veth1_macvtap entered promiscuous mode [ 85.949673][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 85.967590][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 85.977472][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 85.991721][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.003238][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.014227][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 86.023220][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.032745][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 86.042308][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 86.054382][ T4820] Bluetooth: hci4: command 0x040f tx timeout [ 86.063182][ T8415] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 86.079838][ T8419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 86.091101][ T8419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 86.107219][ T8419] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 86.124828][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 86.132952][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 86.140590][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 86.149291][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 86.157502][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 86.166750][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 86.176247][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 86.185178][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 86.198503][ T8423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 86.212654][ T8437] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.238194][ T8417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 86.249942][ T8417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 86.263085][ T8417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 86.274279][ T4820] Bluetooth: hci5: command 0x040f tx timeout [ 86.274964][ T8417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 86.303157][ T8417] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 86.322370][ T8419] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.335000][ T8419] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.344233][ T8419] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.355906][ T8419] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.369997][ T8415] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.379621][ T8415] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.388345][ T8415] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.397889][ T8415] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.410922][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 86.424253][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 86.433697][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 86.442728][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 86.483976][ T8417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 86.494984][ T8417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 86.508033][ T8417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 86.520684][ T8417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 86.533516][ T8417] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 86.542530][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 86.551698][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.560705][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 86.570080][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 86.578689][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.587206][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 86.611590][ T8423] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.645303][ T8417] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.678543][ T8417] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.687924][ T8417] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.705126][ T8417] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.717532][ T8421] device veth0_vlan entered promiscuous mode [ 86.726162][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 86.734404][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 86.802012][ T8421] device veth1_vlan entered promiscuous mode [ 86.979594][ T9385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 86.988337][ T9385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 87.107333][ T8437] device veth0_vlan entered promiscuous mode [ 87.126231][ T9748] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.134852][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 87.144663][ T80] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.156988][ T80] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.168110][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 87.169468][ T9748] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.198276][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 87.208023][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.217468][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 87.226039][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 87.234780][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 87.244929][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 87.262266][ T8421] device veth0_macvtap entered promiscuous mode [ 87.274184][ T4820] Bluetooth: hci0: command 0x0419 tx timeout [ 87.284736][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 87.293568][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.310318][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.335410][ T8437] device veth1_vlan entered promiscuous mode [ 87.362620][ T8421] device veth1_macvtap entered promiscuous mode [ 87.385170][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 87.393445][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 87.403794][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 87.412461][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.426353][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.442223][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.454968][ T80] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.462115][ T8423] device veth0_vlan entered promiscuous mode [ 87.470276][ T9604] Bluetooth: hci1: command 0x0419 tx timeout [ 87.484887][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 87.499692][ T80] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.506924][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.517635][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 87.529114][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.539942][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 87.551894][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.564633][ T8421] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 87.600435][ T80] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.608162][ T8423] device veth1_vlan entered promiscuous mode [ 