[ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.241' (ECDSA) to the list of known hosts. 2021/02/02 08:33:30 fuzzer started 2021/02/02 08:33:30 dialing manager at 10.128.0.26:36009 2021/02/02 08:33:31 syscalls: 3466 2021/02/02 08:33:31 code coverage: enabled 2021/02/02 08:33:31 comparison tracing: enabled 2021/02/02 08:33:31 extra coverage: enabled 2021/02/02 08:33:31 setuid sandbox: enabled 2021/02/02 08:33:31 namespace sandbox: enabled 2021/02/02 08:33:31 Android sandbox: /sys/fs/selinux/policy does not exist 2021/02/02 08:33:31 fault injection: enabled 2021/02/02 08:33:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/02/02 08:33:31 net packet injection: enabled 2021/02/02 08:33:31 net device setup: enabled 2021/02/02 08:33:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/02/02 08:33:31 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/02/02 08:33:31 USB emulation: enabled 2021/02/02 08:33:31 hci packet injection: enabled 2021/02/02 08:33:31 wifi device emulation: enabled 2021/02/02 08:33:31 fetching corpus: 0, signal 0/2000 (executing program) 2021/02/02 08:33:31 fetching corpus: 50, signal 49708/52634 (executing program) 2021/02/02 08:33:31 fetching corpus: 100, signal 74004/77631 (executing program) 2021/02/02 08:33:31 fetching corpus: 150, signal 90373/94556 (executing program) 2021/02/02 08:33:32 fetching corpus: 200, signal 102517/107163 (executing program) 2021/02/02 08:33:32 fetching corpus: 250, signal 119883/124346 (executing program) 2021/02/02 08:33:32 fetching corpus: 300, signal 128213/132816 (executing program) 2021/02/02 08:33:32 fetching corpus: 350, signal 137948/142361 (executing program) 2021/02/02 08:33:33 fetching corpus: 399, signal 146412/150557 (executing program) 2021/02/02 08:33:33 fetching corpus: 449, signal 154324/158132 (executing program) 2021/02/02 08:33:33 fetching corpus: 498, signal 164657/167673 (executing program) 2021/02/02 08:33:33 fetching corpus: 548, signal 171237/173731 (executing program) 2021/02/02 08:33:34 fetching corpus: 598, signal 178379/180142 (executing program) 2021/02/02 08:33:34 fetching corpus: 646, signal 183736/184887 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187483 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187526 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187575 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187636 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187693 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187733 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187785 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187837 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187881 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187919 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/187976 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188020 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188076 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188133 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188187 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188225 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188278 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188321 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188371 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188420 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188468 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188521 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188581 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188625 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188678 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188734 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188783 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188821 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188882 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188930 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/188976 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189030 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189085 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189127 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189171 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189216 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189255 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189307 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189360 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189399 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189443 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189505 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189551 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189592 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189638 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189688 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189746 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189804 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189856 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189887 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189938 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/189982 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190036 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190083 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190130 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190179 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190230 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190275 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190330 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190373 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190418 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190469 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190517 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190576 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190632 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190683 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190735 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190771 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190830 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190878 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190934 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/190987 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/191020 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/191072 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/191121 (executing program) 2021/02/02 08:33:34 fetching corpus: 669, signal 186706/191175 (executing program) 2021/02/02 08:33:35 fetching corpus: 669, signal 186706/191229 (executing program) 2021/02/02 08:33:35 fetching corpus: 669, signal 186706/191282 (executing program) 2021/02/02 08:33:35 fetching corpus: 669, signal 186706/191324 (executing program) 2021/02/02 08:33:35 fetching corpus: 669, signal 186706/191365 (executing program) 2021/02/02 08:33:35 fetching corpus: 669, signal 186706/191415 (executing program) 2021/02/02 08:33:35 fetching corpus: 669, signal 186706/191452 (executing program) 2021/02/02 08:33:35 fetching corpus: 669, signal 186706/191452 (executing program) 2021/02/02 08:33:36 starting 6 fuzzer processes 08:33:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$pvfs2(&(0x7f0000000280)='pvfs2\x00', &(0x7f00000002c0)='.\x00', 0x0, 0x1, &(0x7f00000014c0)=[{0x0}], 0x0, &(0x7f0000001600)) 08:33:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) 08:33:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="224f73f3", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x6d, &(0x7f0000000300)={r1}, &(0x7f0000000340)=0x8) 08:33:37 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x3, 0x0, 0x0) connect$phonet_pipe(r0, &(0x7f0000000040), 0x10) syzkaller login: [ 84.018977][ T8429] IPVS: ftp: loaded support on port[0] = 21 08:33:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xf, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10}, [@ldst={0x3, 0x0, 0x6}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 84.308104][ T8431] IPVS: ftp: loaded support on port[0] = 21 [ 84.438929][ T8433] IPVS: ftp: loaded support on port[0] = 21 [ 84.460487][ T8429] chnl_net:caif_netlink_parms(): no params data found [ 84.819527][ T8435] IPVS: ftp: loaded support on port[0] = 21 [ 84.833077][ T8429] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.844498][ T8429] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.854859][ T8429] device bridge_slave_0 entered promiscuous mode [ 84.867236][ T8429] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.875077][ T8429] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.892322][ T8429] device bridge_slave_1 entered promiscuous mode [ 85.089039][ T8437] IPVS: ftp: loaded support on port[0] = 21 [ 85.133666][ T8433] chnl_net:caif_netlink_parms(): no params data found [ 85.166473][ T8429] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.202820][ T8429] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.215079][ T8431] chnl_net:caif_netlink_parms(): no params data found [ 85.319451][ T8429] team0: Port device team_slave_0 added [ 85.355786][ T8429] team0: Port device team_slave_1 added [ 85.449443][ T8429] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 85.466252][ T8429] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.511151][ T8429] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.554573][ T8433] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.566360][ T8433] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.575433][ T8433] device bridge_slave_0 entered promiscuous mode [ 85.589681][ T8429] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.598024][ T8429] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.626027][ T8429] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.647898][ T8433] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.655322][ T8433] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.666845][ T8433] device bridge_slave_1 entered promiscuous mode [ 85.683738][ T8431] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.697165][ T8431] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.710030][ T8431] device bridge_slave_0 entered promiscuous mode [ 85.796430][ T8431] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.811617][ T8431] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.843150][ T8431] device bridge_slave_1 entered promiscuous mode [ 85.936401][ T8429] device hsr_slave_0 entered promiscuous mode [ 85.957932][ T8429] device hsr_slave_1 entered promiscuous mode [ 85.962524][ T7] Bluetooth: hci0: command 0x0409 tx timeout [ 86.005301][ T8608] IPVS: ftp: loaded support on port[0] = 21 [ 86.014771][ T8433] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.039231][ T8431] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.156073][ T8433] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.179165][ T8431] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.195056][ T7] Bluetooth: hci1: command 0x0409 tx timeout [ 86.317350][ T8433] team0: Port device team_slave_0 added [ 86.329802][ T8433] team0: Port device team_slave_1 added [ 86.356198][ T8435] chnl_net:caif_netlink_parms(): no params data found [ 86.400982][ T8431] team0: Port device team_slave_0 added [ 86.420766][ T7] Bluetooth: hci2: command 0x0409 tx timeout [ 86.451503][ T8431] team0: Port device team_slave_1 added [ 86.513031][ T8433] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 86.527504][ T8433] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.577815][ T8433] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 86.590854][ T8437] chnl_net:caif_netlink_parms(): no params data found [ 86.648320][ T8433] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 86.656314][ T8433] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.696152][ T8433] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 86.736348][ T8431] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 86.745315][ T8431] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.785520][ T7] Bluetooth: hci3: command 0x0409 tx timeout [ 86.791326][ T8431] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 86.847131][ T8431] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 86.855406][ T8431] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.885870][ T8431] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 86.903295][ T8433] device hsr_slave_0 entered promiscuous mode [ 86.910427][ T8433] device hsr_slave_1 entered promiscuous mode [ 86.919010][ T8433] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 86.928695][ T8433] Cannot create hsr debugfs directory [ 86.981401][ T7] Bluetooth: hci4: command 0x0409 tx timeout [ 87.044384][ T8435] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.053606][ T8435] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.063773][ T8435] device bridge_slave_0 entered promiscuous mode [ 87.072882][ T8437] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.082674][ T8437] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.092566][ T8437] device bridge_slave_0 entered promiscuous mode [ 87.163886][ T8435] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.197608][ T8435] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.211115][ T8435] device bridge_slave_1 entered promiscuous mode [ 87.237859][ T8437] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.259051][ T8437] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.272114][ T8437] device bridge_slave_1 entered promiscuous mode [ 87.291023][ T8431] device hsr_slave_0 entered promiscuous mode [ 87.297924][ T8431] device hsr_slave_1 entered promiscuous mode [ 87.307175][ T8431] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 87.316112][ T8431] Cannot create hsr debugfs directory [ 87.356088][ T8435] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.370393][ T8435] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.427636][ T8608] chnl_net:caif_netlink_parms(): no params data found [ 87.470472][ T8437] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.497046][ T8437] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.564189][ T8435] team0: Port device team_slave_0 added [ 87.636602][ T8435] team0: Port device team_slave_1 added [ 87.659433][ T8429] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 87.682945][ T8437] team0: Port device team_slave_0 added [ 87.693076][ T8429] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 87.716179][ T8429] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 87.748487][ T8437] team0: Port device team_slave_1 added [ 87.767129][ T8429] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 87.790739][ T3154] Bluetooth: hci5: command 0x0409 tx timeout [ 87.811069][ T8435] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 87.818948][ T8435] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.847987][ T8435] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 87.878991][ T8437] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 87.888459][ T8437] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.922969][ T8437] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 87.953683][ T8435] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 87.960980][ T8435] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.988086][ T8435] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 88.011148][ T8437] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 88.018170][ T8437] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 88.048054][ T3143] Bluetooth: hci0: command 0x041b tx timeout [ 88.057526][ T8437] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 88.165439][ T8435] device hsr_slave_0 entered promiscuous mode [ 88.178672][ T8435] device hsr_slave_1 entered promiscuous mode [ 88.186752][ T8435] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 88.195451][ T8435] Cannot create hsr debugfs directory [ 88.209760][ T8608] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.218259][ T8608] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.227191][ T8608] device bridge_slave_0 entered promiscuous mode [ 88.248560][ T8437] device hsr_slave_0 entered promiscuous mode [ 88.257955][ T8437] device hsr_slave_1 entered promiscuous mode [ 88.266328][ T8437] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 88.270833][ T7] Bluetooth: hci1: command 0x041b tx timeout [ 88.276502][ T8437] Cannot create hsr debugfs directory [ 88.315260][ T8608] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.326714][ T8608] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.336359][ T8608] device bridge_slave_1 entered promiscuous mode [ 88.395051][ T8608] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.435965][ T8608] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.501478][ T19] Bluetooth: hci2: command 0x041b tx timeout [ 88.537137][ T8608] team0: Port device team_slave_0 added [ 88.566532][ T8608] team0: Port device team_slave_1 added [ 88.578035][ T8433] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 88.605175][ T8433] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 88.671903][ T8433] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 88.689369][ T8433] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 88.717740][ T8608] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 88.726564][ T8608] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 88.755541][ T8608] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 88.768805][ T8608] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 88.776504][ T8608] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 88.804396][ T8608] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 88.820907][ T3154] Bluetooth: hci3: command 0x041b tx timeout [ 88.885778][ T8608] device hsr_slave_0 entered promiscuous mode [ 88.894199][ T8608] device hsr_slave_1 entered promiscuous mode [ 88.902179][ T8608] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 88.909770][ T8608] Cannot create hsr debugfs directory [ 88.995661][ T8431] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 89.032691][ T8429] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.044995][ T8431] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 89.062402][ T3143] Bluetooth: hci4: command 0x041b tx timeout [ 89.089445][ T8431] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 89.128152][ T8431] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 89.147890][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.159867][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.172142][ T8429] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.203781][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.215631][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.226836][ T3143] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.234964][ T3143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.267458][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.276744][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.288937][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.298383][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.305991][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.350691][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.360251][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.415097][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.430347][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.447496][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.461556][ T8435] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 89.500218][ T8433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.520319][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.537546][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.550262][ T8435] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 89.584203][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.594562][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.606633][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.618700][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.629536][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.641780][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.651733][ T8435] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 89.663241][ T8435] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 89.685141][ T8433] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.712659][ T8429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.743241][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.754455][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.766538][ T3154] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.781214][ T3154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.818561][ T8437] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 89.845975][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.858817][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.874702][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.881178][ T7] Bluetooth: hci5: command 0x041b tx timeout [ 89.888267][ T4850] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.898957][ T4850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.936932][ T8437] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 89.969051][ T8437] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 90.002669][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.020238][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.037323][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.049806][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.059952][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.069321][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.079354][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.088289][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.101409][ T7] Bluetooth: hci0: command 0x040f tx timeout [ 90.132504][ T8437] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 90.165994][ T8433] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 90.188817][ T8433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.203005][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.218209][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.237043][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.246769][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.256533][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.315821][ T8429] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.340832][ T7] Bluetooth: hci1: command 0x040f tx timeout [ 90.367754][ T8431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.403805][ T8608] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 90.428601][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.444750][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.477276][ T8608] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 90.496890][ T8608] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 90.525586][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.535871][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.548299][ T8431] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.580931][ T7] Bluetooth: hci2: command 0x040f tx timeout [ 90.582099][ T8433] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.599470][ T8608] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 90.618298][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.628663][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.676521][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.686323][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.697940][ T4850] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.706076][ T4850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.715112][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.724844][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.733857][ T4850] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.741118][ T4850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.757460][ T8429] device veth0_vlan entered promiscuous mode [ 90.779849][ T8435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.809802][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.819113][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.828828][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.839265][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.848834][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.900975][ T7] Bluetooth: hci3: command 0x040f tx timeout [ 90.914947][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.931305][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.939280][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.971831][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.991209][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.000258][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.012397][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.020142][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.029639][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 91.038779][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.049321][ T8429] device veth1_vlan entered promiscuous mode [ 91.087408][ T8435] 8021q: adding VLAN 0 to HW filter on device team0 [ 91.095215][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.104705][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.115979][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.124797][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.134032][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.152351][ T5] Bluetooth: hci4: command 0x040f tx timeout [ 91.175513][ T8431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.191002][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.199831][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.209010][ T3154] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.216184][ T3154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.225634][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.246475][ T8437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.282863][ T8433] device veth0_vlan entered promiscuous mode [ 91.292246][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 91.301390][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.309966][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.319352][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.328675][ T3154] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.335847][ T3154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.344213][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.352277][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.394942][ T8431] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.407817][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.417161][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.426183][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 91.435858][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.444774][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.457857][ T8429] device veth0_macvtap entered promiscuous mode [ 91.475346][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 91.487944][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.506508][ T8433] device veth1_vlan entered promiscuous mode [ 91.523014][ T8429] device veth1_macvtap entered promiscuous mode [ 91.557035][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 91.565878][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 91.575544][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 91.584390][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.595265][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.604677][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.613518][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.624104][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.638378][ T8437] 8021q: adding VLAN 0 to HW filter on device team0 [ 91.680713][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.689507][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.702127][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.712037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.748222][ T8435] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.770206][ T8435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.788871][ T8429] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 91.797453][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 91.810743][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.819352][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.828315][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.838147][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.845302][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.853629][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.863016][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.871962][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 91.881571][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.910232][ T8608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.935083][ T8429] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 91.944084][ T3143] Bluetooth: hci5: command 0x040f