Warning: Permanently added '10.128.10.44' (ECDSA) to the list of known hosts. 2020/08/06 16:36:19 fuzzer started 2020/08/06 16:36:19 dialing manager at 10.128.0.105:34051 2020/08/06 16:36:19 syscalls: 3273 2020/08/06 16:36:19 code coverage: enabled 2020/08/06 16:36:19 comparison tracing: enabled 2020/08/06 16:36:19 extra coverage: enabled 2020/08/06 16:36:19 setuid sandbox: enabled 2020/08/06 16:36:19 namespace sandbox: enabled 2020/08/06 16:36:19 Android sandbox: /sys/fs/selinux/policy does not exist 2020/08/06 16:36:19 fault injection: enabled 2020/08/06 16:36:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/08/06 16:36:19 net packet injection: enabled 2020/08/06 16:36:19 net device setup: enabled 2020/08/06 16:36:19 concurrency sanitizer: enabled 2020/08/06 16:36:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/08/06 16:36:19 USB emulation: enabled 2020/08/06 16:36:19 hci packet injection: enabled 2020/08/06 16:36:23 suppressing KCSAN reports in functions: 'expire_timers' 'do_syslog' 'do_nanosleep' 'dentry_lru_isolate_shrink' 'do_signal_stop' 'snd_rawmidi_transmit' 'audit_log_start' 'wbt_done' '__ext4_update_other_inode_time' 'complete_signal' '__xa_clear_mark' 'dd_has_work' 'ext4_mb_regular_allocator' '__mod_timer' 'blk_mq_request_bypass_insert' 'do_exit' 'dst_cache_set_ip6' 'pcpu_alloc' 'futex_wait_queue_me' '__ext4_new_inode' 'generic_write_end' 'blk_mq_sched_dispatch_requests' 'do_sys_poll' 'kauditd_thread' 'lookup_fast' 'wg_packet_decrypt_worker' 'shmem_add_to_page_cache' 'page_counter_charge' 'xas_clear_mark' 'tick_sched_timer' '__add_to_page_cache_locked' 'snd_rawmidi_poll' 'blk_mq_dispatch_rq_list' 'ext4_writepages' 'blk_mq_rq_ctx_init' 'n_tty_receive_buf_common' 'direct_page_fault' '__writeback_single_inode' 'ext4_free_inode' 'exit_mm' '__delayacct_blkio_end' 'filemap_map_pages' 'ext4_free_inodes_count' 'ext4_mark_iloc_dirty' 'alloc_pid' 'ondemand_readahead' 'find_get_pages_range_tag' 16:37:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff7, 0x11, r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0x0, 0x0, [0x4, 0x0, 0x0, 0x3, 0x7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) uselib(&(0x7f0000000040)='./file0\x00') setuid(0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000000)) [ 126.497592][ T8702] IPVS: ftp: loaded support on port[0] = 21 [ 126.569250][ T8702] chnl_net:caif_netlink_parms(): no params data found 16:37:51 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) [ 126.610263][ T8702] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.631057][ T8702] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.638489][ T8702] device bridge_slave_0 entered promiscuous mode [ 126.646329][ T8702] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.653704][ T8702] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.661662][ T8702] device bridge_slave_1 entered promiscuous mode [ 126.678556][ T8702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.689206][ T8702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.707573][ T8702] team0: Port device team_slave_0 added [ 126.715591][ T8702] team0: Port device team_slave_1 added [ 126.730180][ T8702] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 126.737529][ T8702] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.763737][ T8702] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 126.775568][ T8702] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 126.782987][ T8702] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.809221][ T8702] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 16:37:52 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0xe, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20048a927f1f6588b927481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) dup2(r0, r1) [ 126.892569][ T8702] device hsr_slave_0 entered promiscuous mode [ 126.931449][ T8702] device hsr_slave_1 entered promiscuous mode [ 127.004748][ T8856] IPVS: ftp: loaded support on port[0] = 21 [ 127.020624][ T8868] IPVS: ftp: loaded support on port[0] = 21 16:37:52 executing program 3: semctl$IPC_RMID(0x0, 0xb, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) getrusage(0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 127.137404][ T8856] chnl_net:caif_netlink_parms(): no params data found [ 127.176416][ T8702] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 127.235847][ T8702] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 127.302770][ T8702] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 127.342800][ T8702] netdevsim netdevsim0 netdevsim3: renamed from eth3 16:37:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$FITRIM(r0, 0x40086604, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180)='NLBL_MGMT\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)=""/104, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000340)={{0x0, 0x0, 0x7ff, 0x0, 0xfb}, 0x8}) [ 127.449157][ T8856] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.452645][ T9055] IPVS: ftp: loaded support on port[0] = 21 [ 127.470460][ T8856] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.492621][ T8856] device bridge_slave_0 entered promiscuous mode [ 127.505282][ T8702] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.512441][ T8702] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.519698][ T8702] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.526748][ T8702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.560346][ T8868] chnl_net:caif_netlink_parms(): no params data found [ 127.577618][ T8856] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.585924][ T8856] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.593761][ T8856] device bridge_slave_1 entered promiscuous mode [ 127.625713][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.635333][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.661998][ T9106] IPVS: ftp: loaded support on port[0] = 21 16:37:52 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002200)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 127.684977][ T8856] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.723573][ T8856] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 127.795964][ T8856] team0: Port device team_slave_0 added [ 127.804790][ T8868] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.812446][ T8868] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.819988][ T8868] device bridge_slave_0 entered promiscuous mode [ 127.829183][ T8868] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.836501][ T8868] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.844362][ T8868] device bridge_slave_1 entered promiscuous mode [ 127.862977][ T8856] team0: Port device team_slave_1 added [ 127.870339][ T9055] chnl_net:caif_netlink_parms(): no params data found [ 127.871589][ T9264] IPVS: ftp: loaded support on port[0] = 21 [ 127.886988][ T8702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.908615][ T8856] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 127.917694][ T8856] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.944297][ T8856] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 127.958018][ T8856] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 127.965333][ T8856] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.991782][ T8856] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 128.032609][ T8868] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.044171][ T8868] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.067047][ T8868] team0: Port device team_slave_0 added [ 128.074389][ T8868] team0: Port device team_slave_1 added [ 128.090788][ T9106] chnl_net:caif_netlink_parms(): no params data found [ 128.122587][ T8856] device hsr_slave_0 entered promiscuous mode [ 128.181429][ T8856] device hsr_slave_1 entered promiscuous mode [ 128.241126][ T8856] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.248701][ T8856] Cannot create hsr debugfs directory [ 128.265477][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.272994][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.280878][ T8868] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 128.287884][ T8868] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.313961][ T8868] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 128.334380][ T8702] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.345435][ T8868] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 128.352448][ T8868] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.378387][ T8868] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 128.416651][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.425599][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.434098][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.441134][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.448718][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.457497][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.465935][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.472970][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.480644][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.543698][ T8868] device hsr_slave_0 entered promiscuous mode [ 128.601392][ T8868] device hsr_slave_1 entered promiscuous mode [ 128.641160][ T8868] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.648747][ T8868] Cannot create hsr debugfs directory [ 128.654779][ T9055] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.662088][ T9055] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.669529][ T9055] device bridge_slave_0 entered promiscuous mode [ 128.677911][ T9055] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.684981][ T9055] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.692945][ T9055] device bridge_slave_1 entered promiscuous mode [ 128.702351][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.711472][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.719687][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.728524][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.737160][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.745813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.754157][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.762620][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.770708][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.779330][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.790009][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 128.815700][ T9055] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.852299][ T9055] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.879037][ T8856] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 128.922725][ T9106] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.929790][ T9106] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.937968][ T9106] device bridge_slave_0 entered promiscuous mode [ 128.946478][ T9106] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.953606][ T9106] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.961306][ T9106] device bridge_slave_1 entered promiscuous mode [ 128.979836][ T9055] team0: Port device team_slave_0 added [ 128.985641][ T8856] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 129.053983][ T9264] chnl_net:caif_netlink_parms(): no params data found [ 129.070488][ T9106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.082392][ T9055] team0: Port device team_slave_1 added [ 129.092149][ T8856] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 129.125057][ T8856] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 129.173605][ T9106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 129.184130][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 129.191944][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 129.209190][ T9055] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 129.217242][ T9055] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.243795][ T9055] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.271580][ T9055] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.278586][ T9055] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.305370][ T9055] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.318323][ T8702] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.382910][ T9055] device hsr_slave_0 entered promiscuous mode [ 129.421404][ T9055] device hsr_slave_1 entered promiscuous mode [ 129.471166][ T9055] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 129.478824][ T9055] Cannot create hsr debugfs directory [ 129.488563][ T9106] team0: Port device team_slave_0 added [ 129.495866][ T9106] team0: Port device team_slave_1 added [ 129.507690][ T8868] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 129.566345][ T8868] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 129.615721][ T8868] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 129.653678][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.662220][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 129.674933][ T9106] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 129.681977][ T9106] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.709169][ T9106] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.723032][ T9264] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.730094][ T9264] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.738577][ T9264] device bridge_slave_0 entered promiscuous mode [ 129.746537][ T9264] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.753973][ T9264] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.762127][ T9264] device bridge_slave_1 entered promiscuous mode [ 129.768813][ T8868] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 129.820618][ T9106] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.827792][ T9106] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.854707][ T9106] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.872511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 129.880583][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.895325][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.904506][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.918351][ T8702] device veth0_vlan entered promiscuous mode [ 129.963024][ T9106] device hsr_slave_0 entered promiscuous mode [ 130.021430][ T9106] device hsr_slave_1 entered promiscuous mode [ 130.081206][ T9106] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 130.088799][ T9106] Cannot create hsr debugfs directory [ 130.116559][ T8702] device veth1_vlan entered promiscuous mode [ 130.124075][ T9264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 130.135472][ T9264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 130.177539][ T9264] team0: Port device team_slave_0 added [ 130.187073][ T8856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.196022][ T9264] team0: Port device team_slave_1 added [ 130.212849][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 130.220699][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 130.232372][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.240672][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.250752][ T9264] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 130.257937][ T9264] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.284348][ T9264] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 130.297601][ T8868] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.310068][ T8702] device veth0_macvtap entered promiscuous mode [ 130.324309][ T9264] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 130.331393][ T9264] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.357541][ T9264] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 130.371298][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 130.379174][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.387511][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.395250][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.402960][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.410700][ T9055] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 130.462773][ T9055] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 130.509368][ T8856] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.518104][ T8868] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.527389][ T8702] device veth1_macvtap entered promiscuous mode [ 130.540359][ T9055] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 130.582942][ T9055] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 130.612843][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.620808][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.630250][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.638878][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.645931][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.653746][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.662551][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.670805][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.677917][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.686253][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.695085][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.726388][ T9106] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 130.782522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.791003][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.799729][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.806776][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.814519][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.823211][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.831788][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.839985][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.848624][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 