87.614655][ T80] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.628805][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 87.637076][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 87.646800][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 87.657476][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 87.665967][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 87.675715][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 87.685021][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 87.694337][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 87.706885][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 87.719169][ T36] Bluetooth: hci2: command 0x0419 tx timeout [ 87.749011][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.767471][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 87.786008][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.798460][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 87.810634][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.823826][ T8421] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 87.842764][ C1] hrtimer: interrupt took 43636 ns [ 87.850907][ T8437] device veth0_macvtap entered promiscuous mode [ 87.870210][ T36] Bluetooth: hci3: command 0x0419 tx timeout [ 87.879438][ T9718] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 87.904452][ T9718] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 87.919338][ T9718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 87.934493][ T8421] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.946177][ T8421] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.966343][ T8421] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.990679][ T8421] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.041026][ T8437] device veth1_macvtap entered promiscuous mode 18:47:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x100, 0x7, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0xcb, 0xff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x41d895d346bc2a8e, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x4, 0x7, 0x9, 0x0, 0x2}, 0x0, 0x0, r1, 0x1) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000ac0), 0xe) sendmsg$inet(r0, &(0x7f0000002f00)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000500)=[{&(0x7f0000002d00)="13", 0x1}], 0x15}, 0x0) [ 88.110233][ T9726] Bluetooth: hci4: command 0x0419 tx timeout [ 88.128985][ T190] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 88.137034][ T190] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 88.154931][ T9748] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 88.171429][ T8423] device veth0_macvtap entered promiscuous mode [ 88.199736][ T9748] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 88.230129][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 88.238031][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 88.319778][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 88.328393][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 88.341639][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 88.350488][ T251] Bluetooth: hci5: command 0x0419 tx timeout 18:47:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44825cc4f142133d4a1cac53819fda7ffe332b0d27517495db22c369fc01b191513df23e4a10cbd4dfb403d82acd600312817f2b17e678d15e020912aa8ef860dd81e221f886dc0154419e857178e246297048629c6326bfb9ff34fedbb2ca4d35f6b5f65e8894425d22dce799b0a5d65dee16bffed85ac530e49bbe2cc6e0743c03aa6c636e4b0d78e3d530d91e8213cc3f3aa07295e86df0557be41f4f982eb553b1b9e36d77174f29c57c0db60076f5ab323325dbfa90e0edab3ddb5ed8fa984bb0fcb52ad14988f58de2ec276e5d9d9464ede6deb474604da2941b7d924c96d8c04e5ff44ca849a436284bc99d4b03487b4c221a26c27228aea193cb831124187765d3c1b162bd4e64b2ca92c22afa1ecff1edecd4de1e8d2c88b2b03ad75e3774a70363ad121331b0988b9fa3fd3bdd1f48369863e3c2bc37067a1fe90d7cc733eb753fc3fbe8fa03ed9c061732486e68b39e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x100, 0x7, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0xcb, 0xff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x41d895d346bc2a8e, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x4, 0x7, 0x9, 0x0, 0x2}, 0x0, 0x0, r1, 0x1) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000ac0), 0xe) sendmsg$inet(r0, &(0x7f0000002f00)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000500)=[{&(0x7f0000002d00)="13", 0x1}], 0x15}, 0x0) [ 88.379148][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 88.400926][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.422430][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 88.444802][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.488856][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 88.538877][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.563149][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 18:47:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x100, 0x7, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0xcb, 0xff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x41d895d346bc2a8e, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x4, 0x7, 0x9, 0x0, 0x2}, 0x0, 0x0, r1, 0x1) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000ac0), 0xe) sendmsg$inet(r0, &(0x7f0000002f00)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000500)=[{&(0x7f0000002d00)="13", 0x1}], 0x15}, 0x0) [ 88.585164][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.641997][ T8437] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 88.660987][ T8423] device veth1_macvtap entered promiscuous mode [ 88.863414][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 88.872062][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 88.889565][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 18:47:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x100, 0x7, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0xcb, 0xff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x41d895d346bc2a8e, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x4, 0x7, 0x9, 0x0, 0x2}, 0x0, 0x0, r1, 0x1) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000ac0), 0xe) sendmsg$inet(r0, &(0x7f0000002f00)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000500)=[{&(0x7f0000002d00)="13", 0x1}], 0x15}, 0x0) 18:47:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x100, 0x7, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0xcb, 0xff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x41d895d346bc2a8e, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x4, 0x7, 0x9, 0x0, 0x2}, 0x0, 0x0, r1, 0x1) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000ac0), 0xe) sendmsg$inet(r0, &(0x7f0000002f00)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000500)=[{&(0x7f0000002d00)="13", 0x1}], 0x15}, 0x0) 18:47:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x100, 0x7, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0xcb, 