[info] Using makefile-style concurrent boot in runlevel 2. [ 65.579214][ T27] audit: type=1800 audit(1579465312.891:21): pid=7821 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 65.626951][ T27] audit: type=1800 audit(1579465312.891:22): pid=7821 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.58' (ECDSA) to the list of known hosts. 2020/01/19 20:22:05 fuzzer started 2020/01/19 20:22:07 dialing manager at 10.128.0.105:43563 2020/01/19 20:22:07 syscalls: 2861 2020/01/19 20:22:07 code coverage: enabled 2020/01/19 20:22:07 comparison tracing: enabled 2020/01/19 20:22:07 extra coverage: enabled 2020/01/19 20:22:07 setuid sandbox: enabled 2020/01/19 20:22:07 namespace sandbox: enabled 2020/01/19 20:22:07 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/19 20:22:07 fault injection: enabled 2020/01/19 20:22:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/19 20:22:07 net packet injection: enabled 2020/01/19 20:22:07 net device setup: enabled 2020/01/19 20:22:07 concurrency sanitizer: enabled 2020/01/19 20:22:07 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 86.839417][ T7984] KCSAN: could not find function: 'poll_schedule_timeout' 2020/01/19 20:22:19 adding functions to KCSAN blacklist: 'blk_mq_get_request' '__rb_insert_augmented' 'ktime_get_real_seconds' 'iput' 'kauditd_thread' 'timer_clear_idle' '__dentry_kill' '__rb_erase_color' 'n_hdlc_buf_get' 'snd_seq_check_queue' 'generic_fillattr' 'tomoyo_supervisor' 'find_next_bit' 'sit_tunnel_xmit' 'dd_has_work' 'audit_log_start' 'shmem_file_read_iter' 'ext4_free_inode' 'rcu_gp_fqs_check_wake' 'tick_do_update_jiffies64' 'generic_write_end' 'vm_area_dup' 'futex_wait_queue_me' 'exit_signals' 'fasync_remove_entry' 'run_timer_softirq' '__mark_inode_dirty' 'snd_rawmidi_kernel_write1' 'pid_update_inode' 'shmem_getpage_gfp' 'blk_mq_sched_dispatch_requests' 'generic_file_read_iter' 'do_nanosleep' 'poll_schedule_timeout' 'blk_mq_dispatch_rq_list' '__process_echoes' '__find_get_block' 'ep_poll' 'find_get_pages_range_tag' 'wbt_done' '__ext4_new_inode' 'do_exit' 'snd_seq_prioq_cell_out' 'enqueue_timer' 'echo_char' 'copy_process' 'xas_find_marked' 'n_tty_receive_buf_common' 'ext4_free_inodes_count' 'taskstats_exit' 'ext4_has_free_clusters' 'tick_sched_do_timer' '__skb_try_recv_from_queue' 'xas_clear_mark' 'ext4_mb_good_group' 'ext4_mb_find_by_goal' 'tick_nohz_idle_stop_tick' 'ext4_nonda_switch' 'mod_timer' 'blk_mq_run_hw_queue' 'yama_ptracer_del' '__hrtimer_run_queues' 'do_syslog' 'inode_sync_complete' '__snd_rawmidi_transmit_ack' 'ext4_mark_iloc_dirty' 'rcu_gp_fqs_loop' 'iomap_dio_bio_actor' 20:26:02 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6008}, 0x200000}) [ 315.146371][ T7989] IPVS: ftp: loaded support on port[0] = 21 20:26:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000001ac0)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x2b1d}, 0x1c, 0x0}}, {{&(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}}], 0x2, 0x0) [ 315.291432][ T7989] chnl_net:caif_netlink_parms(): no params data found [ 315.352491][ T7989] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.359761][ T7989] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.368244][ T7989] device bridge_slave_0 entered promiscuous mode [ 315.375865][ T7989] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.384203][ T7989] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.392162][ T7989] device bridge_slave_1 entered promiscuous mode [ 315.411564][ T7989] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.422137][ T7989] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.442006][ T7989] team0: Port device team_slave_0 added [ 315.449267][ T7989] team0: Port device team_slave_1 added [ 315.467361][ T7989] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 315.474706][ T7989] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 315.500848][ T7989] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 315.512589][ T7989] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 315.520255][ T7989] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 315.546481][ T7989] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 315.572755][ T7994] IPVS: ftp: loaded support on port[0] = 21 [ 315.605140][ T7989] device hsr_slave_0 entered promiscuous mode 20:26:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0x5501, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 315.643291][ T7989] device hsr_slave_1 entered promiscuous mode [ 315.864927][ T7996] IPVS: ftp: loaded support on port[0] = 21 20:26:03 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) r1 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x0, 0x0) write$binfmt_misc(r4, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000006c0)=ANY=[], 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendto$inet(r5, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) [ 315.921620][ T7994] chnl_net:caif_netlink_parms(): no params data found [ 315.946208][ T7989] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 316.014927][ T7989] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 316.076812][ T7989] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 316.146015][ T7989] netdevsim netdevsim0 netdevsim3: renamed from eth3 20:26:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) dup2(0xffffffffffffffff, r0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 316.231872][ T8000] IPVS: ftp: loaded support on port[0] = 21 [ 316.286480][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.302981][ T7994] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.313029][ T7994] device bridge_slave_0 entered promiscuous mode [ 316.335084][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.342169][ T7994] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.363777][ T7994] device bridge_slave_1 entered promiscuous mode [ 316.389946][ T7989] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.397312][ T7989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.404695][ T7989] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.411747][ T7989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.421764][ T7992] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.434011][ T7992] bridge0: port 2(bridge_slave_1) entered disabled state 20:26:03 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1) [ 316.486430][ T8003] IPVS: ftp: loaded support on port[0] = 21 [ 316.496001][ T7994] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.514027][ T7994] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.585277][ T7996] chnl_net:caif_netlink_parms(): no params data found [ 316.615159][ T7994] team0: Port device team_slave_0 added [ 316.627302][ T7994] team0: Port device team_slave_1 added [ 316.684914][ T7994] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 316.691887][ T7994] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 316.719426][ T7994] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 316.731321][ T7994] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 316.738490][ T7994] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 316.764628][ T7994] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 316.824552][ T7996] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.831638][ T7996] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.839815][ T7996] device bridge_slave_0 entered promiscuous mode [ 316.848767][ T7996] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.856106][ T7996] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.865198][ T7996] device bridge_slave_1 entered promiscuous mode [ 316.881134][ T8007] IPVS: ftp: loaded support on port[0] = 21 [ 316.885358][ T7996] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.908795][ T8000] chnl_net:caif_netlink_parms(): no params data found [ 316.931649][ T7996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.974684][ T7994] device hsr_slave_0 entered promiscuous mode [ 317.013230][ T7994] device hsr_slave_1 entered promiscuous mode [ 317.052974][ T7994] debugfs: Directory 'hsr0' with parent '/' already present! [ 317.098046][ T7996] team0: Port device team_slave_0 added [ 317.105269][ T7996] team0: Port device team_slave_1 added [ 317.117749][ T7989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.147015][ T8000] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.154435][ T8000] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.162095][ T8000] device bridge_slave_0 entered promiscuous mode [ 317.169456][ T8000] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.176672][ T8000] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.184553][ T8000] device bridge_slave_1 entered promiscuous mode [ 317.196977][ T7996] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 317.204178][ T7996] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.230423][ T7996] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 317.278761][ T8003] chnl_net:caif_netlink_parms(): no params data found [ 317.288055][ T7996] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 317.295114][ T7996] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.321302][ T7996] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 317.347150][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 317.355013][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.374041][ T8000] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 317.385336][ T8000] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.447304][ T7989] 8021q: adding VLAN 0 to HW filter on device team0 [ 317.464426][ T8000] team0: Port device team_slave_0 added [ 317.471461][ T8000] team0: Port device team_slave_1 added [ 317.535232][ T7996] device hsr_slave_0 entered promiscuous mode [ 317.573243][ T7996] device hsr_slave_1 entered promiscuous mode [ 317.623072][ T7996] debugfs: Directory 'hsr0' with parent '/' already present! [ 317.645055][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.652378][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.660455][ T8003] device bridge_slave_0 entered promiscuous mode [ 317.668199][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.675411][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.683287][ T8003] device bridge_slave_1 entered promiscuous mode [ 317.707707][ T8000] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 317.715486][ T8000] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.742144][ T8000] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 317.755931][ T8007] chnl_net:caif_netlink_parms(): no params data found [ 317.769206][ T7994] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 317.845133][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.853953][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.862459][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.869603][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.877441][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.886516][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.895056][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.902261][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.910094][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 317.919068][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 317.928582][ T8000] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 317.935815][ T8000] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.962139][ T8000] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 317.992012][ T7994] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 318.046659][ T7994] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 318.106467][ T7994] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 318.170827][ T8003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 318.182796][ T8003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 318.192320][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 318.201695][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 318.210879][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 318.275577][ T8000] device hsr_slave_0 entered promiscuous mode [ 318.323370][ T8000] device hsr_slave_1 entered promiscuous mode [ 318.392970][ T8000] debugfs: Directory 'hsr0' with parent '/' already present! [ 318.411937][ T8003] team0: Port device team_slave_0 added [ 318.418616][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 318.427524][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 318.456486][ T8003] team0: Port device team_slave_1 added [ 318.462252][ T8007] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.469729][ T8007] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.477817][ T8007] device bridge_slave_0 entered promiscuous mode [ 318.507796][ T8007] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.515083][ T8007] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.522793][ T8007] device bridge_slave_1 entered promiscuous mode [ 318.541421][ T8007] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 318.552207][ T8007] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 318.572881][ T8003] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 318.579961][ T8003] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 318.606674][ T8003] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 318.618012][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 318.628758][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.652836][ T7989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 318.665221][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 318.686955][ T8003] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 318.694160][ T8003] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 318.720567][ T8003] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 318.731822][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 318.740578][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.753953][ T7996] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 318.817831][ T7996] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 318.865290][ T7996] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 318.916073][ T7996] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 318.974388][ T8007] team0: Port device team_slave_0 added [ 319.035358][ T8003] device hsr_slave_0 entered promiscuous mode [ 319.073361][ T8003] device hsr_slave_1 entered promiscuous mode [ 319.113147][ T8003] debugfs: Directory 'hsr0' with parent '/' already present! [ 319.133658][ T8007] team0: Port device team_slave_1 added [ 319.170543][ T8007] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 319.177826][ T8007] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 319.209259][ T8007] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 319.221353][ T8007] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 319.228390][ T8007] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 319.254363][ T8007] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 319.315800][ T8007] device hsr_slave_0 entered promiscuous mode [ 319.353270][ T8007] device hsr_slave_1 entered promiscuous mode [ 319.402982][ T8007] debugfs: Directory 'hsr0' with parent '/' already present! [ 319.417665][ T8000] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 319.466660][ T8000] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 319.516125][ T8000] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 319.566288][ T8000] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 319.637138][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 319.644694][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 319.655367][ T7989] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 319.719604][ T7994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.750934][ T7994] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.779254][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.789985][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.798021][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 319.806785][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 319.845916][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.855067][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.863579][ T8004] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.870634][ T8004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.880279][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 319.889734][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.898617][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 319.907380][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.916078][ T8004] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.923136][ T8004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.931288][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 