130.856971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.865353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.873853][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.882220][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.889217][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.923351][ T9264] device hsr_slave_0 entered promiscuous mode [ 130.961353][ T9264] device hsr_slave_1 entered promiscuous mode [ 131.001238][ T9264] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 131.008829][ T9264] Cannot create hsr debugfs directory [ 131.032021][ T8702] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 131.039350][ T9106] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 131.093351][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 131.101750][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.110170][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.119916][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.128096][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.137889][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.146170][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.156189][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.166744][ T8856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 131.185225][ T9106] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 131.233166][ T9106] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 131.272640][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.293032][ T8702] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 131.313237][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 131.325685][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 131.334951][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 131.343989][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 131.352721][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.360725][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.369155][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 131.377041][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 131.384731][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.393108][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.401466][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.409827][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.419449][ T8868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 131.429086][ T8856] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 131.442611][ T8702] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.451993][ T8702] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.460658][ T8702] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.469353][ T8702] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.479290][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 131.498811][ T9264] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 131.553439][ T9264] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 131.621416][ T9264] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 131.666659][ T9264] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 131.783542][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 131.790917][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 131.801750][ T8868] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 131.821565][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.830032][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.869908][ T9055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.934994][ T8856] device veth0_vlan entered promiscuous mode [ 131.942074][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.950488][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.960401][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.968224][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.981041][ T9106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.995594][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.005796][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.014691][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.022616][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.033126][ T9055] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.053212][ T9106] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.066288][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.074066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.082974][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.092103][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.100292][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.107372][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.125562][ T8868] device veth0_vlan entered promiscuous mode [ 132.141024][ T9264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.153539][ T8856] device veth1_vlan entered promiscuous mode [ 132.162809][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 132.170738][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.181070][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.189720][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.198493][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.205530][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.213645][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.222483][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.230966][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.239052][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.247202][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.255706][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.264041][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.272620][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.280832][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.287880][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.295549][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.303245][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.310935][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.318658][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.326632][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.334729][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.348336][ T9264] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.362637][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.371058][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.379597][ T5091] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.386710][ T5091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.394408][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.402981][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.411449][ T5091] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.418499][ T5091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.426380][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.434641][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.446094][ T8868] device veth1_vlan entered promiscuous mode [ 132.458227][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.466028][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.474752][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.483041][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.505473][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.514318][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.522949][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.531406][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.539627][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.547996][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.556195][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.564468][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.572828][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.580809][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.589582][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.597946][ T5091] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.605002][ T5091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.615796][ T9106] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 132.627739][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.637464][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.645625][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.655037][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.663633][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.672002][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.680224][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.689986][ T8856] device veth0_macvtap entered promiscuous mode [ 132.700196][ T8856] device veth1_macvtap entered promiscuous mode [ 132.710716][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 132.718551][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.726514][ T9469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.761874][ T9106] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.773556][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.781007][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.789245][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.798206][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.806679][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.815215][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.822999][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.836930][ T9055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.849572][ T8868] device veth0_macvtap entered promiscuous mode [ 132.858823][ T8856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.869327][ T8856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.881403][ T8856] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 132.890413][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 132.898868][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.907663][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.916997][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.925708][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.936052][ T8868] device veth1_macvtap entered promiscuous mode [ 132.948583][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.956982][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.976306][ T8856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.998880][ T8856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.018931][ T8856] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 133.029335][ T8856] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.038311][ T8856] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.047023][ T8856] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.055872][ T8856] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.073034][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.091637][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.100151][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.109167][ T9977] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 133.125731][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.136514][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.147634][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.156270][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.165270][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.174747][ T9264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.275316][ T9977] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 133.285169][ T8868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 133.299217][ T8868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.300698][ T9977] debugfs: Directory '9977-4' with parent 'kvm' already present! 16:37:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff7, 0x11, r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0x0, 0x0, [0x4, 0x0, 0x0, 0x3, 0x7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) uselib(&(0x7f0000000040)='./file0\x00') setuid(0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000000)) [ 133.313174][ T8868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 133.330505][ T8868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.343397][ T8868] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 133.404224][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 133.421881][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 133.430323][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.435285][ T9993] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 133.446598][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 16:37:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x1a, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795ecaffff8100ffffffba0e7200ffff", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 133.490195][ T9264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.513330][ T8868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 133.528593][ T8868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.551295][ T8868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 133.571338][ T8868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.592234][ T8868] batman_adv: batadv0: Interface activated: batadv_slave_1 16:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="350300001f00050ad21680648c63940d0224fc6004000f400a0003003401000037153e370a003d802e070000d1bd", 0x33fe0}], 0x1}, 0x0) [ 133.611934][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.620518][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.633844][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.644435][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.651975][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.660647][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.675108][ T9106] device veth0_vlan entered promiscuous mode [ 133.693224][T10009] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 133.696359][ T9055] device veth0_vlan entered promiscuous mode [ 133.707499][T10009] netlink: 'syz-executor.0': attribute type 61 has an invalid length. [ 133.720604][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.730093][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.738074][T10009] netlink: 773 bytes leftover after parsing attributes in process `syz-executor.0'. [ 133.748655][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.757100][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.767430][ T8868] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.776937][ T8868] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.785960][ T8868] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.794784][ T8868] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:37:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, 0xffffffffffffffff, 0x0, 0x1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 133.809408][ T9055] device veth1_vlan entered promiscuous mode [ 133.822674][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.830216][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.837956][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.845905][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.854014][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 133.868233][ T9106] device veth1_vlan entered promiscuous mode [ 133.891397][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 133.899213][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.922042][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.055952][ T9055] device veth0_macvtap entered promiscuous mode [ 134.062740][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 134.070593][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 134.078600][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.087221][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.096103][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.104533][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.114347][ T9264] device veth0_vlan entered promiscuous mode 16:37:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, 0xffffffffffffffff, 0x0, 0x1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 134.184602][ T9055] device veth1_macvtap entered promiscuous mode [ 134.192028][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.200538][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.218734][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.226763][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.235186][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.244849][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.254365][ T9106] device veth0_macvtap entered promiscuous mode [ 134.278863][ T9055] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.293755][ T9055] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.303917][ T9055] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.314341][ T9055] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.324405][ T9055] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.335381][ T9055] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.346581][ T9055] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 134.355533][ T9106] device veth1_macvtap entered promiscuous mode [ 134.363201][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.371412][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 16:37:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, 0xffffffffffffffff, 0x0, 0x1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 134.379247][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.387988][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.400429][ T9264] device veth1_vlan entered promiscuous mode [ 134.411499][ T9055] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.433351][ T9055] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.452930][T10031] hfsplus: unable to find HFS+ superblock [ 134.458876][ T9055] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.469423][ T9055] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.479304][ T9055] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.490104][ T9055] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.501069][ T9055] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 134.508535][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.517523][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.533886][ T9055] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 134.544676][ T9055] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 134.554570][ T9055] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 134.563761][T10031] hfsplus: unable to find HFS+ superblock [ 134.569624][ T9055] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 134.584110][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.601623][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.619658][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.630422][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.640436][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.651071][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.661227][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.671968][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:37:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, 0xffffffffffffffff, 0x0, 0x1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 134.683144][ T9106] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 134.699733][ T9264] device veth0_macvtap entered promiscuous mode [ 134.707041][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.715737][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.725068][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 16:37:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0x300, &(0x7f0000000140)="e3d0e9d6d9d18e5f39868de363d3", 0x0, 0x19d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 134.733910][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.793792][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.819084][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.846847][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.857415][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.869117][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.883028][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.895796][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.906463][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.917535][ T9106] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 134.927321][ T9264] device veth1_macvtap entered promiscuous mode [ 134.937584][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.945960][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.954076][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.962840][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.051547][ T50] Bluetooth: hci0: command 0x0409 tx timeout [ 135.056470][ T9106] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 135.069037][ T9106] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 135.079516][ T9106] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 135.088463][ T9106] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 135.132784][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.151480][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.161281][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.173416][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.183366][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.194115][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.205374][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.216930][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.227197][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.237919][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.262089][ T9264] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.305094][ T9962] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.313784][ T9962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.355337][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.366250][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.377557][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.401463][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.411284][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.421765][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.431603][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.442652][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:38:00 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0xe, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20048a927f1f6588b927481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) dup2(r0, r1) [ 135.453388][ T9264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.463847][ T9264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.475229][ T9264] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 135.531303][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.540580][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.553808][ T9264] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 135.565377][ T9264] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 135.575993][ T9264] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 135.584772][ T9264] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:38:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000d00)={0x3, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x100000000, 0x22000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000cc0), 0xc}, 0x0, 0x0, 0x7, 0x1, 0x0, 0x50, 0xb4}, r1, 0x3, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390104050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='freezer.state\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d80)={0x0, 0xffffffffffffffff}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000dc0)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) [ 136.295006][ C0] hrtimer: interrupt took 26238 ns [ 136.492006][ T51] Bluetooth: hci1: command 0x0409 tx timeout 16:38:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$FITRIM(r0, 0x40086604, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180)='NLBL_MGMT\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)=""/104, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000340)={{0x0, 0x0, 0x7ff, 0x0, 0xfb}, 0x8}) 16:38:02 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002200)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 16:38:02 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000001c0)=@in6={0x2, 0x0, 0x0, @remote}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="82c2178d", 0xfc9e}], 0x1}, 0x0) r1 = socket$kcm(0x2, 0x200000000000003, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, 0x0}, 0x200400c4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000002d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x55, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r2}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f5, &(0x7f0000000080)) sendmsg$kcm(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="7b350cbbc7734536d0e80779ea3cc2b56a219250aa26b94f10e3eaf328db20c8fd20dbca4d9a31d0fbfa00d6f53fcc6aacc99830792708f799add58b87a1b250ed7aa6f3dd357827", 0x48}, {&(0x7f0000000400)="44ef07a02a56a235bd41646d213daa5bf627c9b1752212b20b3dedf9b3da03c5669c1fc3ca0cdb27c450134a59dd6a7ad3a58b0843c931d5c0b768063f2882fc06112c82a340d0b47feb335ad6b128e2b687b64d491fa2fa52327d3ff599ac595bbe27d5fb42eda533655c0dcbcf863034a708829265f6b1c47067a2784aefb0f0eb268ed810594f0cdac551c56b02", 0x8f}], 0x2, &(0x7f00000004c0)=[{0x48, 0x108, 0x80000001, "378cc352ff2cc024846d49d772155d50979512ca783a68f9687e852e12a6ceef4d60b3672aade7b3ef7a7e4d25228b43b98b531a99974d"}], 0x48}, 0x20004004) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x1004, 0x0, 0x0, 0x6, 0x7, 0x4, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000380)='cgroup.controllers\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) 16:38:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) perf_event_open(0x0, r1, 0x3, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390104050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='freezer.state\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d80)={0x0, 0xffffffffffffffff}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000dc0), 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000c40)) 16:38:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000440)='\x00', 0x1}], 0x1, &(0x7f0000000480)=[{0x20, 0x84, 0x8, '\x00\x00\x00\x00\x00\x00\x00\x00\x00'}], 0x20}, 0x40a8cf805a0f2075) 16:38:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000d00)={0x3, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x100000000, 0x22000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000cc0), 0xc}, 0x0, 0x0, 0x7, 0x1, 0x0, 0x50, 0xb4}, r1, 