Warning: Permanently added '10.128.10.58' (ECDSA) to the list of known hosts. 2020/06/01 21:59:27 fuzzer started 2020/06/01 21:59:27 dialing manager at 10.128.0.26:35685 2020/06/01 21:59:27 syscalls: 2953 2020/06/01 21:59:27 code coverage: enabled 2020/06/01 21:59:27 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/06/01 21:59:27 extra coverage: enabled 2020/06/01 21:59:27 setuid sandbox: enabled 2020/06/01 21:59:27 namespace sandbox: enabled 2020/06/01 21:59:27 Android sandbox: enabled 2020/06/01 21:59:27 fault injection: enabled 2020/06/01 21:59:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/01 21:59:27 net packet injection: enabled 2020/06/01 21:59:27 net device setup: enabled 2020/06/01 21:59:27 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/06/01 21:59:27 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/01 21:59:27 USB emulation: /dev/raw-gadget does not exist 22:01:41 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) close(r0) syzkaller login: [ 229.334205][ T33] audit: type=1400 audit(1591048901.973:8): avc: denied { execmem } for pid=8829 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 229.621694][ T8830] IPVS: ftp: loaded support on port[0] = 21 [ 229.838562][ T8830] chnl_net:caif_netlink_parms(): no params data found [ 230.057502][ T8830] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.064866][ T8830] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.074210][ T8830] device bridge_slave_0 entered promiscuous mode [ 230.091592][ T8830] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.098798][ T8830] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.108610][ T8830] device bridge_slave_1 entered promiscuous mode [ 230.166128][ T8830] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.181829][ T8830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.234890][ T8830] team0: Port device team_slave_0 added [ 230.246230][ T8830] team0: Port device team_slave_1 added [ 230.292932][ T8830] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 230.300393][ T8830] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 230.327331][ T8830] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 230.346995][ T8830] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 230.354730][ T8830] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 230.380922][ T8830] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 230.586817][ T8830] device hsr_slave_0 entered promiscuous mode [ 230.841090][ T8830] device hsr_slave_1 entered promiscuous mode [ 231.248587][ T8830] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 231.408661][ T8830] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 231.487654][ T8830] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 231.556945][ T8830] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 231.867876][ T8830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.897240][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.906507][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.930130][ T8830] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.949826][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.959704][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.969306][ T32] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.976552][ T32] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.030486][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.039662][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.050156][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.059446][ T32] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.066629][ T32] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.075556][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.086530][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.097275][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.107529][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.117820][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.128059][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.158827][ T8830] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 232.169393][ T8830] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 232.231348][ T8830] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.259547][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.268300][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.278161][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.287737][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.297635][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.306733][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 232.314622][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.328632][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.366217][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.375968][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.401638][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.410907][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.434279][ T8830] device veth0_vlan entered promiscuous mode [ 232.453850][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.462746][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.482748][ T8830] device veth1_vlan entered promiscuous mode [ 232.536382][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 232.546051][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 232.555419][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.565149][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.591334][ T8830] device veth0_macvtap entered promiscuous mode [ 232.608796][ T8830] device veth1_macvtap entered promiscuous mode [ 232.647705][ T8830] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 232.655728][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 232.667356][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.676642][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.686608][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.714591][ T8830] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 232.722671][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.732640][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:01:45 