tx timeout [ 91.953742][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.962200][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 91.974124][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.986044][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 91.997972][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.053444][ T8433] device veth0_macvtap entered promiscuous mode [ 92.067627][ T8429] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.078641][ T8429] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.089120][ T8429] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.101541][ T8429] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.115847][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 92.128233][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.138383][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.149075][ T3143] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.156278][ T3143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.164843][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 92.172768][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 92.180289][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.188777][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.206229][ T8433] device veth1_macvtap entered promiscuous mode [ 92.217671][ T7] Bluetooth: hci0: command 0x0419 tx timeout [ 92.223664][ T8608] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.254726][ T8435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 92.267070][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.277588][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 92.287109][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.296110][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.304534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.343795][ T8431] device veth0_vlan entered promiscuous mode [ 92.377602][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.387059][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.396983][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.404213][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.413478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.430811][ T3143] Bluetooth: hci1: command 0x0419 tx timeout [ 92.489832][ T8433] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.501859][ T8433] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.513890][ T8433] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 92.526629][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.535868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.545620][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.556941][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.564187][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.573478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.583413][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 92.593357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.603373][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.613023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.622971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.632525][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.641917][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.650284][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.659409][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.669032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.693794][ T7] Bluetooth: hci2: command 0x0419 tx timeout [ 92.725387][ T8437] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 92.738236][ T8437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.759581][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.771453][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.785398][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.794599][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.804705][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.813811][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.858449][ T8433] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 92.874204][ T8433] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.887321][ T8433] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 92.896929][ T8431] device veth1_vlan entered promiscuous mode [ 92.907144][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 92.918134][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.927175][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.937753][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.947483][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 92.967617][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.993388][ T5] Bluetooth: hci3: command 0x0419 tx timeout [ 93.035368][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 93.044076][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.058147][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.067888][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.076733][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.087814][ T8433] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.112096][ T8433] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.127450][ T8433] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.137711][ T8433] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.153452][ T8608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 93.172048][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.179606][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.205278][ T142] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.222542][ T5] Bluetooth: hci4: command 0x0419 tx timeout [ 93.226946][ T142] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.260334][ T8435] device veth0_vlan entered promiscuous mode [ 93.288724][ T8437] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.296626][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 93.305843][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 93.315783][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.358739][ T8431] device veth0_macvtap entered promiscuous mode [ 93.382220][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.390280][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.401903][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.412353][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.438608][ T48] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.449051][ T48] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.466750][ T8431] device veth1_macvtap entered promiscuous mode [ 93.510224][ T8608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.524795][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 93.542180][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.550821][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 93.560580][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.568111][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.583001][ T8435] device veth1_vlan entered promiscuous mode [ 93.726353][ T199] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.731975][ T8431] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.754745][ T199] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.770504][ T8431] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.780346][ T8431] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.823342][ T8431] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.844931][ C0] hrtimer: interrupt took 25773 ns [ 93.862451][ T8431] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 93.915659][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 93.943460][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 93.992987][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 94.011387][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.023756][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.032842][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 94.075277][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.087183][ T4850] Bluetooth: hci5: command 0x0419 tx timeout [ 94.113884][ T8431] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.129646][ T8431] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.143221][ T8431] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.154601][ T8431] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.169666][ T8431] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 94.181700][ T8435] device veth0_macvtap entered promiscuous mode [ 94.202425][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.239511][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 08:33:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 94.303901][ T199] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 94.323949][ T8435] device veth1_macvtap entered promiscuous mode [ 94.339774][ T199] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 94.349656][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 94.367859][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.393756][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 94.408925][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 94.420236][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.461705][ T8431] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.470450][ T8431] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.508707][ T8431] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.527021][ T8431] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.625748][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 94.641852][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.658522][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 94.681567][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.713790][ T8608] device veth0_vlan entered promiscuous