0x3, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390104050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='freezer.state\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d80)={0x0, 0xffffffffffffffff}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000dc0)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 16:38:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$FITRIM(r0, 0x40086604, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180)='NLBL_MGMT\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)=""/104, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000340)={{0x0, 0x0, 0x7ff, 0x0, 0xfb}, 0x8}) [ 137.133742][ T51] Bluetooth: hci0: command 0x041b tx timeout 16:38:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$FITRIM(r0, 0x40086604, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180)='NLBL_MGMT\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)=""/104, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000340)={{0x0, 0x0, 0x7ff, 0x0, 0xfb}, 0x8}) 16:38:02 executing program 2: socket$inet(0x2, 0x4000000000000001, 0x0) socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002200)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 137.291718][ T51] Bluetooth: hci2: command 0x0409 tx timeout 16:38:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$FITRIM(r0, 0x40086604, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180)='NLBL_MGMT\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)=""/104, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000340)={{0x0, 0x0, 0x7ff, 0x0, 0xfb}, 0x8}) 16:38:02 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002200)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 16:38:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000d00)={0x3, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x100000000, 0x22000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000cc0), 0xc}, 0x0, 0x0, 0x7, 0x1, 0x0, 0x50, 0xb4}, r1, 0x3, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390104050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='freezer.state\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d80)={0x0, 0xffffffffffffffff}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000dc0)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 16:38:02 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000001c0)=@in6={0x2, 0x0, 0x0, @remote}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="82c2178d", 0xfc9e}], 0x1}, 0x0) r1 = socket$kcm(0x2, 0x200000000000003, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, 0x0}, 0x200400c4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000002d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x55, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r2}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f5, &(0x7f0000000080)) sendmsg$kcm(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="7b350cbbc7734536d0e80779ea3cc2b56a219250aa26b94f10e3eaf328db20c8fd20dbca4d9a31d0fbfa00d6f53fcc6aacc99830792708f799add58b87a1b250ed7aa6f3dd357827", 0x48}, {&(0x7f0000000400)="44ef07a02a56a235bd41646d213daa5bf627c9b1752212b20b3dedf9b3da03c5669c1fc3ca0cdb27c450134a59dd6a7ad3a58b0843c931d5c0b768063f2882fc06112c82a340d0b47feb335ad6b128e2b687b64d491fa2fa52327d3ff599ac595bbe27d5fb42eda533655c0dcbcf863034a708829265f6b1c47067a2784aefb0f0eb268ed810594f0cdac551c56b02", 0x8f}], 0x2, &(0x7f00000004c0)=[{0x48, 0x108, 0x80000001, "378cc352ff2cc024846d49d772155d50979512ca783a68f9687e852e12a6ceef4d60b3672aade7b3ef7a7e4d25228b43b98b531a99974d"}], 0x48}, 0x20004004) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x1004, 0x0, 0x0, 0x6, 0x7, 0x4, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000380)='cgroup.controllers\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) 16:38:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) r0 = socket$kcm(0xa, 0x3, 0x87) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)="5f4bc4f39997", 0x6}, {&(0x7f0000000080)="73cd3a02635c92fbca1c5155ba361f3648407ff3017421ccf3c997de75b2d1af24ac500e6c770c1d3d0d44c98ba9fb587377e59174a6e861b0193223a80a5cc7990f840c3a8d38431aee2748aced67524e8e6b9c7d5ed1e08cd9153aa7f06266e91247ee31dc5fa0637997753ae78f546ad70897", 0x74}, {&(0x7f00000008c0)="7c07fa0d6809a13d7c2a83cd8587dbf7626bcf2e96a3cbff180e5d53ec247bedb8a9ba830e6b9fb4d168e0dfbb6b31c75b61cc95b86e0b3cd626477d4cddf6895cb082ffe64e2ab44896445b187813249d4ab9946831c10e17788de4d8d7fcd7feffdb317b4397758d6b98099366d1b82049d3d1fb50d847fe3c16454f38532af56b468426cd3bd01282138c9ed6f634a41541dbc65bb011349cc511fa29b2f5ed7255ae62ade73d0107246dd040cecf6b84e88c04f9f17e9021d4da1e81ef38c89fe5f9d58040a35fe2577d50c33c317946146ea3cd6c49ad78c43b035c3ed5ea8cfe9472bf337536f2d09091d8a44ea93471d3d9743abcd6cf27785a6bdf6fe54bcfb53607a23098dd36c904e68604503e4e3c8dee9d906e0ded14da5c97a3d3b6a6471189cd6db5f20ee8902928945af7472e760f64eb240e2629a168c855a3882d4b8f52cc0ed0ae03cd803686f46cfe26efeceb11e659039fbd67fd582cefb81e530292e621e31573b7d1683d45aa34a9e224634868526538206ab6de269c22a1f9caaedb9edea3e4aea4d639e450913e7fc28dc1a1475209507de0e74aad01dc092a989938d05536f7907a778b76e6ad5307916cf709fb4380a698144aa5a9ab0c59f81cf8b1ca489cc6c0bfe56f27ac970bc0aa158eedaf9edf1e4e97ae270934234a5de0bd7bb2c79e5fef399f06dd544fa8de6abd7772c39205fa704172cc50488b45eae1831f36e5d277fdacf2909941e003fba310c3c73eabcfe7b46a7172e4974a65297e92f94e6895dabdc2ddeff4fff120bb435eaa65effa0920340d81d56671cbd53656155b7ec769b81d1fa28577e12079a8b69bc2685f02fc670c8ff88e288e11dcd0254442f5ba97bfe7b4f6cd91ff3041695fdb4c56f6ee64b8b74ec3171ad03244f48c9b7e398868b75968d5ebb1c52520308b9a5f9595d29025cded4109388cae21c9910484956795453beca7b1b05d3a0fce8d51768b511829979e07f963a204d6e678513594797ba75c31401a35c71097d51aeab450b5abd2654790bc97a2794d74d552f3adef03cf8fd45b917c828cadf05155dcacf4b4400236e6e072e1e4430461d566f42affd0493909d50bb55d3eb7d50b409c92ec6619828363ddfa8e148b7add482dc9d8143f51e1f8ddedb995568d3e7f67bc5650ae287427128bd4ef83093da33e9207e6f60f23489afdafb0803bedacb588d256a928a77afeaf71bb82496db0414aa3997d961e969cfef1ab81dce5c9713e06f93ec33a46f23e29fa8804e1b0ee35922ec7b3af3c29f65ce65c54f121c1b5b446ac35e4bb60c9f2a166118fcc94bcc27d10dfd39a0cd749151f21bdf43db3ba97d7220d8bc624150c780bd3fcaa34343d8ce007595e9bc26e8dc49eed573573455537d01ebd1975b46e0eff3b468f356e6026e8d80fa1f2f72d5c2000f489f92d68290c2be7b3791d2768dccbc35a48bbd16e2ef0dbb5618bdb18ac7a10a03658c96532baa0535124ff77bb7a67492af726c39811508c996d32d9118b7036fdfc5f9d319f7390b458f445c6dd864510a5f98c92329f844f66f57d797e160ae350713bf904cbba339583f8399a9e45221436ad234a8bc177b0675130221ab2bc8831c7fb47142ef83f1417b6a28b4f2dfaf82fe3f68950e98ee9820d02e5fbb76895387e85727f0cb86424bdaa3fe1573abd8e555e641664b50ac6148b33a14bba0b386ee477ddfc8e5815dc55b32468b06468213ecc2f83f058ce02c16062ec8300a4fbd88ca3904e0a0bfe26560f8fdb1b41e99543de4a014fcda3940ed6b4035ba12f2065bdc2bb8832e0b5678ace351910dabd8922c347ab79de671ddb83e05ad9679192e08c48032c4e40f38b48928a097f6882b0eb263fe92b0b30131c8f3eb78030b4cada0d4385ccbe7b74068dd0ba2fae21003da4a94a2273d23a8512dcdf6d051384c853c7cbe46ea915db2c8a7b1105ba29f9eb6b8e38d62d8bab3b96ba10004519d6022a44995eebf2c7fcd913bfd934cec34ecc52971e5fe29fdb226d57f6825d406c9726264b95ece2ad78b981198221308cf352d07232113801626509540ed5d2e6fe777655d6d73ac95129cf0ae368897e6a3ede4d93ba1ea6749faf147cf5290cf43a7ff0f7f391b336b0e024cfe989eca3fb2dc0db0a563c1000fd495e367fb013de9a3850d053c4e32f3c3cf7afd2e2dc46261e692122a657279ba0e19e2e3c537e75899c51180fc06233c62d544f190da219a57666d19eca5a273d82f76459343e25719b66817cb627908fd1a6c107696385c14875a16fb6dce616629b1e650c8615e5cd1bf657800bd048ba750fa36c7445f40fdf6da592bd36b1580b4df8622609a01f5882d1ff2fcc608dde8708dc3ccf0a95e8ee26990bb23369e926b89493301d636f889968b5a0f77bd1c435ea11a53c56783d54e972be4cd4b6b7b3842ded6fb754266fae86af9416858539372f9a9008935f6c914c71e438dba89d9521e16a9cc1b417d6579539646684128e023c64ecaf5c27ecb43553a4dba1ee1060a56ca1334413ca665e6160c2eb8a77276acdd99c8b5ffd5113b32bf7b89cd943d1d2870e786568d0648f870a5640d6ec89d419b4bc3ac069bda35a250bc86fb50642ecdfb4f06b1bccf9b327d8d233484f6adc1de647f54c94624a394a19ed4b17aabb7f909a703926e3c9dfebed32c150fb5130e89d622946be13cfbab5397f5872f8ae1225b86244328ce28d3239b33ce8c188805f802b67ecca8da9fb4b7f9b76bfe1c8bad433a78ecf02b6060258e8826479d5bab37b43248c01ce804e5132a5c7cffb777876cea12241bd031afa6390bd29be86f5aeec88b07dd18e8583cf8f397f5025a6b2fb2974f02d3f404c3b9cd7842e4e1797a5d21c38b54ed151ce5dd4e06dceb875d4679540e1d3d87eda35a779d3bb6c3632a9ea02ed7d40a51465dc89cc5bf71ca471a869d606309361784626bd8de25efa7184c18a4737c97d3d0bc994e10aa9f3aa465552cba47a0b4253ecdcfd4ea19b7d0c92c11123039c144d0b5a223fa41f763e906068820e6ebd01e31b317b0e6762374855748a84d960bcb364afcab77960cbb5e9602ca050f63c52d54fa8b0c69d67ca08ffcda034b89ee8190f3026ed6f562d126a44c0200b2c9cc7df1c6f510d0000189cd41e4f3f026f491d75298ae6910046c2902dbfd7378406acd084c4c703484a5d23727d3590ecf61f13d435f565ec4ddc236e71f6284532838f8fd9b4bd07204ba2afd4d5048d2525c9e95bdbbd2eddf1a4498e2247469ebaa36e2c88ecc22d518b2da449e32d2967d2f2bc6ce01a9c7e85d30480f729fab193d2c44107c94a40a2f148784e9ebcf6f149e20cff86feee33e726a429bfffe785e54be1bba7fbbe6dd8be1f0cb94b3d5d118d25f433fd8feac08ffb119e1f0e3d33e24a6ef72d39ac54e1f5cc7a488401e09eef6d8d882b601459f31478ee2419885ad385d67e591532e23dd5f043416b74aa7ac53f9d3b481d0a11d684300e5cc48937a9a147ffb65c6adc8abd36371843531bec86434a5d2519a070eb0cab47bce79eb64bb68042e89fb7854aaabf0e14b650aa917a84105f5a3ebe104b764a7bc1ff820ee8995bbfe431d7f1ff06b7361da8b6740e23a38b31394ed947d9a00c0ee8dc8bae2b43d6ee56f242be1730710f4ec9a9c6484ceebd6273a2b31e15be7a6deab2a8210154633eff474fa0638ffc393235098a8dde8d20fd7decd48e971bfe45b5d4d0400244fa85978eb85c5a4de0219c7ad43d470d6598e075b77490ba7827e2b03d34fe266b85defa162ae1a58ab344fd5dcd0dcc271b8a072be2fb5122b0f8d5bff5de5164bda859f8cd0c33", 