0xff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x41d895d346bc2a8e, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x4, 0x7, 0x9, 0x0, 0x2}, 0x0, 0x0, r1, 0x1) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000ac0), 0xe) sendmsg$inet(r0, &(0x7f0000002f00)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000500)=[{&(0x7f0000002d00)="13", 0x1}], 0x15}, 0x0) [ 89.391663][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 89.446885][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 89.471513][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 89.489505][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 89.534942][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 89.546127][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 89.569629][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 89.580890][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 89.592878][ T8437] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 89.606396][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 89.620975][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 89.672604][ T8437] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.695007][ T8437] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.712592][ T8437] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.725300][ T8437] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 18:47:31 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 18:47:31 executing program 2: recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x3, 0x0, 0x4, &(0x7f00000003c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)="4d5c5a927a7d94657a8839f8784626017d996df5ebc1fe34ba133d7e8396142578d15448f3c6db2c56067098f2ff391663b96ec9ba7df10b7633978bd8ea0ce62723830e986f10668f448eba1dd840bee0c648", 0x53}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x1}, 0x4000, 0x1ff, 0x0, 0x0, 0x8, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x1, 0x6, 0x6, 0x5, 0x0, 0x31a8, 0x8801, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x6, 0x2310}, 0x2419, 0x5, 0x4, 0x2, 0x9, 0xfb, 0xfff}, 0x0, 0x7, r1, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'vxcan1\x00'}) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x6, 0x9, 0xfe, 0x0, 0x0, 0x7fff, 0x300e0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xa8f5}, 0x5035, 0x2, 0x753, 0x1, 0x19, 0x7fff, 0x59cc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) 18:47:31 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x151}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x300) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, r2, 0x0, 0xa, &(0x7f0000000200)='-{^%)-@#+\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xf7, 0x7, 0x40, 0x8, 0x0, 0xd0, 0x2000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x5, 0x6}, 0x4, 0x80000000, 0x0, 0x0, 0x0, 0x5, 0x7}, r1, 0x4, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000080, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) [ 89.771935][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 89.788795][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 89.848079][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 89.888539][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 89.911748][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 89.929476][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 89.952665][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.002986][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.021583][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.049186][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.077644][ T8423] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 90.099528][ T25] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.107665][ T25] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.117008][ T9856] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 90.128379][ T9856] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave [ 90.156321][ T9863] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 90.182653][ T9863] bridge0: port 3(team0) entered blocking state [ 90.199296][ T9863] bridge0: port 3(team0) entered disabled state [ 90.268134][ T9863] device team0 entered promiscuous mode [ 90.285254][ T9863] device team_slave_0 entered promiscuous mode [ 90.296139][ T9863] device team_slave_1 entered promiscuous mode [ 90.326804][ T9863] bridge0: port 3(team0) entered blocking state [ 90.334464][ T9863] bridge0: port 3(team0) entered forwarding state [ 90.395706][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.405241][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.414839][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 90.682713][ T9856] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 90.729628][ T9856] device team0 left promiscuous mode [ 90.737133][ T9856] device team_slave_0 left promiscuous mode [ 90.752584][ T9856] device team_slave_1 left promiscuous mode [ 90.769814][ T9856] bridge0: port 3(team0) entered disabled state [ 90.794720][ T9856] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave [ 90.811222][ T9863] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 90.826755][ T9863] bridge0: port 3(team0) entered blocking state [ 90.842647][ T9863] bridge0: port 3(team0) entered disabled state [ 90.854723][ T9863] device team0 entered promiscuous mode [ 90.865636][ T9863] device team_slave_0 entered promiscuous mode [ 90.875098][ T9863] device team_slave_1 entered promiscuous mode [ 90.884618][ T9863] bridge0: port 3(team0) entered blocking state [ 90.890961][ T9863] bridge0: port 3(team0) entered forwarding state [ 90.913867][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 90.934516][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.967379][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 90.986471][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.008656][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 91.027845][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.058789][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 91.088648][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.098532][ T8423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 91.110642][ T8423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.122810][ T8423] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 91.173511][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 91.174026][ T9748] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.192359][ T4820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 91.192927][ T9748] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.214545][ T8423] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.242798][ T8423] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.252067][ T8423] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.261189][ T8423] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.285388][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 