mode [ 94.798866][ T8435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 08:33:49 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) [ 94.842041][ T8435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.880736][ T8435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.918662][ T8435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.950753][ T8435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.990685][ T8435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.035480][ T8435] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 95.057349][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.078209][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 08:33:49 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) [ 95.112651][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.146308][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.201632][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.210292][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 08:33:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 95.246250][ T8437] device veth0_vlan entered promiscuous mode [ 95.296519][ T8435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 95.336437][ T8435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.356218][ T8435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 95.377685][ T8435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.398001][ T8435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 95.439996][ T8435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.465036][ T8435] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 95.504226][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.543677][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 08:33:49 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) [ 95.562647][ T8608] device veth1_vlan entered promiscuous mode [ 95.574693][ T8437] device veth1_vlan entered promiscuous mode [ 95.676270][ T8435] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.696383][ T8435] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 08:33:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 95.760583][ T8435] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.769780][ T8435] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.840286][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 95.872254][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 96.009232][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 96.158831][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 96.191509][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 96.231198][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 96.272289][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 96.309297][ T8608] device veth0_macvtap entered promiscuous mode [ 96.644403][ T8437] device veth0_macvtap entered promiscuous mode 08:33:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 96.693692][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 96.721565][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 96.743895][ T8608] device veth1_macvtap entered promiscuous mode [ 96.769453][ T294] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 96.783473][ T8437] device veth1_macvtap entered promiscuous mode [ 96.804526][ T294] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 96.912570][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 96.990329][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.027063][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.052023][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.071455][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.084184][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.095633][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.106270][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.123717][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.173759][ T8437] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 97.205224][ T199] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.214828][ T8608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.229943][ T199] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.238302][ T8608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.255633][ T8608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.267723][ T8608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.278388][ T8608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.290751][ T8608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.301957][ T8608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.328869][ T8608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.352684][ T8608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.399078][ T8608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.411949][ T8608] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 97.423124][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.434863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.463115][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 97.472958][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.482795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.513732][ T8608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.556315][ T8608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.620907][ T8608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.642294][ T8608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.662109][ T8608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.684604][ T8608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.709359][ T8608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.725654][ T8608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.740513][ T8608] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.789682][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.807570][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.819623][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.834306][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.846072][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.857618][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.875021][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.893389][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.913400][ T8437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.926697][ T8437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.949680][ T8437] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.986852][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.998763][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 98.014613][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 98.027790][ T9738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 98.043956][ T8608] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.059908][ T8608] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.073355][ T8608] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.085968][ T8608] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.132786][ T8437] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.141732][ T8437] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.150468][ T8437] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.159267][ T8437] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.183751][ T294] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.207008][ T294] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 98.263820][ T4850] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 98.397860][ T48] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.420154][ T48] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 98.494100][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.507977][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 98.522147][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 98.547847][ T199] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.556532][ T9732] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 98.560641][ T199] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 98.645829][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 98.657652][ T199] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.668089][ T9885] orangefs_mount: mount request failed with -4 [ 98.688259][ T199] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 08:33:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$pvfs2(&(0x7f0000000280)='pvfs2\x00', &(0x7f00000002c0)='.\x00', 0x0, 0x1, &(0x7f00000014c0)=[{0x0}], 0x0, &(0x7f0000001600)) 08:33:53 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 98.717199][ T9694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:33:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="224f73f3", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x6d, &(0x7f0000000300)={r1}, &(0x7f0000000340)=0x8) 08:33:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 99.751627][ T9944] orangefs_mount: mount request failed with -4 08:33:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="224f73f3", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x6d, &(0x7f0000000300)={r1}, &(0x7f0000000340)=0x8) 08:33:54 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x3, 0x0, 0x0) connect$phonet_pipe(r0, &(0x7f0000000040), 0x10) 08:33:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$pvfs2(&(0x7f0000000280)='pvfs2\x00', &(0x7f00000002c0)='.