0xab7}], 0x3}, 0x0) 16:38:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000d00)={0x3, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x100000000, 0x22000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000cc0), 0xc}, 0x0, 0x0, 0x7, 0x1, 0x0, 0x50, 0xb4}, r1, 0x3, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390104050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='freezer.state\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d80)={0x0, 0xffffffffffffffff}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000dc0)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 16:38:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff00}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="110000000000000000400300010000000000000000003fc81c00000000000000000000fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c00000000000000090000000888f800", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000240000000000000000000000070000009404000007100900000000000000000000007e00000000001100000000000000000000000100"/76], 0x98}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000280)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000340)="8990284a20d80bd1f35a4a2c9616461de6b302fa495f2ba3ab5eba4876a36e98d122698b00136b355d329c99e03ee733cf643d2cd741002e2dbb107ec5eb7e04daf493e30ac39471fd9ef16d16fea8ce3ef58031f7e24205f199e970518755e26dafee59874bcf08fb0366a349aa91112e59724c1d2e28502d47ca0928e4a673468b9ff541ca68bf669d52abb80a5f35b459e58902cd", 0x96}, {&(0x7f0000000480)}], 0x3}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28, &(0x7f0000000180)}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cpuset-em1]vboxnet0vmnet1\x00', r3}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) [ 138.181636][ T17] Bluetooth: hci3: command 0x0409 tx timeout 16:38:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) r0 = socket$kcm(0xa, 0x3, 0x87) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@un=@abs={0xa}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)="5f4bc4f39997", 0x6}, {&(0x7f0000000080)="73cd3a02635c92fbca1c5155ba361f3648407ff3017421ccf3c997de75b2d1af24ac500e6c770c1d3d0d44c98ba9fb587377e59174a6e861b0193223a80a5cc7990f840c3a8d38431aee2748aced67524e8e6b9c7d5ed1e08cd9153aa7f06266e91247ee31dc5fa0637997753ae78f546ad70897", 0x74}, {&(0x7f00000008c0)="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", 0x527}], 0x3}, 0x0) 16:38:03 executing program 4: socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)="91001100002bae5baf66758cba30d66205baa69654a3f5ffffff020000000000000000000000005b985b5fd7416f43009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d06a55e91e6815ca20794664b44b299feee8a08ba54aee07b92c0454b6b44a831329ced75fec7d5fbc12c1e22d1baeac4a0dd0a157bd730188fced8", 0x8e}], 0x1}, 0x20000000) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r2, 0x6, &(0x7f0000000180)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0xd6, 0xabe8c09420982900}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89a0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000a00)=r2, 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000400)=""/182, 0xb6}, {&(0x7f0000000580)=""/235, 0xeb}, {&(0x7f0000000680)=""/190, 0xbe}, {&(0x7f00000002c0)=""/55, 0x37}, {&(0x7f00000004c0)=""/19, 0x13}, {&(0x7f0000000740)=""/148, 0x94}, {&(0x7f0000000800)=""/119, 0x77}], 0x7, &(0x7f0000000900)=""/190, 0xbe}, 0x2000) 16:38:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) perf_event_open(&(0x7f0000000d00)={0x3, 0x70, 0x4, 0x40, 0x3, 0xff, 0x0, 0x100000000, 0x22000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000cc0), 0xc}, 0x440, 0x0, 0x7, 0x1, 0x7fff, 0x50, 0xb4}, r2, 0x3, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390104050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r3, 0x3, 0x0, 0x3, &(0x7f0000000140), 0x24}, 0x20) openat$cgroup_ro(r3, &(0x7f0000000040)='freezer.state\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d80)={0x0, 0xffffffffffffffff}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000dc0)=r4, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000c40)) 16:38:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff00}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="110000000000000000400300010000000000000000003fc81c00000000000000000000fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c00000000000000090000000888f800", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000240000000000000000000000070000009404000007100900000000000000000000007e00000000001100000000000000000000000100"/76], 0x98}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000280)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000340)="8990284a20d80bd1f35a4a2c9616461de6b302fa495f2ba3ab5eba4876a36e98d122698b00136b355d329c99e03ee733cf643d2cd741002e2dbb107ec5eb7e04daf493e30ac39471fd9ef16d16fea8ce3ef58031f7e24205f199e970518755e26dafee59874bcf08fb0366a349aa91112e59724c1d2e28502d47ca0928e4a673468b9ff541ca68bf669d52abb80a5f35b459e58902cd", 0x96}, {&(0x7f0000000480)}], 0x3}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28, &(0x7f0000000180)}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cpuset-em1]vboxnet0vmnet1\x00', r3}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:38:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff00}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="110000000000000000400300010000000000000000003fc81c00000000000000000000fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c00000000000000090000000888f800", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000240000000000000000000000070000009404000007100900000000000000000000007e00000000001100000000000000000000000100"/76], 0x98}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000280)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000340)="8990284a20d80bd1f35a4a2c9616461de6b302fa495f2ba3ab5eba4876a36e98d122698b00136b355d329c99e03ee733cf643d2cd741002e2dbb107ec5eb7e04daf493e30ac39471fd9ef16d16fea8ce3ef58031f7e24205f199e970518755e26dafee59874bcf08fb0366a349aa91112e59724c1d2e28502d47ca0928e4a673468b9ff541ca68bf669d52abb80a5f35b459e58902cd", 0x96}, {&(0x7f0000000480)}], 0x3}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28, &(0x7f0000000180)}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cpuset-em1]vboxnet0vmnet1\x00', r3}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:38:03 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002200)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 16:38:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff00}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="110000000000000000400300010000000000000000003fc81c00000000000000000000fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c00000000000000090000000888f800", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000240000000000000000000000070000009404000007100900000000000000000000007e00000000001100000000000000000000000100"/76], 0x98}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000280)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000340)="8990284a20d80bd1f35a4a2c9616461de6b302fa495f2ba3ab5eba4876a36e98d122698b00136b355d329c99e03ee733cf643d2cd741002e2dbb107ec5eb7e04daf493e30ac39471fd9ef16d16fea8ce3ef58031f7e24205f199e970518755e26dafee59874bcf08fb0366a349aa91112e59724c1d2e28502d47ca0928e4a673468b9ff541ca68bf669d52abb80a5f35b459e58902cd", 0x96}, {&(0x7f0000000480)}], 0x3}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28, &(0x7f0000000180)}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cpuset-em1]vboxnet0vmnet1\x00', r3}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) [ 138.581631][ T12] Bluetooth: hci1: command 0x041b tx timeout 16:38:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff00}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="110000000000000000400300010000000000000000003fc81c00000000000000000000fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c00000000000000090000000888f800", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000240000000000000000000000070000009404000007100900000000000000000000007e00000000001100000000000000000000000100"/76], 