319.939368][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.947327][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 319.960724][ T7996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.969885][ T7989] device veth0_vlan entered promiscuous mode [ 319.980957][ T8007] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 320.021931][ T8000] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.029337][ T8003] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 320.095256][ T8003] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 320.158437][ T8007] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 320.204695][ T8007] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 320.256491][ T8007] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 320.325102][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.334159][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.347156][ T7989] device veth1_vlan entered promiscuous mode [ 320.353922][ T8003] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 320.408049][ T8003] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 320.471010][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 320.481771][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 320.490136][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.498988][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.507786][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.515508][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.523575][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.531404][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.539929][ T7992] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.552293][ T8000] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.576086][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.587520][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.596924][ T2411] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.604060][ T2411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.612071][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.620761][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.629510][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.644526][ T7996] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.656058][ T7994] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 320.667954][ T7994] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.679867][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.688878][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.697434][ T2411] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.704479][ T2411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.712370][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.721986][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.730642][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.739315][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.747753][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.756897][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.770389][ T7989] device veth0_macvtap entered promiscuous mode [ 320.781784][ T7989] device veth1_macvtap entered promiscuous mode [ 320.802969][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.811555][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.823777][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 320.831919][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.841106][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.849802][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.858372][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 320.866067][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 320.873620][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.882240][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.891241][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.899636][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.908159][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 320.916500][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.943257][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.952144][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.961183][ T8002] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.968241][ T8002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.976540][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.985166][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.993984][ T8002] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.001132][ T8002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.009127][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.018030][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 321.027148][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.035934][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.045852][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.054762][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.066612][ T7994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.078997][ T8000] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 321.091160][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 321.105054][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.113840][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.121818][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.130256][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.158798][ T7996] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 321.169580][ T7996] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 321.190068][ T8000] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.198228][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.207112][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.215941][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 321.223867][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 321.231358][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.240070][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.248909][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 321.264964][ T7989] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 321.275484][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 321.284349][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 321.304013][ T7989] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 321.317109][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.326616][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.341809][ T7996] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.360227][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 321.368000][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 321.376042][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 321.385496][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.394082][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 321.402754][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.432596][ T7994] device veth0_vlan entered promiscuous mode [ 321.448132][ T8007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.456520][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 321.465625][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.474315][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 321.482601][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.507092][ T7996] device veth0_vlan entered promiscuous mode [ 321.517363][ T8000] device veth0_vlan entered promiscuous mode [ 321.532457][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.540617][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.549250][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 321.557782][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.566404][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 321.575178][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.584314][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.593886][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.601650][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.610027][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.618800][ T7994] device veth1_vlan entered promiscuous mode [ 321.630658][ T7996] device veth1_vlan entered promiscuous mode [ 321.645353][ T8007] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.677589][ T8003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.697862][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 321.708448][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 321.720099][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 20:26:09 executing program 0: [ 321.730213][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.739628][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.748098][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.759428][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.768868][ T8004] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.775937][ T8004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.784289][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.793607][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.802294][ T8004] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.809358][ T8004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.817712][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 20:26:09 executing program 0: [ 321.826873][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 321.846048][ T8000] device veth1_vlan entered promiscuous mode [ 321.870456][ T8003] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.893217][ T7994] device veth0_macvtap entered promiscuous mode [ 321.913173][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.921323][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 20:26:09 executing program 0: [ 321.943826][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.953473][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 321.964856][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.974320][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.983586][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.991759][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:26:09 executing program 0: [ 322.041562][ T7996] device veth0_macvtap entered promiscuous mode [ 322.051029][ T7994] device veth1_macvtap entered promiscuous mode [ 322.059665][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.079463][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 20:26:09 executing program 0: [ 322.094252][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.103401][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.111976][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.121253][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.130216][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.139266][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.148119][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.159231][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.173239][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.181924][ T8004] bridge0: port 1(bridge_slave_0) entered blocking state 20:26:09 executing program 0: [ 322.189015][ T8004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.198008][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.207058][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.215643][ T8004] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.222958][ T8004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.232287][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 322.241741][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 322.253234][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 322.262278][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.271608][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 322.280647][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.289732][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.298244][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.308424][ T8007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.324776][ T8000] device veth0_macvtap entered promiscuous mode 20:26:09 executing program 0: [ 322.336891][ T8003] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 322.349815][ T8003] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 322.373754][ T7996] device veth1_macvtap entered promiscuous mode [ 322.384256][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 322.392728][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.406309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.417026][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 322.427315][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.437859][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.449571][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.461210][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.471106][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.480941][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.497036][ T8000] device veth1_macvtap entered promiscuous mode [ 322.508298][ T7994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.519675][ T7994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.530999][ T7994] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 322.546002][ T7994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.556794][ T7994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.568348][ T7994] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 322.576354][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.584936][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.594057][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.602817][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 322.611656][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 322.631356][ T8007] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.640806][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.654762][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.665183][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.675708][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.687095][ T7996] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 322.704110][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.719376][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.730242][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.740746][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.752017][ T7996] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 322.759983][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 322.767994][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 322.775651][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.784832][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.793995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 322.802579][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 322.821735][ T8003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.830714][ T8000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.841836][ T8000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.852013][ T8000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.863125][ T8000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.873659][ T8000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.884676][ T8000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.895755][ T8000] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 322.918223][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 322.926003][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 322.940132][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.949383][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.962787][ T8000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.981320][ T8000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.007951][ T8000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 323.020733][ T8000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.031217][ T8000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 323.044576][ T8000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.058523][ T8000] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 323.093438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 323.102573][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:26:10 executing program 0: [ 323.137969][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.155971][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.177607][ T8007] device veth0_vlan entered promiscuous mode [ 323.269723][ T8055] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 