\x00', 0x0, 0x1, &(0x7f00000014c0)=[{0x0}], 0x0, &(0x7f0000001600)) 08:33:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="224f73f3", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x6d, &(0x7f0000000300)={r1}, &(0x7f0000000340)=0x8) 08:33:55 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x3, 0x0, 0x0) connect$phonet_pipe(r0, &(0x7f0000000040), 0x10) 08:33:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="224f73f3", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x6d, &(0x7f0000000300)={r1}, &(0x7f0000000340)=0x8) 08:33:55 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x3, 0x0, 0x0) connect$phonet_pipe(r0, &(0x7f0000000040), 0x10) 08:33:55 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x3, 0x0, 0x0) connect$phonet_pipe(r0, &(0x7f0000000040), 0x10) 08:33:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="224f73f3", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x6d, &(0x7f0000000300)={r1}, &(0x7f0000000340)=0x8) [ 101.542275][ T9985] orangefs_mount: mount request failed with -4 08:33:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$pvfs2(&(0x7f0000000280)='pvfs2\x00', &(0x7f00000002c0)='.\x00', 0x0, 0x1, &(0x7f00000014c0)=[{0x0}], 0x0, &(0x7f0000001600)) 08:33:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:56 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x3, 0x0, 0x0) connect$phonet_pipe(r0, &(0x7f0000000040), 0x10) 08:33:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="224f73f3", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x6d, &(0x7f0000000300)={r1}, &(0x7f0000000340)=0x8) 08:33:56 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x3, 0x0, 0x0) connect$phonet_pipe(r0, &(0x7f0000000040), 0x10) 08:33:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 102.743087][T10025] orangefs_mount: mount request failed with -4 08:33:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:33:57 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:33:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:33:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) [ 104.762162][ T36] audit: type=1804 audit(1612254839.015:2): pid=10099 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir364324009/syzkaller.Wt0isj/4/cgroup.controllers" dev="sda1" ino=15774 res=1 errno=0 [ 104.855471][T10099] mmap: syz-executor.5 (10099) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 08:33:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:33:59 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:33:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:33:59 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:33:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 105.653191][ T36] audit: type=1804 audit(1612254839.915:3): pid=10115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir364324009/syzkaller.Wt0isj/5/cgroup.controllers" dev="sda1" ino=15738 res=1 errno=0 08:34:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 105.966256][ T36] audit: type=1804 audit(1612254840.225:4): pid=10119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir444030899/syzkaller.EVd0ft/11/cgroup.controllers" dev="sda1" ino=15792 res=1 errno=0 08:34:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:34:01 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:01 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:01 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) [ 107.249766][ T36] audit: type=1804 audit(1612254841.505:5): pid=10147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir364324009/syzkaller.Wt0isj/6/cgroup.controllers" dev="sda1" ino=15780 res=1 errno=0 [ 107.388033][ T36] audit: type=1804 audit(1612254841.645:6): pid=10155 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir444030899/syzkaller.EVd0ft/12/cgroup.controllers" dev="sda1" ino=15777 res=1 errno=0 [ 107.729754][ T36] audit: type=1804 audit(1612254841.985:7): pid=10160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir542293217/syzkaller.2uYHGN/10/cgroup.controllers" dev="sda1" ino=15794 res=1 errno=0 08:34:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x8020, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'vlan1\x00'}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080), 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20004804060006004e220000060006004e24000008000700070000", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 08:34:02 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:02 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:02 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:02 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) [ 108.726501][ T36] audit: type=1804 audit(1612254842.985:8): pid=10175 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir364324009/syzkaller.Wt0isj/7/cgroup.controllers" dev="sda1" ino=15773 res=1 errno=0 [ 109.133435][ T36] audit: type=1804 audit(1612254843.375:9): pid=10185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir444030899/syzkaller.EVd0ft/13/cgroup.controllers" dev="sda1" ino=15801 res=1 errno=0 08:34:03 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:03 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:03 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:04 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) [ 109.897143][ T36] audit: type=1804 audit(1612254844.155:10): pid=10196 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir515243807/syzkaller.B7qaa4/11/cgroup.controllers" dev="sda1" ino=15774 res=1 errno=0 [ 110.163797][ T36] audit: type=1804 audit(1612254844.255:11): pid=10202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir364324009/syzkaller.Wt0isj/8/cgroup.controllers" dev="sda1" ino=15765 res=1 errno=0 08:34:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) [ 110.563653][ T36] audit: type=1804 audit(1612254844.275:12): pid=10201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir542293217/syzkaller.2uYHGN/12/cgroup.controllers" dev="sda1" ino=15795 res=1 errno=0 08:34:05 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:05 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) [ 110.823166][ T36] audit: type=1804 audit(1612254844.495:13): pid=10209 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir444030899/syzkaller.EVd0ft/14/cgroup.controllers" dev="sda1" ino=15797 res=1 errno=0 08:34:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:05 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) [ 111.143658][ T36] audit: type=1804 audit(1612254845.405:14): pid=10222 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir515243807/syzkaller.B7qaa4/12/cgroup.controllers" dev="sda1" ino=15774 res=1 errno=0 08:34:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) [ 111.492592][ T36] audit: type=1804 audit(1612254845.465:15): pid=10235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir364324009/syzkaller.Wt0isj/9/cgroup.controllers" dev="sda1" ino=15807 res=1 errno=0 [ 111.727797][ T36] audit: type=1804 audit(1612254845.985:16): pid=10240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir444030899/syzkaller.EVd0ft/15/cgroup.controllers" dev="sda1" ino=15797 res=1 errno=0 08:34:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:06 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:06 executing program 2: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000004c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x10010, &(0x7f00000001c0)=ANY=[]) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) sync() 08:34:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:06 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, 0x0, 0xec0, &(0x7f0000006300)=[{0x10}], 0x10}}], 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a30000000000800034000000001"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, 0x0) remap_file_pages(&(0x7f0000281000/0x1000)=nil, 0x1000, 0x0, 0x1f, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) 08:34:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @loopback}, 0x10) 08:34:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) [ 112.440976][T10266] loop2: detected capacity change from 270 to 0 08:34:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff7, 0x11, r2, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 112.562606][ T36] audit: type=1804 audit(1612254846.825:17): pid=10259 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir364324009/syzkaller.Wt0isj/10/cgroup.controllers" dev="sda1" ino=15801 res=1 errno=0 08:34:07 executing program 2: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000004c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x10010, &(0x7f00000001c0)=ANY=[]) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) sync() [ 112.722164][T10279] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 08:34:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2}}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff66) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() r8 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38}, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x180, 0x6, 0x9, 0x401, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x5}, [@generic="0856587ee855826a690797c4c4d0b0214f3702596429bfbf4c077c6071940b7a537bc2f7fb1b5d65e42b448b8e3ff9e6784b9a3f2a506655f9fc745adb702eb8346fdb2840940fa5d391174d6717d7e1a5eea09cdc293511d00d12b229a4a177cb0ae72cfd0cda3c884b1f7d824c8a7dee2f96c95f056eba7a8aef598daf307990917b44678b9518f5aec58a2b6be5f717ded2a5e1ad94a66de105cb675210", @nested={0xad, 0x45, 0x0, 0x1, [@generic="c4ab327b4078710652fc0ac7091757a7ed9e925f2f2b88dc04dc45c2f17677c6e2", @typed={0xc, 0x42, 0x0, 0x0, @str='ip6gre0\x00'}, @generic="d2d023728b4669c3ce6dc0c7f7c91fee7cd9a0dbbeec8f4123e04a07e1502a459521df5a237064f1481e7eb932f05442d9b9cf278b9d3c5615305d25fbda801f78b00366f287c16dec4f1b", @typed={0x8, 0x71, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @fd=r3}, @typed={0x4, 0x7}, @generic="a53d17c4d774be5076945e6c0664376e366a3267b1", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x200}]}, @typed={0x7, 0x40, 0x0, 0x0, @str='%{\x00'}, @typed={0x8, 0x84, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x27}]}, 0x180}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)='-', 