18:47:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x400c6615, 0x0) [ 91.429719][ T9893] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.437797][ T9893] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.518250][ T9893] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.526718][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 91.579073][ T9893] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.641108][ T25] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.662010][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 91.669203][ T25] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.712291][ T9718] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 91.760668][ T190] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.781175][ T190] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.803304][ T9718] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 18:47:33 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) [ 92.047818][ T9938] syz-executor.4 (9938) used greatest stack depth: 22408 bytes left 18:47:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe088ca1f74ffff10000000632177fbac14140ce0", 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) 18:47:33 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 18:47:33 executing program 2: recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x3, 0x0, 0x4, &(0x7f00000003c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)="4d5c5a927a7d94657a8839f8784626017d996df5ebc1fe34ba133d7e8396142578d15448f3c6db2c56067098f2ff391663b96ec9ba7df10b7633978bd8ea0ce62723830e986f10668f448eba1dd840bee0c648", 0x53}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x1}, 0x4000, 0x1ff, 0x0, 0x0, 0x8, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x1, 0x6, 0x6, 0x5, 0x0, 0x31a8, 0x8801, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x6, 0x2310}, 0x2419, 0x5, 0x4, 0x2, 0x9, 0xfb, 0xfff}, 0x0, 0x7, r1, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'vxcan1\x00'}) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x6, 0x9, 0xfe, 0x0, 0x0, 0x7fff, 0x300e0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xa8f5}, 0x5035, 0x2, 0x753, 0x1, 0x19, 0x7fff, 0x59cc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) 18:47:33 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x151}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x300) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, r2, 0x0, 0xa, &(0x7f0000000200)='-{^%)-@#+\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xf7, 0x7, 0x40, 0x8, 0x0, 0xd0, 0x2000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x5, 0x6}, 0x4, 0x80000000, 0x0, 0x0, 0x0, 0x5, 0x7}, r1, 0x4, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000080, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 18:47:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x400c6615, 0x0) 18:47:33 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) [ 92.478232][ T9952] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 92.535668][ T9952] device team0 left promiscuous mode 18:47:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x400c6615, 0x0) [ 92.569297][ T9952] device team_slave_0 left promiscuous mode [ 92.590773][ T9952] device team_slave_1 left promiscuous mode [ 92.610266][ T9952] bridge0: port 3(team0) entered disabled state 18:47:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe088ca1f74ffff10000000632177fbac14140ce0", 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) 18:47:34 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) [ 92.625254][ T9952] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave [ 92.694934][ T9958] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 92.727005][ T9958] bridge0: port 3(team0) entered blocking state [ 92.762953][ T9958] bridge0: port 3(team0) entered disabled state 18:47:34 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) 18:47:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe088ca1f74ffff10000000632177fbac14140ce0", 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) 18:47:34 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) [ 92.972910][ T9958] device team0 entered promiscuous mode [ 93.034243][ T9958] device team_slave_0 entered promiscuous mode [ 93.057544][ T9958] device team_slave_1 entered promiscuous mode [ 93.112005][ T9958] bridge0: port 3(team0) entered blocking state [ 93.118817][ T9958] bridge0: port 3(team0) entered forwarding state 18:47:34 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) 18:47:34 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 18:47:34 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) 18:47:34 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x151}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x300) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, r2, 0x0, 0xa, &(0x7f0000000200)='-{^%)-@#+\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xf7, 0x7, 0x40, 0x8, 0x0, 0xd0, 0x2000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x5, 0x6}, 0x4, 0x80000000, 0x0, 0x0, 0x0, 0x5, 0x7}, r1, 0x4, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000080, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 18:47:34 executing program 2: recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x3, 0x0, 0x4, &(0x7f00000003c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)="4d5c5a927a7d94657a8839f8784626017d996df5ebc1fe34ba133d7e8396142578d15448f3c6db2c56067098f2ff391663b96ec9ba7df10b7633978bd8ea0ce62723830e986f10668f448eba1dd840bee0c648", 0x53}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x1}, 0x4000, 0x1ff, 0x0, 0x0, 0x8, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x1, 0x6, 0x6, 0x5, 0x0, 0x31a8, 0x8801, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x6, 0x2310}, 0x2419, 0x5, 0x4, 0x2, 0x9, 0xfb, 0xfff}, 0x0, 0x7, r1, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'vxcan1\x00'}) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x6, 0x9, 0xfe, 0x0, 0x0, 0x7fff, 0x300e0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xa8f5}, 0x5035, 0x2, 0x753, 0x1, 0x19, 0x7fff, 0x59cc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) 18:47:34 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) 18:47:34 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) [ 93.607091][ T9996] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 93.644966][ T9996] device team0 left promiscuous mode 18:47:35 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) [ 93.684776][ T9996] device team_slave_0 left promiscuous mode [ 93.735290][ T9996] device team_slave_1 left promiscuous mode 18:47:35 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) [ 93.777568][ T9996] bridge0: port 3(team0) entered disabled state 18:47:35 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) [ 93.836885][ T9996] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave [ 93.915886][T10001] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 93.954531][T10001] bridge0: port 3(team0) entered blocking state [ 93.983710][T10001] bridge0: port 3(team0) entered disabled state 18:47:35 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) 18:47:35 executing program 0: recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x3, 0x0, 0x4, &(0x7f00000003c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)="4d5c5a927a7d94657a8839f8784626017d996df5ebc1fe34ba133d7e8396142578d15448f3c6db2c56067098f2ff391663b96ec9ba7df10b7633978bd8ea0ce62723830e986f10668f448eba1dd840bee0c648", 0x53}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x1}, 0x4000, 0x1ff, 0x0, 0x0, 0x8, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x1, 0x6, 0x6, 0x5, 0x0, 0x31a8, 0x8801, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x6, 0x2310}, 0x2419, 0x5, 0x4, 0x2, 0x9, 0xfb, 0xfff}, 0x0, 0x7, r1, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'vxcan1\x00'}) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x6, 0x9, 0xfe, 0x0, 0x0, 0x7fff, 0x300e0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xa8f5}, 0x5035, 0x2, 0x753, 0x1, 0x19, 0x7fff, 0x59cc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) [ 94.125522][T10001] device team0 entered promiscuous mode [ 94.158258][T10001] device team_slave_0 entered promiscuous mode [ 94.182453][T10001] device team_slave_1 entered promiscuous mode [ 94.247221][T10001] bridge0: port 3(team0) entered blocking state [ 94.255899][T10001] bridge0: port 3(team0) entered forwarding state 18:47:35 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) 18:47:35 executing program 2: recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x3, 0x0, 0x4, &(0x7f00000003c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)="4d5c5a927a7d94657a8839f8784626017d996df5ebc1fe34ba133d7e8396142578d15448f3c6db2c56067098f2ff391663b96ec9ba7df10b7633978bd8ea0ce62723830e986f10668f448eba1dd840bee0c648", 0x53}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x1}, 0x4000, 0x1ff, 0x0, 0x0, 0x8, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x1, 0x6, 0x6, 0x5, 0x0, 0x31a8, 0x8801, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x6, 0x2310}, 0x2419, 0x5, 0x4, 0x2, 0x9, 0xfb, 0xfff}, 0x0, 0x7, r1, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'vxcan1\x00'}) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x6, 0x9, 0xfe, 0x0, 0x0, 0x7fff, 0x300e0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xa8f5}, 0x5035, 0x2, 0x753, 0x1, 0x19, 0x7fff, 0x59cc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) 18:47:35 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 94.576572][T10015] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 94.597313][T10015] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave [ 94.615241][T10020] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 94.631817][T10020] bridge0: port 3(team0) entered blocking state [ 94.639305][T10020] bridge0: port 3(team0) entered disabled state [ 94.728455][T10020] device team0 entered promiscuous mode [ 94.742369][T10020] device team_slave_0 entered promiscuous mode [ 94.753734][T10020] device team_slave_1 entered promiscuous mode [ 94.793078][T10020] bridge0: port 3(team0) entered blocking state [ 94.801669][T10020] bridge0: port 3(team0) entered forwarding state 18:47:36 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 18:47:36 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x215e7}], 0x1}, 0x60) close(r0) [ 94.839578][T10030] device team0 left promiscuous mode [ 94.845029][T10030] device team_slave_0 left promiscuous mode [ 94.858682][T10030] device team_slave_1 left promiscuous mode [ 94.864950][T10030] bridge0: port 3(team0) entered disabled state 18:47:36 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="e2d0a73c437a3d509902d5879cfa5418f2c53083f6154b669ee2aa9e74bcfbbe766aa50eddc95d958c45dddf3125ab9816d3b44590b26a92d8fe3f0482100dd40e6e073ebe76cd8b6f3ce6d185f5a0c01000e1eddf5cd8d68e04922d68c9f15be0ab9c0b4a1f76282cbc000017cb4f7e010d6a236c1d9e33c9b7487114c0c3861ca9a9f5cab39e1c71d97a410f6c110cfc402dc1abe3da4713639e86051c010000005611e6020000000000cee7acdd8cc4f957c02b6ddaf05d692c3830d83242f30000f3ba7c81a988b7d7119685408a5b4a2f4e10ca02d47d6676514abc24b712f26a8f38665889557b65eb5a21ca9bba8094d8cf7b1c673a2ec9534e2666ab9d496af32bef0c2ca68adf272e58cf8cc7fe1901a00195280c874a9e39dd7c568cfbad43b49251a58410e30ba1e147d2cf1350ef54bb630a349d77bbd7d9c1677da39bc396d345bfaa151d1c693e386a3df42259d865218b06ba906e16d69cce0dd6acfc9fe59c7ee9a15f30db4cf0f3fc4ea41a6a590fcb5a29e91fa0a4336ce2bb11a55fc41426670000000000000000fa67a05d6a4bc26cba1379096b257313e37291d17b31cd493960b6b3ed5b2a755bdbb0312e4f641c388d06c192f01c33d5ac181423069184b8"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 94.910328][T10030] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave 18:47:36 executing program 0: recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x3, 0x0, 0x4, &(0x7f00000003c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)="4d5c5a927a7d94657a8839f8784626017d996df5ebc1fe34ba133d7e8396142578d15448f3c6db2c56067098f2ff391663b96ec9ba7df10b7633978bd8ea0ce62723830e986f10668f448eba1dd840bee0c648", 0x53}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x1}, 0x4000, 0x1ff, 0x0, 0x0, 0x8, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x1, 0x6, 0x6, 0x5, 0x0, 0x31a8, 0x8801, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x6, 0x2310}, 0x2419, 0x5, 0x4, 0x2, 0x9, 0xfb, 0xfff}, 0x0, 0x7, r1, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'vxcan1\x00'}) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x6, 0x9, 0xfe, 0x0, 0x0, 0x7fff, 0x300e0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xa8f5}, 0x5035, 0x2, 0x753, 0x1, 0x19, 0x7fff, 0x59cc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) [ 94.962906][T10032] bridge0: port 3(team0) entered blocking state [ 94.973982][T10032] bridge0: port 3(team0) entered disabled state [ 95.123730][T10032] device team0 entered promiscuous mode [ 95.142263][T10032] device team_slave_0 entered promiscuous mode 18:47:36 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x151}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x300) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, r2, 0x0, 0xa, &(0x7f0000000200)='-{^%)-@#+\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xf7, 0x7, 0x40, 0x8, 0x0, 0xd0, 0x2000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x5, 0x6}, 0x4, 0x80000000, 0x0, 0x0, 0x0, 0x5, 0x7}, r1, 0x4, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000080, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) [ 95.181540][T10032] device team_slave_1 entered promiscuous mode [ 95.273118][T10032] bridge0: port 3(team0) entered blocking state [ 95.282454][T10032] bridge0: port 3(team0) entered forwarding state [ 95.441129][T10043] validate_nla: 