323.286555][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.296811][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.305729][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.315880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.328877][ T8007] device veth1_vlan entered promiscuous mode [ 323.351861][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 20:26:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000001ac0)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x2b1d}, 0x1c, 0x0}}, {{&(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}}], 0x2, 0x0) [ 323.368533][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.398619][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 323.436172][ T8003] device veth0_vlan entered promiscuous mode [ 323.467848][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 323.483875][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.503671][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.531314][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.539535][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.565790][ T8007] device veth0_macvtap entered promiscuous mode [ 323.613314][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 323.621850][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 323.635300][ T8007] device veth1_macvtap entered promiscuous mode [ 323.646195][ T8003] device veth1_vlan entered promiscuous mode [ 323.653456][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 323.661903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 323.670376][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 323.694763][ T8007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 323.718245][ T8007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.732055][ T8007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 323.742827][ T8007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.756568][ T8007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 323.770701][ T8007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.780741][ T8007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 323.795430][ T8007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.808389][ T8007] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 323.825090][ T8003] device veth0_macvtap entered promiscuous mode [ 323.846936][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 323.855379][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 20:26:11 executing program 2: [ 323.868452][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 323.892784][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 323.913696][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 323.938893][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 323.961410][ T8003] device veth1_macvtap entered promiscuous mode [ 323.971608][ T8007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 323.989594][ T8007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.000000][ T8007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.011270][ T8007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.021568][ T8007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.032086][ T8007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.042389][ T8007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.052986][ T8007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.063974][ T8007] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 324.085099][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.094231][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.114227][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 324.124843][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.135395][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 324.145908][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.156104][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 324.167470][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.177474][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 324.188328][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.198337][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 324.208777][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.219948][ T8003] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 324.233260][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.242329][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.259140][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.281522][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.295733][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.307610][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.319871][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.331298][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.343959][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.354539][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.364534][ T8003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.375016][ T8003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.386563][ T8003] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 324.394983][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.404043][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:26:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) dup2(0xffffffffffffffff, r0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 324.528641][ C1] hrtimer: interrupt took 67290 ns 20:26:12 executing program 5: 20:26:12 executing program 0: 20:26:12 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) r1 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x0, 0x0) write$binfmt_misc(r4, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000006c0)=ANY=[], 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendto$inet(r5, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) 20:26:12 executing program 1: 20:26:12 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) r1 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x0, 0x0) write$binfmt_misc(r4, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000006c0)=ANY=[], 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendto$inet(r5, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) 20:26:12 executing program 4: 20:26:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) 20:26:12 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000600)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) dup3(r0, r1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = ioctl$TIOCGPTPEER(r2, 0x5414, 0x20000004) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) 20:26:12 executing program 0: 20:26:12 executing program 1: 20:26:12 executing program 3: 20:26:13 executing program 0: 20:26:13 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x5452, &(0x7f0000000140)) 20:26:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self\x00', 0x0, 0x0) dup2(r0, r1) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 20:26:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) close(r0) socket$nl_crypto(0x10, 0x3, 0x15) tkill(r1, 0x1000000000016) 20:26:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="940603fe5157"}, 0x14) r2 = dup(r0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 20:26:13 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 20:26:13 executing program 3: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001640)='/proc/thread-self\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8902, &(0x7f0000000000)={'\x00', {0x2, 0x0, @broadcast}}) 20:26:13 executing program 1: r0 = timerfd_create(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 20:26:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000636c77fbac141411e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 20:26:13 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$unix(0x1, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x7ff, @mcast1, 0xfff}}, 0x0, 0x0, 0x6, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040), 0x95408b4c4e5831d8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) 20:26:13 executing program 0: r0 = socket(0x10, 0x2, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x100000421) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000008c0)=@setlink={0x38, 0x13, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x18, 0x16, [{0x14, 0x1, [@IFLA_VF_VLAN={0x10, 0x9, {0xfffffffe}}]}]}]}, 0x38}}, 0x0) 20:26:13 executing program 3: ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) pipe(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 20:26:13 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 20:26:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0x4, 0x1, [], "f3"}]}}, &(0x7f0000000380)=""/249, 0x2a, 0xf9, 0x8}, 0x20) [ 326.468054][ T8153] BPF:Unsupported section found 20:26:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x67}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@empty}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) 20:26:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201fdffffff0a000000ff07000000ffffff81000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) 20:26:14 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020181ffffff0a000000ff07000000ffffff82000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) [ 326.894683][ T8171] loop0: p1 p2 p3 < > p4 20:26:14 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xf6af) r0 = socket$rds(0x15, 0x5, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 20:26:14 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000000000000000e7ffffff", @ANYRES32=r4, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000cbb4eef93635795a9064aa5300"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}]]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0xf, &(0x7f00000002c0)={&(0x7f0000000200)=@dellink={0x20, 0x11, 0x313, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 326.928592][ T8171] loop0: partition table partially beyond EOD, truncated [ 326.952683][ T8171] loop0: p1 start 10 is beyond EOD, truncated [ 326.958995][ T8171] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 326.999759][ T8171] loop0: p3 start 225 is beyond EOD, truncated [ 327.015724][ T8171] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 327.097852][ T8177] loop5: p1 p2 p3 < > p4 [ 327.102363][ T8177] loop5: partition table partially beyond EOD, truncated [ 327.115198][ T8177] loop5: p1 start 10 is beyond EOD, truncated [ 327.124246][ T8185] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 327.134676][ T8177] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 327.143227][ T8177] loop5: p3 start 225 is beyond EOD, truncated [ 327.147040][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 327.147059][ T27] audit: type=1800 audit(1579465574.461:31): pid=8160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16547 res=0 [ 327.149657][ T8177] loop5: p4 size 3657465856 extends beyond EOD, truncated 20:26:14 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 20:26:14 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$unix(r1, &(0x7f0000002680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x28}], 0x1, 0x0) 20:26:14 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$unix(0x1, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x7ff, @mcast1, 0xfff}}, 0x0, 0x0, 0x6, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040), 0x95408b4c4e5831d8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) [ 327.314095][ T8177] loop5: p1 p2 p3 < > p4 [ 327.319010][ T8177] loop5: partition table partially beyond EOD, truncated [ 327.404050][ T8177] loop5: p1 start 10 is beyond EOD, truncated [ 327.410319][ T8177] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 327.496373][ T8177] loop5: p3 start 225 is beyond EOD, truncated [ 327.502686][ T8177] loop5: p4 size 3657465856 extends beyond EOD, truncated 20:26:15 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020181ffffff0a000000ff07000000ffffff82000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) 20:26:15 executing program 3: ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) pipe(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) [ 327.771791][ T8185] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 20:26:15 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$unix(0x1, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x7ff, @mcast1, 0xfff}}, 0x0, 0x0, 0x6, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040), 0x95408b4c4e5831d8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) [ 327.990238][ T8210] bond1 (unregistering): Released all slaves [ 328.013619][ T8215] loop5: p1 p2 p3 < > p4 [ 328.018061][ T8215] loop5: partition table partially beyond EOD, truncated [ 328.045292][ T8215] loop5: p1 start 10 is beyond EOD, truncated [ 328.063190][ T8215] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 328.105888][ T8215] loop5: p3 start 225 is beyond EOD, truncated [ 328.133459][ T8215] loop5: p4 size 3657465856 extends beyond EOD, truncated 20:26:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fgetxattr(r0, &(0x7f0000000080)=@random={'user.', 'securityl\xb2\xa8cpusettrusted\x00\xd3\xa2\xb6\x87BC\xb5Z\xc8\x9cb\xeaSN9\x82k\xda\xfaD=\xe6\x06\x1b\x82RFaV\xaeK\x94\xf7\x15\xa5\xab\xe9\x91\xf0\xde;\xa9U%8\x04/s\xacI\xa7\x1d0\xe9\xbf\xe7j\xae\x1f\xee$w\xfc\x96a\x01\xc7\xb3P\x04\xb1sv\xab\xbcp\b\xe1\xb5\xa1Y\x05GS\x9e\xeb\xe3,\xd4\x03\x86\xb3\xe5B\x15&\x06\xd4}\x19'}, 0x0, 0x0) 20:26:15 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000000000000000e7ffffff", @ANYRES32=r4, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000cbb4eef93635795a9064aa5300"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}]]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0xf, &(0x7f00000002c0)={&(0x7f0000000200)=@dellink={0x20, 0x11, 0x313, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 20:26:15 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000000000000000e7ffffff", @ANYRES32=r4, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000cbb4eef93635795a9064aa5300"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}]]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0xf, &(0x7f00000002c0)={&(0x7f0000000200)=@dellink={0x20, 0x11, 0x313, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 20:26:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)='fS\a\x00', 0x4}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 328.517034][ T8229] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 20:26:15 executing program 4: io_setup(0x200045, &(0x7f0000000200)) 20:26:15 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 328.613930][ T8234] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 20:26:16 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) [ 328.799839][ T8234] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 328.819710][ T8234] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 328.839497][ T8234] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 328.872152][ T8234] batman_adv: batadv0: Removing interface: batadv_slave_1 20:26:16 executing program 3: ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) pipe(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 20:26:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fmask=0']) 20:26:16 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020181ffffff0a000000ff0700000000000042000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) 20:26:16 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 329.475864][ T8267] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 329.498194][ T8270] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 [ 329.629497][ T8267] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 20:26:17 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) [ 329.674701][ T8283] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 [ 329.714068][ T8280] ldm_validate_privheads(): Disk read failed. [ 329.724724][ T8280] loop2: p1 p2 p3 < > p4 [ 329.732465][ T8280] loop2: partition table partially beyond EOD, truncated [ 329.742362][ T8280] loop2: p1 start 10 is beyond EOD, truncated [ 329.748598][ T8280] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 329.757215][ T8280] loop2: p3 start 225 is beyond EOD, truncated [ 329.769213][ T8280] loop2: p4 size 3657465856 extends beyond EOD, truncated 20:26:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000005000001bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e5374bf16d94ef0987b00a749a8e55da870f7778d3e77ad85319f0113fe7699162334343befce832cb8075c5f08e30cde221371f0fe1e2067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f044855a94eaaa9e8b6133b0cd417bdc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f2d89dd6a0bfe10ddba2e3797a2f6dcb45d5ff81603ddbd17ffe1db3560c01cdf1eaa3fc7a2fb4f1689dfd5b688e68cea45850913c70f26174770e4dfd1c82a694efc62e1ef9c8c0ea1efa5b949ef865a32b9839d39fd74aa05f19f7f845800937e2ce7a151cad5ae5a95db2695d9f773661fb60586c4330e62b15512401adb1904d54c526c6d70a743e5c0257dade1ffc6cd20d353938886f2f1b743dd915c9bde370a039cb7dd71a094a0460a46cc27fd6d03f9c6040a175a5316c2e2e480072eb8dbb8b58a5d96b4b7a6d3b4704521a29139133779f5e3110b6801df"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r2, 