0x9101}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0x38}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_forget\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r10, 0x0, 0x8, &(0x7f0000000100)='ip6gre0\x00'}, 0x30) 08:34:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000004c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x10010, &(0x7f00000001c0)=ANY=[]) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) sync() [ 112.946423][ T36] audit: type=1804 audit(1612254847.205:18): pid=10290 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir444030899/syzkaller.EVd0ft/16/cgroup.controllers" dev="sda1" ino=15804 res=1 errno=0 [ 113.042797][T10293] loop2: detected capacity change from 270 to 0 08:34:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) [ 113.149613][T10297] loop1: detected capacity change from 270 to 0 08:34:07 executing program 2: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000004c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x10010, &(0x7f00000001c0)=ANY=[]) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) sync() 08:34:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6d, &(0x7f0000000140)="0af25d55000000000030931a3ad89631000001f6f65a46debdc329856ad8b094da287749a676177faf8efb778f1951bc3690786d9b963e554531cca77562c294b24e19d3d43257fc4a34fe112c66b42cb75ce5da983cd540ab699c1531d049afe379307b7f7e142850d12f5a3e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 08:34:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000004c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x10010, &(0x7f00000001c0)=ANY=[]) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) sync() [ 113.403366][T10308] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 113.425858][T10313] loop2: detected capacity change from 270 to 0 [ 113.586041][T10327] loop1: detected capacity change from 270 to 0 [ 113.684424][T10308] device syzkaller1 entered promiscuous mode 08:34:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000004c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x10010, &(0x7f00000001c0)=ANY=[]) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) sync() 08:34:08 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000280)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4703afbe"}, 0x0, 0x0, @userptr, 0x7f}) 08:34:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6d, &(0x7f0000000140)="0af25d55000000000030931a3ad89631000001f6f65a46debdc329856ad8b094da287749a676177faf8efb778f1951bc3690786d9b963e554531cca77562c294b24e19d3d43257fc4a34fe112c66b42cb75ce5da983cd540ab699c1531d049afe379307b7f7e142850d12f5a3e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 08:34:08 executing program 2: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000004c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x10010, &(0x7f00000001c0)=ANY=[]) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) sync() 08:34:08 executing program 0: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000880)) 08:34:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6d, &(0x7f0000000140)="0af25d55000000000030931a3ad89631000001f6f65a46debdc329856ad8b094da287749a676177faf8efb778f1951bc3690786d9b963e554531cca77562c294b24e19d3d43257fc4a34fe112c66b42cb75ce5da983cd540ab699c1531d049afe379307b7f7e142850d12f5a3e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 08:34:08 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000280)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4703afbe"}, 0x0, 0x0, @userptr, 0x7f}) [ 114.007245][T10342] loop2: detected capacity change from 270 to 0 [ 114.029700][T10343] loop1: detected capacity change from 270 to 0 08:34:08 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) [ 114.453060][T10369] IPVS: ftp: loaded support on port[0] = 21 [ 114.479165][T10365] device syzkaller1 entered promiscuous mode 08:34:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6d, &(0x7f0000000140)="0af25d55000000000030931a3ad89631000001f6f65a46debdc329856ad8b094da287749a676177faf8efb778f1951bc3690786d9b963e554531cca77562c294b24e19d3d43257fc4a34fe112c66b42cb75ce5da983cd540ab699c1531d049afe379307b7f7e142850d12f5a3e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 08:34:09 executing program 0: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000880)) 08:34:09 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000280)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4703afbe"}, 0x0, 0x0, @userptr, 0x7f}) 08:34:09 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 08:34:09 executing program 0: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000880)) 08:34:09 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 08:34:09 executing program 4: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 08:34:09 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000280)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4703afbe"}, 0x0, 0x0, @userptr, 0x7f}) 08:34:09 executing program 0: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000880)) 08:34:09 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) [ 115.378975][T10410] device syzkaller1 entered promiscuous mode 08:34:09 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) [ 115.728605][T10428] IPVS: ftp: loaded support on port[0] = 21 08:34:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:10 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) 08:34:10 executing program 4: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 08:34:10 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 08:34:10 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) [ 116.349163][T10458] IPVS: ftp: loaded support on port[0] = 21 08:34:10 executing program 4: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) [ 116.423520][T10454] device syzkaller1 entered promiscuous mode [ 116.596596][T10480] IPVS: ftp: loaded support on port[0] = 21 08:34:11 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) [ 116.775057][T10472] device syzkaller1 entered promiscuous mode 08:34:11 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) [ 116.898134][T10490] IPVS: ftp: loaded support on port[0] = 21 [ 117.045742][T10493] IPVS: ftp: loaded support on port[0] = 21 08:34:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) [ 119.418107][T10540] device syzkaller1 entered promiscuous mode [ 119.528919][T10549] device syzkaller1 entered promiscuous mode 08:34:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) [ 121.960234][T10567] device syzkaller1 entered promiscuous mode [ 122.111701][T10571] device syzkaller1 entered promiscuous mode 08:34:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) [ 124.411185][T10584] device syzkaller1 entered promiscuous mode 08:34:20 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) 08:34:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:20 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) 08:34:20 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) 08:34:20 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) [ 126.438859][T10605] IPVS: ftp: loaded support on port[0] = 21 [ 126.464146][T10606] IPVS: ftp: loaded support on port[0] = 21 [ 126.475878][T10608] IPVS: ftp: loaded support on port[0] = 21 [ 126.551468][T10618] IPVS: ftp: loaded support on port[0] = 21 [ 126.574772][T10607] device syzkaller1 entered promiscuous mode [ 127.676563][T10619] device syzkaller1 entered promiscuous mode 08:34:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) [ 128.185505][T10695] device syzkaller1 entered promiscuous mode [ 128.303823][T10712] device syzkaller1 entered promiscuous mode 08:34:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) [ 129.454667][T10749] device syzkaller1 entered promiscuous mode [ 129.655107][T10758] device syzkaller1 entered promiscuous mode 08:34:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000000019386dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 08:34:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000240)={0xa, 0x4e21, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x39, {0x0, 0x2, 0x2, 0x1, 0x0, [@dev]}}}], 0x28}, 0x0) [ 131.944015][T10768] device syzkaller1 entered promiscuous mode 08:34:29 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) 08:34:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000240)={0xa, 0x4e21, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x39, {0x0, 0x2, 0x2, 0x1, 0x0, [@dev]}}}], 0x28}, 0x0) 08:34:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r1, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000040)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) 08:34:29 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) 08:34:29 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x1000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x8a, [0x6300]}, &(0x7f0000000100)=0x54) open(&(0x7f0000000000)='./file0\x00', 0x4841, 0x31) mmap(&(0x7f00008c7000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0xe31d0000) 08:34:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CHAR_RAW_IOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000100)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x10, 0x2, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x58, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "f7de41aae91ec981b7b3bf9e8d"}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_IDX={0x5}]}, @NL80211_ATTR_MAC={0xa}]}, 0x58}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f0000000480)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x28, r3, 0x400, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x80000001, 0x55}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x37cd16b65f16c12a) statx(r2, &(0x7f00000004c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) connect$packet(r1, &(0x7f00000002c0)={0x11, 0xf5, r7, 0x1, 0x1, 0x6, @local}, 