2 callbacks suppressed [ 95.441148][T10043] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 18:47:36 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='ext4_es_lookup_extent_exit\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) close(0xffffffffffffffff) 18:47:36 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 95.490603][T10043] device team0 left promiscuous mode [ 95.495942][T10043] device team_slave_0 left promiscuous mode 18:47:36 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 95.542647][T10043] device team_slave_1 left promiscuous mode [ 95.593546][T10043] bridge0: port 3(team0) entered disabled state [ 95.633773][T10043] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave [ 95.683390][T10046] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 95.723064][T10046] bridge0: port 3(team0) entered blocking state [ 95.767185][T10046] bridge0: port 3(team0) entered disabled state [ 95.865050][T10046] device team0 entered promiscuous mode [ 95.891589][T10046] device team_slave_0 entered promiscuous mode [ 95.929396][T10046] device team_slave_1 entered promiscuous mode [ 95.946671][T10046] bridge0: port 3(team0) entered blocking state [ 95.953083][T10046] bridge0: port 3(team0) entered forwarding state 18:47:37 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="e2d0a73c437a3d509902d5879cfa5418f2c53083f6154b669ee2aa9e74bcfbbe766aa50eddc95d958c45dddf3125ab9816d3b44590b26a92d8fe3f0482100dd40e6e073ebe76cd8b6f3ce6d185f5a0c01000e1eddf5cd8d68e04922d68c9f15be0ab9c0b4a1f76282cbc000017cb4f7e010d6a236c1d9e33c9b7487114c0c3861ca9a9f5cab39e1c71d97a410f6c110cfc402dc1abe3da4713639e86051c010000005611e6020000000000cee7acdd8cc4f957c02b6ddaf05d692c3830d83242f30000f3ba7c81a988b7d7119685408a5b4a2f4e10ca02d47d6676514abc24b712f26a8f38665889557b65eb5a21ca9bba8094d8cf7b1c673a2ec9534e2666ab9d496af32bef0c2ca68adf272e58cf8cc7fe1901a00195280c874a9e39dd7c568cfbad43b49251a58410e30ba1e147d2cf1350ef54bb630a349d77bbd7d9c1677da39bc396d345bfaa151d1c693e386a3df42259d865218b06ba906e16d69cce0dd6acfc9fe59c7ee9a15f30db4cf0f3fc4ea41a6a590fcb5a29e91fa0a4336ce2bb11a55fc41426670000000000000000fa67a05d6a4bc26cba1379096b257313e37291d17b31cd493960b6b3ed5b2a755bdbb0312e4f641c388d06c192f01c33d5ac181423069184b8"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 18:47:37 executing program 0: recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x3, 0x0, 0x4, &(0x7f00000003c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)="4d5c5a927a7d94657a8839f8784626017d996df5ebc1fe34ba133d7e8396142578d15448f3c6db2c56067098f2ff391663b96ec9ba7df10b7633978bd8ea0ce62723830e986f10668f448eba1dd840bee0c648", 0x53}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x1}, 0x4000, 0x1ff, 0x0, 0x0, 0x8, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x1, 0x6, 0x6, 0x5, 0x0, 0x31a8, 0x8801, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x6, 0x2310}, 0x2419, 0x5, 0x4, 0x2, 0x9, 0xfb, 0xfff}, 0x0, 0x7, r1, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'vxcan1\x00'}) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x6, 0x9, 0xfe, 0x0, 0x0, 0x7fff, 0x300e0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xa8f5}, 0x5035, 0x2, 0x753, 0x1, 0x19, 0x7fff, 0x59cc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) 18:47:37 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='ext4_es_lookup_extent_exit\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) close(0xffffffffffffffff) 18:47:37 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='ext4_es_lookup_extent_exit\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) close(0xffffffffffffffff) 18:47:38 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 18:47:38 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="e2d0a73c437a3d509902d5879cfa5418f2c53083f6154b669ee2aa9e74bcfbbe766aa50eddc95d958c45dddf3125ab9816d3b44590b26a92d8fe3f0482100dd40e6e073ebe76cd8b6f3ce6d185f5a0c01000e1eddf5cd8d68e04922d68c9f15be0ab9c0b4a1f76282cbc000017cb4f7e010d6a236c1d9e33c9b7487114c0c3861ca9a9f5cab39e1c71d97a410f6c110cfc402dc1abe3da4713639e86051c010000005611e6020000000000cee7acdd8cc4f957c02b6ddaf05d692c3830d83242f30000f3ba7c81a988b7d7119685408a5b4a2f4e10ca02d47d6676514abc24b712f26a8f38665889557b65eb5a21ca9bba8094d8cf7b1c673a2ec9534e2666ab9d496af32bef0c2ca68adf272e58cf8cc7fe1901a00195280c874a9e39dd7c568cfbad43b49251a58410e30ba1e147d2cf1350ef54bb630a349d77bbd7d9c1677da39bc396d345bfaa151d1c693e386a3df42259d865218b06ba906e16d69cce0dd6acfc9fe59c7ee9a15f30db4cf0f3fc4ea41a6a590fcb5a29e91fa0a4336ce2bb11a55fc41426670000000000000000fa67a05d6a4bc26cba1379096b257313e37291d17b31cd493960b6b3ed5b2a755bdbb0312e4f641c388d06c192f01c33d5ac181423069184b8"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 96.696136][T10086] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 96.729903][T10086] device team0 left promiscuous mode [ 96.755905][T10086] device team_slave_0 left promiscuous mode [ 96.786017][T10086] device team_slave_1 left promiscuous mode [ 96.821483][T10086] bridge0: port 3(team0) entered disabled state [ 96.865100][T10086] bond0: (slave team0): slave is up - this may be due to an out of date ifenslave [ 96.924959][T10093] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 18:47:38 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x151}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x300) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, r2, 0x0, 0xa, &(0x7f0000000200)='-{^%)-@#+\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xf7, 0x7, 0x40, 0x8, 0x0, 0xd0, 0x2000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x5, 0x6}, 0x4, 0x80000000, 0x0, 0x0, 0x0, 0x5, 0x7}, r1, 0x4, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000080, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 18:47:38 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20008011) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x82434e3711dc67eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xeca}, 0x0, 0x0, 0xb, 0x1, 0xdfffffffffffffff, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xa70, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) close(r1) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24040044) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="e2d0a73c437a3d509902d5879cfa5418f2c53083f6154b669ee2aa9e74bcfbbe766aa50eddc95d958c45dddf3125ab9816d3b44590b26a92d8fe3f0482100dd40e6e073ebe76cd8b6f3ce6d185f5a0c01000e1eddf5cd8d68e04922d68c9f15be0ab9c0b4a1f76282cbc000017cb4f7e010d6a236c1d9e33c9b7487114c0c3861ca9a9f5cab39e1c71d97a410f6c110cfc402dc1abe3da4713639e86051c010000005611e6020000000000cee7acdd8cc4f957c02b6ddaf05d692c3830d83242f30000f3ba7c81a988b7d7119685408a5b4a2f4e10ca02d47d6676514abc24b712f26a8f38665889557b65eb5a21ca9bba8094d8cf7b1c673a2ec9534e2666ab9d496af32bef0c2ca68adf272e58cf8cc7fe1901a00195280c874a9e39dd7c568cfbad43b49251a58410e30ba1e147d2cf1350ef54bb630a349d77bbd7d9c1677da39bc396d345bfaa151d1c693e386a3df42259d865218b06ba906e16d69cce0dd6acfc9fe59c7ee9a15f30db4cf0f3fc4ea41a6a590fcb5a29e91fa0a4336ce2bb11a55fc41426670000000000000000fa67a05d6a4bc26cba1379096b257313e37291d17b31cd493960b6b3ed5b2a755bdbb0312e4f641c388d06c192f01c33d5ac181423069184b8"], 