0x0, 0xcc0, 0x0, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 329.956500][ T8280] ldm_validate_privheads(): Disk read failed. [ 329.962786][ T8280] loop2: p1 p2 p3 < > p4 [ 330.026638][ T8280] loop2: partition table partially beyond EOD, truncated [ 330.042968][ T8297] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 [ 330.052055][ T8280] loop2: p1 start 10 is beyond EOD, truncated [ 330.081590][ T8280] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 330.115126][ T8280] loop2: p3 start 225 is beyond EOD, truncated [ 330.141719][ T8280] loop2: p4 size 3657465856 extends beyond EOD, truncated 20:26:19 executing program 5: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) syncfs(r0) 20:26:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:19 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$rds(0x15, 0x5, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) 20:26:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050000000a000000ff07000000ffffff81000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) 20:26:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020181ffffff0a000000ff0700000000000042000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) 20:26:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 331.754132][ T8321] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 [ 331.804333][ T8324] ldm_validate_privheads(): Disk read failed. [ 331.812431][ T8324] loop2: p1 p2 p3 < > p4 [ 331.850368][ T8324] loop2: partition table partially beyond EOD, truncated [ 331.868372][ T8328] loop4: p1 < > p2 p3 < > p4 [ 331.884337][ T8324] loop2: p1 start 10 is beyond EOD, truncated 20:26:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:19 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020181ffffff0a000000ff07000000ffffffa6000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) [ 331.914056][ T8328] loop4: partition table partially beyond EOD, truncated [ 331.948394][ T8324] loop2: p2 size 1073741824 extends beyond EOD, truncated 20:26:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) [ 331.973109][ T8328] loop4: p1 start 10 is beyond EOD, truncated [ 331.986431][ T8328] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 331.987173][ T8324] loop2: p3 start 225 is beyond EOD, truncated [ 332.014241][ T8328] loop4: p3 start 225 is beyond EOD, truncated 20:26:19 executing program 5: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) syncfs(r0) [ 332.027168][ T8328] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 332.044665][ T8324] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 332.073647][ T8341] loop3: p1 p2 p3 < > p4 [ 332.078187][ T8341] loop3: partition table partially beyond EOD, truncated [ 332.091462][ T8341] loop3: p1 start 10 is beyond EOD, truncated [ 332.102098][ T8341] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 332.116758][ T8341] loop3: p3 start 225 is beyond EOD, truncated 20:26:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 332.145389][ T8341] loop3: p4 size 3657465856 extends beyond EOD, truncated 20:26:19 executing program 4: ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) pipe(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 20:26:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 332.333166][ T8341] loop3: p1 p2 p3 < > p4 [ 332.337575][ T8341] loop3: partition table partially beyond EOD, truncated [ 332.363950][ T8341] loop3: p1 start 10 is beyond EOD, truncated 20:26:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 332.378186][ T8341] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 332.443624][ T8341] loop3: p3 start 225 is beyond EOD, truncated [ 332.451234][ T8341] loop3: p4 size 3657465856 extends beyond EOD, truncated 20:26:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020181ffffff0a000000ff0700000000000063000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) 20:26:19 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020181ffffff0a000000ff07000000ffffffa6000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) [ 332.690988][ T8379] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 20:26:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:20 executing program 4: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000009c0)=""/144, 0x90}], 0x1}}], 0x1, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000081c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/207, 0xcf}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 332.813729][ T8382] loop5: p1 p2 p3 < > p4 [ 332.818185][ T8382] loop5: partition table partially beyond EOD, truncated [ 332.891539][ T8382] loop5: p1 start 10 is beyond EOD, truncated [ 332.917626][ T8382] loop5: p2 size 1073741824 extends beyond EOD, truncated 20:26:20 executing program 2: getpid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 20:26:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 332.937297][ T8382] loop5: p3 start 225 is beyond EOD, truncated [ 332.953072][ T8382] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 332.960387][ T8392] loop3: p1 p2 p3 < > p4 [ 332.975091][ T8392] loop3: partition table partially beyond EOD, truncated [ 333.092652][ T8392] loop3: p1 start 10 is beyond EOD, truncated [ 333.119152][ T8407] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 [ 333.132921][ T8392] loop3: p2 size 1073741824 extends beyond EOD, truncated 20:26:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB], 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x1) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x4, 0x3, 0x800000000, 0x0, 0xff, 0x62160555], 0x0, 0xc00}) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x8001) r5 = dup2(r4, 0xffffffffffffffff) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000180)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 333.153524][ T8392] loop3: p3 start 225 is beyond EOD, truncated [ 333.183026][ T8392] loop3: p4 size 3657465856 extends beyond EOD, truncated 20:26:20 executing program 2: getpid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 20:26:20 executing program 4: getpid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 20:26:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) [ 333.481150][ T8430] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 20:26:20 executing program 3: getpid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 20:26:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:20 executing program 5: read$usbmon(0xffffffffffffffff, &(0x7f0000000380)=""/37, 0x25) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2000000000000022, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 20:26:21 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0xaaaaaaaaaaaacba, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cb], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:26:21 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:21 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) 20:26:21 executing program 5: read$usbmon(0xffffffffffffffff, &(0x7f0000000380)=""/37, 0x25) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2000000000000022, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 20:26:21 executing program 3: [ 334.041435][ T8448] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 [ 334.223284][ T8464] kvm [8449]: vcpu0, guest rIP: 0x48 Hyper-V uhandled wrmsr: 0x4000008b data 0xfffffffc 20:26:21 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:21 executing program 3: 20:26:21 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000024c0)=""/88, 0x58}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000081c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000d80)=""/207, 0xcf}, {&(0x7f00000008c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/171, 0xab}], 0x100000000000034d}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000c40)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 20:26:21 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b5d39f2ee1dcd7496f9d5dc531c2735147b9b"], 