0x14) listen(r0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r8, &(0x7f00000000c0)=[{&(0x7f00000003c0)="580000001400192340834b80040d8c5602067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100060c1000000000", 0x53}, {&(0x7f0000000180)="fab88c976351807ba17b3f3c9d6cc2acdd189896e48d2a52ac67df5090b9718b01dd7329de667f571e9c86fad10e165072b4a97f8dd9f3ec8441350257ed6dc5bc312eb9189218f5a7a4b0131dae5d856aa20a7390ebf362", 0x58}, {&(0x7f0000000240)="f7227dd1d5e79961f2eeb403279565ca40f86b3c6f678fcce8ac3382ce51577102a38def6acc415372ba831c16fa1fe6e8613935831611862c14d46478e3990a407dc80bbb61801c7bf155ec5042b5102f572c4c662e5dd9f92b1455cdb4f9435954eb3264435b21cb9a562169177ea2e94977dd84ff204f80763120", 0x7c}, {&(0x7f0000000000)="ad0304066a1d2763379a2b9248e6dac1b52b09969cd0d13bfd9ca446b87519de77c64a9132ca3a194e0a4ae4ffe6d280c43efe7dd6ad7a6a0a01fd63a96fdf0f31d0abcdcefdd1ffe4163383c5dbe8cab80b9f767b5aba8ef5f433641962e98a983443047e05f2e5a2969a3841", 0x6d}], 0x4) 08:34:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000240)={0xa, 0x4e21, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x39, {0x0, 0x2, 0x2, 0x1, 0x0, [@dev]}}}], 0x28}, 0x0) [ 135.080201][T10786] ================================================================== [ 135.089205][T10786] BUG: KASAN: use-after-free in uprobe_munmap+0x485/0x560 [ 135.097369][T10786] Read of size 8 at addr ffff8880122bcd68 by task syz-executor.3/10786 [ 135.105996][T10786] [ 135.108337][T10786] CPU: 0 PID: 10786 Comm: syz-executor.3 Not tainted 5.11.0-rc6-next-20210201-syzkaller #0 [ 135.119088][T10786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.129984][T10786] Call Trace: [ 135.133306][T10786] dump_stack+0x107/0x163 [ 135.138401][T10786] ? uprobe_munmap+0x485/0x560 [ 135.143295][T10786] ? uprobe_munmap+0x485/0x560 [ 135.145044][T10788] IPVS: ftp: loaded support on port[0] = 21 [ 135.148106][T10786] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 135.161691][T10786] ? uprobe_munmap+0x485/0x560 [ 135.166507][T10786] ? uprobe_munmap+0x485/0x560 [ 135.171412][T10786] kasan_report.cold+0x7c/0xd8 [ 135.176229][T10786] ? uprobe_munmap+0x485/0x560 [ 135.181021][T10786] uprobe_munmap+0x485/0x560 [ 135.185994][T10786] unmap_single_vma+0xe9/0x300 [ 135.190797][T10786] unmap_vmas+0x168/0x2e0 [ 135.195182][T10786] ? zap_vma_ptes+0x100/0x100 [ 135.199899][T10786] unmap_region+0x231/0x380 [ 135.204446][T10786] ? init_admin_reserve+0xb0/0xb0 [ 135.209514][T10786] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 135.215292][T10786] ? __vma_rb_erase+0x775/0xfa0 [ 135.220188][T10786] __do_munmap+0x661/0x11a0 [ 135.224744][T10786] mmap_region+0x85a/0x1730 [ 135.229632][T10786] ? get_unmapped_area+0x2ae/0x3d0 [ 135.234783][T10786] do_mmap+0xcff/0x11d0 [ 135.239332][T10786] vm_mmap_pgoff+0x1b7/0x290 [ 135.243991][T10786] ? randomize_stack_top+0x100/0x100 [ 135.249515][T10786] ? __fget_files+0x288/0x3d0 [ 135.258108][T10786] ksys_mmap_pgoff+0x49c/0x620 [ 135.263346][T10786] ? mlock_future_check+0x120/0x120 [ 135.268617][T10786] ? syscall_enter_from_user_mode+0x1d/0x50 [ 135.274663][T10786] do_syscall_64+0x2d/0x70 [ 135.279119][T10786] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.285041][T10786] RIP: 0033:0x465b09 [ 135.288957][T10786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 135.319269][T10786] RSP: 002b:00007f2f2e91f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 135.327756][T10786] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 [ 135.335754][T10786] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 0000000020005000 [ 135.343860][T10786] RBP: 00000000004b069f R08: 0000000000000003 R09: 0000000000000000 [ 135.352657][T10786] R10: 0000000000002812 R11: 0000000000000246 R12: 000000000056bf60 [ 135.360852][T10786] R13: 00007ffd4afd5d3f R14: 00007f2f2e91f300 R15: 0000000000022000 [ 135.368870][T10786] [ 135.371236][T10786] Allocated by task 10786: [ 135.375682][T10786] kasan_save_stack+0x1b/0x40 [ 135.382647][T10786] ____kasan_kmalloc.constprop.0+0xa0/0xd0 [ 135.388492][T10786] __uprobe_register+0x19c/0x850 [ 135.393499][T10786] probe_event_enable+0x357/0xa00 [ 135.400740][T10786] trace_uprobe_register+0x443/0x880 [ 135.408136][T10786] perf_trace_event_init+0x549/0xa20 [ 135.413644][T10786] perf_uprobe_init+0x16f/0x210 [ 135.418621][T10786] perf_uprobe_event_init+0xff/0x1c0 [ 135.423936][T10786] perf_try_init_event+0x12a/0x560 [ 135.429079][T10786] perf_event_alloc.part.0+0xe3b/0x3960 [ 135.434780][T10786] __do_sys_perf_event_open+0x647/0x2e60 [ 135.453674][T10786] do_syscall_64+0x2d/0x70 [ 135.458150][T10786] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.464622][T10786] [ 135.466987][T10786] Freed by task 10786: [ 135.471066][T10786] kasan_save_stack+0x1b/0x40 [ 135.475766][T10786] kasan_set_track+0x1c/0x30 [ 135.480469][T10786] kasan_set_free_info+0x20/0x30 [ 135.485517][T10786] ____kasan_slab_free.part.0+0xe1/0x110 [ 135.491197][T10786] slab_free_freelist_hook+0x82/0x1d0 [ 135.496688][T10786] kfree+0xe5/0x7b0 [ 135.500527][T10786] put_uprobe+0x13b/0x190 [ 135.504902][T10786] uprobe_apply+0xfc/0x130 [ 135.509345][T10786] trace_uprobe_register+0x5c9/0x880 [ 135.514661][T10786] perf_trace_event_init+0x17a/0xa20 [ 135.519983][T10786] perf_uprobe_init+0x16f/0x210 [ 135.525056][T10786] perf_uprobe_event_init+0xff/0x1c0 [ 135.530637][T10786] perf_try_init_event+0x12a/0x560 [ 135.535901][T10786] perf_event_alloc.part.0+0xe3b/0x3960 [ 135.541488][T10786] __do_sys_perf_event_open+0x647/0x2e60 [ 135.547198][T10786] do_syscall_64+0x2d/0x70 [ 135.551678][T10786] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.557633][T10786] [ 135.559978][T10786] The buggy address belongs to the object at ffff8880122bcc00 [ 135.559978][T10786] which belongs to the cache kmalloc-512 of size 512 [ 135.574423][T10786] The buggy address is located 360 bytes inside of [ 135.574423][T10786] 512-byte region [ffff8880122bcc00, ffff8880122bce00) [ 135.589668][T10786] The buggy address belongs to the page: [ 135.595441][T10786] page:000000003ebf5df6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x122bc [ 135.606105][T10786] head:000000003ebf5df6 order:1 compound_mapcount:0 [ 135.617519][T10786] flags: 0xfff00000010200(slab|head) [ 135.622864][T10786] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff888010841c80 [ 135.636965][T10786] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 135.648440][T10786] page dumped because: kasan: bad access detected [ 135.655132][T10786] [ 135.657496][T10786] Memory state around the buggy address: [ 135.663143][T10786] ffff8880122bcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 135.671234][T10786] ffff8880122bcc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 135.689312][T10786] >ffff8880122bcd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 135.699144][T10786] ^ [ 135.707149][T10786] ffff8880122bcd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 135.715377][T10786] ffff8880122bce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 135.723449][T10786] ================================================================== [ 135.733634][T10786] Disabling lock debugging due to kernel taint [ 135.744487][T10786] Kernel panic - not syncing: panic_on_warn set ... [ 135.751129][T10786] CPU: 0 PID: 10786 Comm: syz-executor.3 Tainted: G B 5.11.0-rc6-next-20210201-syzkaller #0 [ 135.763132][T10786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.774193][T10786] Call Trace: [ 135.777511][T10786] dump_stack+0x107/0x163 [ 135.781877][T10786] ? uprobe_munmap+0x410/0x560 [ 135.786778][T10786] panic+0x306/0x73d [ 135.790711][T10786] ? __warn_printk+0xf3/0xf3 [ 135.797456][T10786] ? uprobe_munmap+0x485/0x560 [ 135.802420][T10786] ? trace_hardirqs_on+0x38/0x1c0 [ 135.807732][T10786] ? trace_hardirqs_on+0x51/0x1c0 [ 135.813130][T10786] ? uprobe_munmap+0x485/0x560 [ 135.817923][T10786] ? uprobe_munmap+0x485/0x560 [ 135.823343][T10786] end_report.cold+0x5a/0x5a [ 135.828105][T10786] kasan_report.cold+0x6a/0xd8 [ 135.833167][T10786] ? uprobe_munmap+0x485/0x560 [ 135.837953][T10786] uprobe_munmap+0x485/0x560 [ 135.843348][T10786] unmap_single_vma+0xe9/0x300 [ 135.848149][T10786] unmap_vmas+0x168/0x2e0 [ 135.852667][T10786] ? zap_vma_ptes+0x100/0x100 [ 135.857364][T10786] unmap_region+0x231/0x380 [ 135.861996][T10786] ? init_admin_reserve+0xb0/0xb0 [ 135.867305][T10786] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 135.873247][T10786] ? __vma_rb_erase+0x775/0xfa0 [ 135.878122][T10786] __do_munmap+0x661/0x11a0 [ 135.882918][T10786] mmap_region+0x85a/0x1730 [ 135.887442][T10786] ? get_unmapped_area+0x2ae/0x3d0 [ 135.892668][T10786] do_mmap+0xcff/0x11d0 [ 135.896842][T10786] vm_mmap_pgoff+0x1b7/0x290 [ 135.898813][T10791] IPVS: ftp: loaded support on port[0] = 21 [ 135.901568][T10786] ? randomize_stack_top+0x100/0x100 [ 135.901601][T10786] ? __fget_files+0x288/0x3d0 [ 135.901626][T10786] ksys_mmap_pgoff+0x49c/0x620 [ 135.901660][T10786] ? mlock_future_check+0x120/0x120 [ 135.901688][T10786] ? syscall_enter_from_user_mode+0x1d/0x50 [ 135.962870][T10786] do_syscall_64+0x2d/0x70 [ 135.967324][T10786] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.973235][T10786] RIP: 0033:0x465b09 [ 135.977140][T10786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 135.996786][T10786] RSP: 002b:00007f2f2e91f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 136.005227][T10786] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 [ 136.013211][T10786] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 0000000020005000 [ 136.021197][T10786] RBP: 00000000004b069f R08: 0000000000000003 R09: 0000000000000000 [ 136.029705][T10786] R10: 0000000000002812 R11: 0000000000000246 R12: 000000000056bf60 [ 136.037683][T10786] R13: 00007ffd4afd5d3f R14: 00007f2f2e91f300 R15: 0000000000022000 [ 136.046307][T10786] Kernel Offset: disabled [ 136.050691][T10786] Rebooting in 86400 seconds..