0x98}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000280)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000340)="8990284a20d80bd1f35a4a2c9616461de6b302fa495f2ba3ab5eba4876a36e98d122698b00136b355d329c99e03ee733cf643d2cd741002e2dbb107ec5eb7e04daf493e30ac39471fd9ef16d16fea8ce3ef58031f7e24205f199e970518755e26dafee59874bcf08fb0366a349aa91112e59724c1d2e28502d47ca0928e4a673468b9ff541ca68bf669d52abb80a5f35b459e58902cd", 0x96}, {&(0x7f0000000480)}], 0x3}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28, &(0x7f0000000180)}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cpuset-em1]vboxnet0vmnet1\x00', r3}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:38:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000d00)={0x3, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x100000000, 0x22000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000cc0), 0xc}, 0x0, 0x0, 0x7, 0x1, 0x0, 0x50, 0xb4}, r1, 0x3, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390104050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='freezer.state\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d80)={0x0, 0xffffffffffffffff}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000dc0)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 16:38:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff00}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="110000000000000000400300010000000000000000003fc81c00000000000000000000fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c00000000000000090000000888f800", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000240000000000000000000000070000009404000007100900000000000000000000007e00000000001100000000000000000000000100"/76], 0x98}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000280)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000340)="8990284a20d80bd1f35a4a2c9616461de6b302fa495f2ba3ab5eba4876a36e98d122698b00136b355d329c99e03ee733cf643d2cd741002e2dbb107ec5eb7e04daf493e30ac39471fd9ef16d16fea8ce3ef58031f7e24205f199e970518755e26dafee59874bcf08fb0366a349aa91112e59724c1d2e28502d47ca0928e4a673468b9ff541ca68bf669d52abb80a5f35b459e58902cd", 0x96}, {&(0x7f0000000480)}], 0x3}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28, &(0x7f0000000180)}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cpuset-em1]vboxnet0vmnet1\x00', r3}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:38:04 executing program 2: [ 138.812507][ T9962] Bluetooth: hci4: command 0x0409 tx timeout [ 138.903352][ T12] Bluetooth: hci5: command 0x0409 tx timeout [ 138.945458][T10231] ================================================================== [ 138.953574][T10231] BUG: KCSAN: data-race in iptunnel_xmit / iptunnel_xmit [ 138.960583][T10231] [ 138.962903][T10231] write to 0xffff8880abf8f140 of 8 bytes by task 10227 on cpu 0: [ 138.970612][T10231] iptunnel_xmit+0x435/0x4b0 [ 138.975195][T10231] ip_tunnel_xmit+0x1099/0x11c0 [ 138.980036][T10231] ipgre_xmit+0x53e/0x590 [ 138.984360][T10231] xmit_one+0xc0/0x310 [ 138.988429][T10231] __dev_queue_xmit+0xf00/0x15a0 16:38:04 executing program 2: [ 138.993383][T10231] dev_queue_xmit+0x13/0x20 [ 138.997873][T10231] __bpf_redirect+0x56a/0x7c0 [ 139.002558][T10231] bpf_clone_redirect+0x168/0x1c0 [ 139.007575][T10231] bpf_prog_bebbfe2050753572+0x5c/0x9a8 [ 139.013113][T10231] bpf_test_run+0x26d/0x4a0 [ 139.017604][T10231] bpf_prog_test_run_skb+0x6bd/0xe00 [ 139.022877][T10231] __do_sys_bpf+0x39a0/0x9a60 [ 139.027540][T10231] __x64_sys_bpf+0x3d/0x50 [ 139.031945][T10231] do_syscall_64+0x39/0x80 [ 139.036354][T10231] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.042233][T10231] 16:38:04 executing program 1: [ 139.044552][T10231] read to 0xffff8880abf8f140 of 8 bytes by task 10231 on cpu 1: [ 139.052171][T10231] iptunnel_xmit+0x423/0x4b0 [ 139.056752][T10231] ip_tunnel_xmit+0x1099/0x11c0 [ 139.061591][T10231] ipgre_xmit+0x53e/0x590 [ 139.065919][T10231] xmit_one+0xc0/0x310 [ 139.069985][T10231] __dev_queue_xmit+0xf00/0x15a0 [ 139.074912][T10231] dev_queue_xmit+0x13/0x20 [ 139.079417][T10231] __bpf_redirect+0x56a/0x7c0 [ 139.084090][T10231] bpf_clone_redirect+0x168/0x1c0 [ 139.089111][T10231] bpf_prog_bebbfe2050753572+0x5c/0xc58 [ 139.094643][T10231] bpf_test_run+0x26d/0x4a0 [ 139.099135][T10231] bpf_prog_test_run_skb+0x6bd/0xe00 [ 139.104411][T10231] __do_sys_bpf+0x39a0/0x9a60 [ 139.109078][T10231] __x64_sys_bpf+0x3d/0x50 [ 139.113481][T10231] do_syscall_64+0x39/0x80 [ 139.117887][T10231] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.123759][T10231] [ 139.126070][T10231] Reported by Kernel Concurrency Sanitizer on: [ 139.132215][T10231] CPU: 1 PID: 10231 Comm: syz-executor.3 Not tainted 5.8.0-syzkaller #0 16:38:04 executing program 2: [ 139.140537][T10231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.150579][T10231] ================================================================== [ 139.158628][T10231] Kernel panic - not syncing: panic_on_warn set ... [ 139.165205][T10231] CPU: 1 PID: 10231 Comm: syz-executor.3 Not tainted 5.8.0-syzkaller #0 [ 139.173510][T10231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.183552][T10231] Call Trace: [ 139.186839][T10231] dump_stack+0x10f/0x19d [ 139.191156][T10231] panic+0x207/0x64a [ 139.195047][T10231] ? vprintk_emit+0x44a/0x4f0 [ 139.199717][T10231] kcsan_report+0x684/0x690 [ 139.204212][T10231] ? kcsan_setup_watchpoint+0x41e/0x4a0 [ 139.209748][T10231] ? iptunnel_xmit+0x423/0x4b0 [ 139.214499][T10231] ? ip_tunnel_xmit+0x1099/0x11c0 [ 139.219514][T10231] ? ipgre_xmit+0x53e/0x590 [ 139.224009][T10231] ? xmit_one+0xc0/0x310 [ 139.228238][T10231] ? __dev_queue_xmit+0xf00/0x15a0 [ 139.233334][T10231] ? dev_queue_xmit+0x13/0x20 [ 139.237992][T10231] ? __bpf_redirect+0x56a/0x7c0 [ 139.242825][T10231] ? bpf_clone_redirect+0x168/0x1c0 [ 139.248019][T10231] ? bpf_prog_bebbfe2050753572+0x5c/0xc58 [ 139.253723][T10231] ? bpf_test_run+0x26d/0x4a0 [ 139.258392][T10231] ? bpf_prog_test_run_skb+0x6bd/0xe00 [ 139.263832][T10231] ? __do_sys_bpf+0x39a0/0x9a60 [ 139.268684][T10231] ? __x64_sys_bpf+0x3d/0x50 [ 139.273259][T10231] ? do_syscall_64+0x39/0x80 [ 139.277837][T10231] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.283902][T10231] ? __ip_finish_output+0x3d2/0x3e0 [ 139.289092][T10231] kcsan_setup_watchpoint+0x41e/0x4a0 [ 139.294450][T10231] iptunnel_xmit+0x423/0x4b0 [ 139.299039][T10231] ip_tunnel_xmit+0x1099/0x11c0 [ 139.303888][T10231] ? tnl_update_pmtu+0x5f1/0x610 [ 139.308814][T10231] ipgre_xmit+0x53e/0x590 [ 139.313136][T10231] xmit_one+0xc0/0x310 [ 139.317192][T10231] __dev_queue_xmit+0xf00/0x15a0 [ 139.322120][T10231] dev_queue_xmit+0x13/0x20 [ 139.326620][T10231] __bpf_redirect+0x56a/0x7c0 [ 139.331282][T10231] bpf_clone_redirect+0x168/0x1c0 [ 139.336294][T10231] bpf_prog_bebbfe2050753572+0x5c/0xc58 [ 139.341839][T10231] ? cpa_flush+0x35d/0x440 [ 139.346241][T10231] ? find_next_bit+0xa7/0xf0 [ 139.350818][T10231] ? cpumask_next+0xc/0x30 [ 139.355220][T10231] ? cpumask_next+0x1e/0x30 [ 139.359711][T10231] ? __this_cpu_preempt_check+0x18/0x20 [ 139.365243][T10231] ? __perf_event_task_sched_in+0x419/0x440 [ 139.371156][T10231] ? update_load_avg+0x1ad/0x2d0 [ 139.376088][T10231] ? _raw_spin_unlock_irq+0x4b/0x70 [ 139.381299][T10231] ? finish_task_switch+0x8b/0x270 [ 139.386407][T10231] ? __schedule+0x3c5/0x590 [ 139.390905][T10231] ? preempt_schedule_thunk+0x16/0x18 [ 139.396270][T10231] ? bpf_cgroup_storage_alloc+0x96/0x1f0 [ 139.401891][T10231] ? ktime_get+0x18c/0x1c0 [ 139.406301][T10231] bpf_test_run+0x26d/0x4a0 [ 139.410793][T10231] ? check_preemption_disabled+0x51/0x140 [ 139.416504][T10231] bpf_prog_test_run_skb+0x6bd/0xe00 [ 139.421784][T10231] ? bpf_prog_test_run_tracing+0x3f0/0x3f0 [ 139.427580][T10231] __do_sys_bpf+0x39a0/0x9a60 [ 139.432252][T10231] ? check_preemption_disabled+0x51/0x140 [ 139.437972][T10231] ? security_file_free+0xac/0xc0 [ 139.443015][T10231] ? debug_smp_processor_id+0x18/0x20 [ 139.448391][T10231] ? ktime_get_ts64+0x2d9/0x310 [ 139.453238][T10231] ? set_normalized_timespec64+0x104/0x130 [ 139.459034][T10231] ? check_preemption_disabled+0x51/0x140 [ 139.464740][T10231] ? debug_smp_processor_id+0x18/0x20 [ 139.470097][T10231] __x64_sys_bpf+0x3d/0x50 [ 139.474501][T10231] do_syscall_64+0x39/0x80 [ 139.478908][T10231] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.484785][T10231] RIP: 0033:0x45ccd9 [ 139.488664][T10231] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.508270][T10231] RSP: 002b:00007f0578f58c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 139.516668][T10231] RAX: ffffffffffffffda RBX: 0000000000001740 RCX: 000000000045ccd9 [ 139.524626][T10231] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 139.532585][T10231] RBP: 000000000078bfe0 R08: 0000000000000000 R09: 0000000000000000 [ 139.540550][T10231] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bfac [ 139.548514][T10231] R13: 00007ffe2b631def R14: 00007f0578f599c0 R15: 000000000078bfac [ 139.557513][T10231] Kernel Offset: disabled [ 139.561997][T10231] Rebooting in 86400 seconds..