0xfe50}, 0x40054) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 97.019633][T10093] bridge0: port 3(team0) entered blocking state [ 97.084229][T10093] bridge0: port 3(team0) entered disabled state [ 97.123130][T10093] device team0 entered promiscuous mode 18:47:38 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='ext4_es_lookup_extent_exit\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) close(0xffffffffffffffff) [ 97.146731][T10093] device team_slave_0 entered promiscuous mode [ 97.171061][T10093] device team_slave_1 entered promiscuous mode [ 97.212879][T10093] bridge0: port 3(team0) entered blocking state [ 97.219354][T10093] bridge0: port 3(team0) entered forwarding state [ 97.445610][ C0] ------------[ cut here ]------------ [ 97.451632][ C0] raw_local_irq_restore() called with IRQs enabled [ 97.458614][ C0] WARNING: CPU: 0 PID: 4841 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x1d/0x20 [ 97.469293][ C0] Modules linked in: [ 97.473251][ C0] CPU: 0 PID: 4841 Comm: systemd-udevd Not tainted 5.12.0-rc2-syzkaller #0 [ 97.481898][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.492026][ C0] RIP: 0010:warn_bogus_irq_restore+0x1d/0x20 [ 97.498040][ C0] Code: be ff cc cc cc cc cc cc cc cc cc cc cc 80 3d 22 07 ad 04 00 74 01 c3 48 c7 c7 20 92 6b 89 c6 05 11 07 ad 04 01 e8 4c d1 be ff <0f> 0b c3 48 39 77 10 0f 84 97 00 00 00 66 f7 47 22 f0 ff 74 4b 48 [ 97.517723][ C0] RSP: 0018:ffffc90000007cb8 EFLAGS: 00010282 [ 97.524127][ C0] RAX: 0000000000000000 RBX: ffff888011a19808 RCX: 0000000000000000 [ 97.532171][ C0] RDX: ffff8880152f0000 RSI: ffffffff815c3f65 RDI: fffff52000000f89 [ 97.540205][ C0] RBP: 0000000000000200 R08: 0000000000000000 R09: 0000000000000000 [ 97.548198][ C0] R10: ffffffff815bccfe R11: 0000000000000000 R12: 0000000000000003 [ 97.556269][ C0] R13: ffffed1002343301 R14: 0000000000000001 R15: ffff8880b9c35f40 [ 97.564306][ C0] FS: 00007f5c967468c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 97.573297][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 97.579952][ C0] CR2: 000000c00b35d000 CR3: 000000001434e000 CR4: 00000000001506f0 [ 97.587952][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 18:47:38 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='ext4_es_lookup_extent_exit\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) close(0xffffffffffffffff) [ 97.596035][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 97.604106][ C0] Call Trace: [ 97.607403][ C0] [ 97.610335][ C0] kvm_wait+0xc9/0xe0 [ 97.614348][ C0] __pv_queued_spin_lock_slowpath+0x8b8/0xb40 [ 97.620543][ C0] ? pv_hash+0x100/0x100 [ 97.624819][ C0] ? lock_release+0x720/0x720 [ 97.629599][ C0] do_raw_spin_lock+0x200/0x2b0 [ 97.634497][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 97.639551][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 97.645856][ C0] tcp_tsq_handler+0x1d/0x200 [ 97.650653][ C0] tcp_tasklet_func+0x2cc/0x560 [ 97.655552][ C0] ? tcp_tsq_handler+0x200/0x200 [ 97.660617][ C0] tasklet_action_common.constprop.0+0x1d7/0x2d0 [ 97.666971][ C0] __do_softirq+0x29b/0x9f6 [ 97.671589][ C0] irq_exit_rcu+0x134/0x200 [ 97.676118][ C0] common_interrupt+0xa4/0xd0 [ 97.680926][ C0] [ 97.683880][ C0] asm_common_interrupt+0x1e/0x40 [ 97.689019][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 [ 97.695120][ C0] Code: f0 4d 89 03 e9 f2 fc ff ff b9 ff ff ff ff ba 08 00 00 00 4d 8b 03 48 0f bd ca 49 8b 45 00 48 63 c9 e9 64 ff ff ff 0f 1f 40 00 <65> 8b 05 b9 0e 8e 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b [ 97.714844][ C0] RSP: 0018:ffffc9000160f5a8 EFLAGS: 00000293 [ 97.721020][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000007 [ 97.729184][ C0] RDX: 0000000000000000 RSI: ffff8880152f0000 RDI: 0000000000000003 [ 97.737176][ C0] RBP: ffff888024bc0c80 R08: ffffffff89bb0b20 R09: ffffffff839138d9 [ 97.745262][ C0] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 97.753325][ C0] R13: 00000000000000e7 R14: dffffc0000000000 R15: 0000000000000000 [ 97.761437][ C0] ? tomoyo_domain_quota_is_ok+0x1c9/0x550 [ 97.767287][ C0] tomoyo_domain_quota_is_ok+0x426/0x550 [ 97.773204][ C0] tomoyo_supervisor+0x2f2/0xf00 [ 97.778183][ C0] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 97.784102][ C0] ? tomoyo_profile+0x50/0x50 [ 97.788895][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 97.794745][ C0] ? kasan_quarantine_put+0xf5/0x210 [ 97.800133][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 97.805366][ C0] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 97.811182][ C0] ? tomoyo_path_matches_pattern+0x110/0x280 [ 97.817204][ C0] ? tomoyo_check_path_acl+0xab/0x210 [ 97.822691][ C0] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 97.829045][ C0] ? tomoyo_same_mount_acl+0x450/0x450 [ 97.834674][ C0] tomoyo_path_permission+0x270/0x3a0 [ 97.840148][ C0] tomoyo_check_open_permission+0x33e/0x380 [ 97.846089][ C0] ? tomoyo_path_number_perm+0x590/0x590 [ 97.851867][ C0] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 97.857911][ C0] ? kernfs_iop_permission+0x76/0xb0 [ 97.863331][ C0] ? path_get+0x5d/0x80 [ 97.867527][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 97.872491][ C0] ? do_raw_spin_lock+0x120/0x2b0 [ 97.877568][ C0] tomoyo_file_open+0xa3/0xd0 [ 97.882380][ C0] security_file_open+0x52/0x4f0 [ 97.887413][ C0] do_dentry_open+0x358/0x11b0 [ 97.892284][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 97.898629][ C0] ? may_open+0x1f6/0x420 [ 97.903015][ C0] path_openat+0x1c0e/0x27e0 [ 97.907650][ C0] ? path_lookupat+0x830/0x830 [ 97.912531][ C0] ? perf_trace_lock+0xeb/0x4d0 [ 97.917417][ C0] ? __lockdep_reset_lock+0x400/0x400 [ 97.922908][ C0] do_filp_open+0x17e/0x3c0 [ 97.927450][ C0] ? may_open_dev+0xf0/0xf0 [ 97.932074][ C0] ? do_raw_spin_lock+0x120/0x2b0 [ 97.937213][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 97.942311][ C0] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 97.948687][ C0] ? _raw_spin_unlock+0x24/0x40 [ 97.953574][ C0] ? alloc_fd+0x2bc/0x640 [ 97.957948][ C0] do_sys_openat2+0x16d/0x420 [ 97.962749][ C0] ? build_open_flags+0x6f0/0x6f0 [ 97.967816][ C0] ? __context_tracking_exit+0xb8/0xe0 [ 97.973406][ C0] __x64_sys_open+0x119/0x1c0 [ 97.978234][ C0] ? do_sys_open+0x140/0x140 [ 97.982945][ C0] ? __secure_computing+0x104/0x360 [ 97.988182][ C0] do_syscall_64+0x2d/0x70 [ 97.992689][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.998683][ C0] RIP: 0033:0x7f5c955b86f0 [ 98.003123][ C0] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 19 30 2c 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 fe 9d 01 00 48 89 04 24 [ 98.022878][ C0] RSP: 002b:00007ffef43ef938 