0x13) 20:26:21 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r0) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000580)=[{{&(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x10, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x38}]}}}], 0x10}}], 0x1, 0x0) [ 334.578039][ T8481] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 20:26:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x3, 0x0, 0x3, 0xa}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 20:26:22 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b5d39f2ee1dcd7496f9d5dc531c2735147b9b"], 0x13) 20:26:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000024c0)=""/88, 0x58}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000081c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000d80)=""/207, 0xcf}, {&(0x7f00000008c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/171, 0xab}], 0x100000000000034d}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000c40)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 20:26:22 executing program 2: 20:26:22 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:22 executing program 3: 20:26:22 executing program 4: 20:26:22 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r0) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:22 executing program 5: 20:26:22 executing program 2: [ 335.199087][ T8511] x_tables: eb_tables: limit.0 match: invalid size 32 (kernel) != (user) 0 20:26:22 executing program 3: 20:26:22 executing program 4: 20:26:22 executing program 2: 20:26:22 executing program 5: 20:26:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff000000000000000000000000000000e9ffffffffffffff000001000000000000000000000000000000000000ffffffff0100000005000000200000000000697036677265300000000000000001000000616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d6974000000b69981b1a8da344175f50db3a5de00000000000000000000000000000000000000000000000020000000000000000000003f82fa45000000000000000000000000f8ffffffffffffff0000000000636c7573746472000000000000000000000000000000000019f1d49a4f56f8241000000000000000000000000000000000000000000000004155444954000010000000000000000000000800000000000000000000000000000000000000000000f0ff0000000000000099a16a260000000000000000000000000000000001000000feffffff010000001100000000000000002f7eb54a6e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726764676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000020000000000000000000000000000800"/592]}, 0x2c8) 20:26:22 executing program 4: 20:26:22 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r0) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:22 executing program 3: 20:26:22 executing program 5: 20:26:22 executing program 2: 20:26:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:26:23 executing program 2: 20:26:23 executing program 3: 20:26:23 executing program 4: 20:26:23 executing program 5: 20:26:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x2c8) 20:26:23 executing program 3: 20:26:23 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:23 executing program 2: 20:26:23 executing program 5: 20:26:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x2c8) 20:26:23 executing program 3: 20:26:23 executing program 4: 20:26:23 executing program 2: 20:26:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x2c8) 20:26:23 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:23 executing program 5: 20:26:23 executing program 2: 20:26:23 executing program 3: 20:26:23 executing program 4: 20:26:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0}, 0x2c8) 20:26:24 executing program 5: 20:26:24 executing program 2: 20:26:24 executing program 3: 20:26:24 executing program 4: 20:26:24 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:24 executing program 5: 20:26:24 executing program 2: 20:26:24 executing program 4: 20:26:24 executing program 3: 20:26:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0}, 0x2c8) 20:26:24 executing program 2: 20:26:24 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) 20:26:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0}, 0x2c8) 20:26:24 executing program 5: 20:26:24 executing program 4: 20:26:24 executing program 2: 20:26:24 executing program 3: 20:26:24 executing program 5: 20:26:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) 20:26:25 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001800050000000000000000001d0100001500030000000000000000009afdc2d6e948a00600000000170001000000000000000000b337c236dcaa8d9b060000001500020000000007000000003501418fae07ebe6000000007b1bc2261e2c1de94b76979e3f6edce40cea00000000000004015e1db5"], 0x5c}}, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) [ 337.700353][ T8639] ================================================================== [ 337.708595][ T8639] BUG: KCSAN: data-race in ext4_itable_unused_count / ext4_itable_unused_set [ 337.717957][ T8639] [ 337.720418][ T8639] read to 0xffff88821ff8805c of 2 bytes by task 8642 on cpu 0: [ 337.727967][ T8639] ext4_itable_unused_count+0x26/0x90 [ 337.733327][ T8639] __ext4_get_inode_loc+0x7ee/0x960 [ 337.738522][ T8639] ext4_get_inode_loc+0x3f/0x50 [ 337.743733][ T8639] ext4_reserve_inode_write+0x7f/0x150 [ 337.749341][ T8639] ext4_mark_inode_dirty+0x7f/0x420 [ 337.754637][ T8639] ext4_ext_tree_init+0x92/0xb0 [ 337.759536][ T8639] __ext4_new_inode+0x2d94/0x2f10 [ 337.764647][ T8639] ext4_symlink+0x31c/0x9b0 [ 337.769146][ T8639] vfs_symlink+0x218/0x310 [ 337.774004][ T8639] do_symlinkat+0x1a5/0x1e0 [ 337.778510][ T8639] __x64_sys_symlink+0x3f/0x50 [ 337.783274][ T8639] do_syscall_64+0xcc/0x3a0 [ 337.787776][ T8639] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 337.793649][ T8639] [ 337.795976][ T8639] write to 0xffff88821ff8805c of 2 bytes by task 8639 on cpu 1: [ 337.803718][ T8639] ext4_itable_unused_set+0x29/0x90 [ 337.808922][ T8639] __ext4_new_inode+0x2894/0x2f10 [ 337.813975][ T8639] ext4_symlink+0x31c/0x9b0 [ 337.818583][ T8639] vfs_symlink+0x218/0x310 [ 337.823008][ T8639] do_symlinkat+0x1a5/0x1e0 [ 337.827505][ T8639] __x64_sys_symlink+0x3f/0x50 [ 337.832265][ T8639] do_syscall_64+0xcc/0x3a0 [ 337.836887][ T8639] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 337.843070][ T8639] [ 337.845388][ T8639] Reported by Kernel Concurrency Sanitizer on: [ 337.851546][ T8639] CPU: 1 PID: 8639 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 337.860208][ T8639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.870336][ T8639] ================================================================== [ 337.878396][ T8639] Kernel panic - not syncing: panic_on_warn set ... [ 337.884994][ T8639] CPU: 1 PID: 8639 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 337.893680][ T8639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.903755][ T8639] Call Trace: [ 337.907045][ T8639] dump_stack+0x11d/0x181 [ 337.911524][ T8639] panic+0x210/0x640 [ 337.915438][ T8639] ? vprintk_func+0x8d/0x140 [ 337.920035][ T8639] kcsan_report.cold+0xc/0xd [ 337.924749][ T8639] kcsan_setup_watchpoint+0x3fe/0x460 [ 337.930129][ T8639] __tsan_unaligned_write2+0xc7/0x110 [ 337.935510][ T8639] ext4_itable_unused_set+0x29/0x90 [ 337.940722][ T8639] __ext4_new_inode+0x2894/0x2f10 [ 337.945751][ T8639] ext4_symlink+0x31c/0x9b0 [ 337.950245][ T8639] vfs_symlink+0x218/0x310 [ 337.954656][ T8639] do_symlinkat+0x1a5/0x1e0 [ 337.959164][ T8639] __x64_sys_symlink+0x3f/0x50 [ 337.963934][ T8639] do_syscall_64+0xcc/0x3a0 [ 337.968536][ T8639] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 337.974432][ T8639] RIP: 0033:0x45b077 [ 337.978449][ T8639] Code: 0f 1f 00 b8 5c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 6d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.998585][ T8639] RSP: 002b:00007ffe57b9f5e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000058 [ 338.006990][ T8639] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045b077 [ 338.015050][ T8639] RDX: 00007ffe57b9f683 RSI: 00000000004c0eed RDI: 00007ffe57b9f670 [ 338.023037][ T8639] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000013 [ 338.031010][ T8639] R10: 0000000000000075 R11: 0000000000000206 R12: 0000000000000001 [ 338.038999][ T8639] R13: 00007ffe57b9f620 R14: 0000000000000000 R15: 00007ffe57b9f630 [ 338.050253][ T8639] Kernel Offset: disabled [ 338.054804][ T8639] Rebooting in 86400 seconds..