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 98.031377][ C0] RAX: ffffffffffffffda RBX: 000055f4964769b0 RCX: 00007f5c955b86f0 [ 98.039428][ C0] RDX: 00000000000001b6 RSI: 0000000000080000 RDI: 00007ffef43efae0 [ 98.047467][ C0] RBP: 0000000000000008 R08: 0000000000000008 R09: 0000000000000001 [ 98.055517][ C0] R10: 0000000000080000 R11: 0000000000000246 R12: 000055f494c0968a [ 98.063598][ C0] R13: 0000000000000001 R14: 000055f496476810 R15: 00007ffef43efb60 [ 98.071696][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 98.078289][ C0] CPU: 0 PID: 4841 Comm: systemd-udevd Not tainted 5.12.0-rc2-syzkaller #0 [ 98.086898][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.096951][ C0] Call Trace: [ 98.100230][ C0] [ 98.103088][ C0] dump_stack+0x141/0x1d7 [ 98.107443][ C0] panic+0x306/0x73d [ 98.111365][ C0] ? __warn_printk+0xf3/0xf3 [ 98.115978][ C0] ? __warn.cold+0x1a/0x44 [ 98.120397][ C0] ? warn_bogus_irq_restore+0x1d/0x20 [ 98.125792][ C0] __warn.cold+0x35/0x44 [ 98.130065][ C0] ? wake_up_klogd.part.0+0x8e/0xd0 [ 98.135292][ C0] ? warn_bogus_irq_restore+0x1d/0x20 [ 98.140667][ C0] report_bug+0x1bd/0x210 [ 98.145027][ C0] handle_bug+0x3c/0x60 [ 98.149185][ C0] exc_invalid_op+0x14/0x40 [ 98.153715][ C0] asm_exc_invalid_op+0x12/0x20 [ 98.158588][ C0] RIP: 0010:warn_bogus_irq_restore+0x1d/0x20 [ 98.164629][ C0] Code: be ff cc cc cc cc cc cc cc cc cc cc cc 80 3d 22 07 ad 04 00 74 01 c3 48 c7 c7 20 92 6b 89 c6 05 11 07 ad 04 01 e8 4c d1 be ff <0f> 0b c3 48 39 77 10 0f 84 97 00 00 00 66 f7 47 22 f0 ff 74 4b 48 [ 98.184261][ C0] RSP: 0018:ffffc90000007cb8 EFLAGS: 00010282 [ 98.190358][ C0] RAX: 0000000000000000 RBX: ffff888011a19808 RCX: 0000000000000000 [ 98.198351][ C0] RDX: ffff8880152f0000 RSI: ffffffff815c3f65 RDI: fffff52000000f89 [ 98.206340][ C0] RBP: 0000000000000200 R08: 0000000000000000 R09: 0000000000000000 [ 98.214327][ C0] R10: ffffffff815bccfe R11: 0000000000000000 R12: 0000000000000003 [ 98.222297][ C0] R13: ffffed1002343301 R14: 0000000000000001 R15: ffff8880b9c35f40 [ 98.230298][ C0] ? wake_up_klogd.part.0+0x8e/0xd0 [ 98.235530][ C0] ? vprintk_func+0x95/0x1e0 [ 98.240154][ C0] ? warn_bogus_irq_restore+0x1d/0x20 [ 98.245551][ C0] kvm_wait+0xc9/0xe0 [ 98.249552][ C0] __pv_queued_spin_lock_slowpath+0x8b8/0xb40 [ 98.255656][ C0] ? pv_hash+0x100/0x100 [ 98.259928][ C0] ? lock_release+0x720/0x720 [ 98.264636][ C0] do_raw_spin_lock+0x200/0x2b0 [ 98.269515][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 98.274503][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 98.280801][ C0] tcp_tsq_handler+0x1d/0x200 [ 98.285503][ C0] tcp_tasklet_func+0x2cc/0x560 [ 98.290380][ C0] ? tcp_tsq_handler+0x200/0x200 [ 98.295341][ C0] tasklet_action_common.constprop.0+0x1d7/0x2d0 [ 98.301714][ C0] __do_softirq+0x29b/0x9f6 [ 98.306245][ C0] irq_exit_rcu+0x134/0x200 [ 98.310757][ C0] common_interrupt+0xa4/0xd0 [ 98.315469][ C0] [ 98.318410][ C0] asm_common_interrupt+0x1e/0x40 [ 98.323450][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 [ 98.329545][ C0] Code: f0 4d 89 03 e9 f2 fc ff ff b9 ff ff ff ff ba 08 00 00 00 4d 8b 03 48 0f bd ca 49 8b 45 00 48 63 c9 e9 64 ff ff ff 0f 1f 40 00 <65> 8b 05 b9 0e 8e 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b [ 98.349175][ C0] RSP: 0018:ffffc9000160f5a8 EFLAGS: 00000293 [ 98.355262][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000007 [ 98.363232][ C0] RDX: 0000000000000000 RSI: ffff8880152f0000 RDI: 0000000000000003 [ 98.371232][ C0] RBP: ffff888024bc0c80 R08: ffffffff89bb0b20 R09: ffffffff839138d9 [ 98.379224][ C0] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 98.387230][ C0] R13: 00000000000000e7 R14: dffffc0000000000 R15: 0000000000000000 [ 98.395666][ C0] ? tomoyo_domain_quota_is_ok+0x1c9/0x550 [ 98.401510][ C0] tomoyo_domain_quota_is_ok+0x426/0x550 [ 98.407187][ C0] tomoyo_supervisor+0x2f2/0xf00 [ 98.412209][ C0] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 98.418043][ C0] ? tomoyo_profile+0x50/0x50 [ 98.422745][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 98.428588][ C0] ? kasan_quarantine_put+0xf5/0x210 [ 98.433906][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 98.439134][ C0] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 98.444879][ C0] ? tomoyo_path_matches_pattern+0x110/0x280 [ 98.450867][ C0] ? tomoyo_check_path_acl+0xab/0x210 [ 98.456258][ C0] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 98.462519][ C0] ? tomoyo_same_mount_acl+0x450/0x450 [ 98.468023][ C0] tomoyo_path_permission+0x270/0x3a0 [ 98.473427][ C0] tomoyo_check_open_permission+0x33e/0x380 [ 98.479348][ C0] ? tomoyo_path_number_perm+0x590/0x590 [ 98.485007][ C0] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 98.490988][ C0] ? kernfs_iop_permission+0x76/0xb0 [ 98.496333][ C0] ? path_get+0x5d/0x80 [ 98.500506][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 98.505378][ C0] ? do_raw_spin_lock+0x120/0x2b0 [ 98.510417][ C0] tomoyo_file_open+0xa3/0xd0 [ 98.515128][ C0] security_file_open+0x52/0x4f0 [ 98.520102][ C0] do_dentry_open+0x358/0x11b0 [ 98.524895][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 98.531167][ C0] ? may_open+0x1f6/0x420 [ 98.535521][ C0] path_openat+0x1c0e/0x27e0 [ 98.540125][ C0] ? path_lookupat+0x830/0x830 [ 98.544912][ C0] ? perf_trace_lock+0xeb/0x4d0 [ 98.549814][ C0] ? __lockdep_reset_lock+0x400/0x400 [ 98.555209][ C0] do_filp_open+0x17e/0x3c0 [ 98.559711][ C0] ? may_open_dev+0xf0/0xf0 [ 98.564257][ C0] ? do_raw_spin_lock+0x120/0x2b0 [ 98.569400][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 98.574358][ C0] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 98.580607][ C0] ? _raw_spin_unlock+0x24/0x40 [ 98.585491][ C0] ? alloc_fd+0x2bc/0x640 [ 98.589857][ C0] do_sys_openat2+0x16d/0x420 [ 98.594557][ C0] ? build_open_flags+0x6f0/0x6f0 [ 98.599593][ C0] ? __context_tracking_exit+0xb8/0xe0 [ 98.605073][ C0] __x64_sys_open+0x119/0x1c0 [ 98.609755][ C0] ? do_sys_open+0x140/0x140 [ 98.614378][ C0] ? __secure_computing+0x104/0x360 [ 98.619622][ C0] do_syscall_64+0x2d/0x70 [ 98.624071][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 98.630003][ C0] RIP: 0033:0x7f5c955b86f0 [ 98.634614][ C0] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 19 30 2c 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 fe 9d 01 00 48 89 04 24 [ 98.654262][ C0] RSP: 002b:00007ffef43ef938 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 98.662681][ C0] RAX: ffffffffffffffda RBX: 000055f4964769b0 RCX: 00007f5c955b86f0 [ 98.670674][ C0] RDX: 00000000000001b6 RSI: 0000000000080000 RDI: 00007ffef43efae0 [ 98.678981][ C0] RBP: 0000000000000008 R08: 0000000000000008 R09: 0000000000000001 [ 98.686970][ C0] R10: 0000000000080000 R11: 0000000000000246 R12: 000055f494c0968a [ 98.694955][ C0] R13: 0000000000000001 R14: 000055f496476810 R15: 00007ffef43efb60 [ 98.703845][ C0] Kernel Offset: disabled [ 98.708341][ C0] Rebooting in 86400 seconds..