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40047451, 0x790006) 22:01:46 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x2, 0x0, @mcast2={0x0, 0x2, [0xe803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x80, 0x0}, 0x0) 22:01:46 executing program 0: socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0xea}]}, 0xfa38) [ 233.999927][ C1] hrtimer: interrupt took 64162 ns 22:01:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x3, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000007780)={&(0x7f0000000000)=@caif, 0x80, 0x0}, 0x0) 22:01:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000300)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'], 0x20, 0x5}, 0x0) 22:01:47 executing program 0: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x40, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x40}}, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000070a0d00b977000000000000000000002c000e"], 0x1}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="050000001e00ab7bf2e14b37691a09c47876d003fc5a9e97240146c37ed7fedb845426d6d4b321cd916518733cf958b228720e82255a1aff2aac6be173fc54ca315ea91d632d9d8dbe82caf7fb004041013b6a4b11511d0f3fad114ecb2a6615a2ca0d425f6bd1963e2e45d57fcc43c0befbbb7c44584c30431f"], 0x1}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r2, &(0x7f0000000000)=""/234, 0xea) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000300)=0x81) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x1b}}) fsetxattr$security_evm(r3, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=@sha1={0x1, "d2fc8d1a370eb505255e147818caa0d8ea37bfaf"}, 0x15, 0x2) setuid(r1) creat(&(0x7f00000002c0)='./file0\x00', 0x100) open$dir(&(0x7f00000001c0)='./file0\x00', 0x10000, 0x123) openat$uhid(0xffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) r4 = getuid() setreuid(r1, r4) r5 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r5, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 22:01:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0xc008aec1, &(0x7f0000000000)=0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r3, &(0x7f0000000000)=""/234, 0xea) ioctl$SOUND_PCM_READ_CHANNELS(r3, 0x80045006, &(0x7f00000001c0)) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000540)=ANY=[@ANYBLOB="060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000072c2a03c286d5e17000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d20db865d4bef018f89cc5513807ea7fb9cb98fddbb1e2d014b91fe9a668481e7a3eb1d605327eeb8c1d57f02ede4cc17ce938889c1eeb616ad3c82d96722d5a2bf30bef6e6dd11990934c1045ee01c0b070e274706df6078cee5947ebe36eacd9f1201090e29000ddaf3b845d39d94a13b757bbad210538a02184bcb44886819912832b0600f06312589ee357c7770bbfb06001cef15e35a5a3d68"]) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000040)='syz\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x440, &(0x7f00000003c0)={'trans=virtio,', {[{@privport='privport'}], [{@euid_lt={'euid<', r6}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x38, 0x63, 0x37, 0x38, 0x37, 0x34, 0x34], 0x2d, [0x37, 0x37, 0x62, 0x62], 0x2d, [0x35, 0x35, 0x33, 0x1], 0x2d, [0x39, 0x31, 0x63, 0x38], 0x2d, [0x36, 0x32, 0x64, 0x33, 0x64, 0x65, 0x65, 0x66]}}}, {@obj_user={'obj_user', 0x3d, '[em0em0md5sumtrusted/nodev-%GPL'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@appraise='appraise'}]}}) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000052222ce453684732a2f7a9d845903379cb114d8f23a9a3b2dd1c0000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100736974001400028008000100", @ANYRES32=r7, @ANYBLOB="06000e00ff000000"], 0x40}}, 0x0) [ 235.287364][ T9087] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 235.331448][ T9087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8786 sclass=netlink_route_socket pid=9087 comm=syz-executor.0 [ 235.405413][ T9093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8786 sclass=netlink_route_socket pid=9093 comm=syz-executor.0 [ 235.480698][ T9098] IPVS: ftp: loaded support on port[0] = 21 22:01:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 235.734644][ T9098] chnl_net:caif_netlink_parms(): no params data found 22:01:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r2}, &(0x7f0000000000)) sched_getaffinity(r2, 0x8, &(0x7f0000000000)) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)={0x24, 0x0, 0xf, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x24}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_GET(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012002300010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYRESDEC, @ANYRES32=r9, @ANYBLOB="00226d1b19c88a8790d00300", @ANYRES16=r5, @ANYBLOB, @ANYBLOB="a407625d3f58f96e0177dbc6148651f96bf767ab96a7476c9ce448744e5e5c8e3f9630ae94190b62ba9195dc95d6ee075b359df74e4f9c94a92bf9bc3e03db77d7fb7d1e40201967d33e27a3936e3823d71fa3f65daf49d8ee6659badee19197009074aece6bd29caa8003e2afa65d37e79713076e6e978e044140c9b1cfd2a224c55fa79ff23cd35c9c56265316da04b29e09f2fe456e11218e336188728b07b31da883cdf111c7f64210c9795f9683e95f34981695cd9c8e5c6d57c2ebed24ffbea6bf0c32d0d651e2577f89667eb17979d17c6e2a1ca67b1b9a23abc2a5745ea983", @ANYBLOB="c27452b042838bafd7181f68200fa1ad6278a8360f8ba6e273f7028aff2ef999dcff12ae37b8fca75eecadb9bcb2a8f694583f5ddd50732c1b1cd2d01c2ae7715a49a94800"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1000}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000200)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x9}, @IFLA_GROUP={0x8, 0x1b, 0x3}]}, 0x30}}, 0x8008050) [ 235.932267][ T9098] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.940543][ T9098] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.949814][ T9098] device bridge_slave_0 entered promiscuous mode [ 236.010592][ T9098] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.018143][ T9098] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.034697][ T9098] device bridge_slave_1 entered promiscuous mode [ 236.153158][ T9098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.169398][ T9098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:01:48 executing program 0: creat(&(0x7f0000000680)='./bus\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0x11}, 0x2, 0x1) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 236.263966][ T9098] team0: Port device team_slave_0 added [ 236.284360][ T9098] team0: Port device team_slave_1 added [ 236.364887][ T33] audit: type=1804 audit(1591048909.005:9): pid=9267 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir417328777/syzkaller.H13kTR/9/bus" dev="sda1" ino=15727 res=1 [ 236.371081][ T9098] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 236.396091][ T9098] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.423209][ T9098] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 22:01:49 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) [ 236.448440][ T33] audit: type=1804 audit(1591048909.055:10): pid=9268 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir417328777/syzkaller.H13kTR/9/bus" dev="sda1" ino=15727 res=1 [ 236.496042][ T9098] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 236.503694][ T9098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.529804][ T9098] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 237.199843][ T9098] device hsr_slave_0 entered promiscuous mode 22:01:49 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) [ 237.248362][ T9098] device hsr_slave_1 entered promiscuous mode [ 237.308522][ T9098] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 237.316205][ T9098] Cannot create hsr debugfs directory 22:01:50 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) [ 237.800069][ T9098] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 238.152221][ T9098] netdevsim netdevsim1 netdevsim1: renamed from eth1 22:01:50 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) [ 238.214978][ T9098] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 238.275509][ T9098] netdevsim netdevsim1 netdevsim3: renamed from eth3 22:01:51 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) [ 238.739442][ T9098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.796200][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.805098][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.828225][ T9098] 8021q: adding VLAN 0 to HW filter on device team0 22:01:51 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) [ 238.860861][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.870656][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.881261][ T32] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.888601][ T32] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.985946][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.995354][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.005173][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.014457][ T32] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.021846][ T32] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.030883][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.041599][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.052386][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.062672][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.072917][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.083147][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.093388][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.103010][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.112528][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.122064][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.139971][ T9098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.213552][ T9098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.301777][ T9098] device veth0_vlan entered promiscuous mode [ 239.322193][ T9098] device veth1_vlan entered promiscuous mode [ 239.349882][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.359733][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.367569][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.375222][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.385114][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.395038][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.404441][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.414633][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 239.423826][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 239.461114][ T9098] device veth0_macvtap entered promiscuous mode [ 239.475928][ T9098] device veth1_macvtap entered promiscuous mode [ 239.507695][ T9098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 239.518792][ T9098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.532027][ T9098] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 239.543438][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.552939][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.561929][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 239.571698][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.581457][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 239.591553][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 239.601474][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.614065][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 239.631379][ T9098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 239.642094][ T9098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.655205][ T9098] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 239.664734][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 239.674660][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:01:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c00f10b508fae6ffcbe00000000000100000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002c0012800b00010062726964676500001c00028008001d000000000005001700000000000500190008000000"], 0x4c}}, 0x0) 22:01:53 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) 22:01:53 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) 22:01:53 executing program 1: openat$vga_arbiter(0xffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f6c6f6f573000b6091d05d503000000c53b00000d2a164427cb5cabd2f52847d7fe3ab537e8634fb8782fe4fd4f459ab776b73bacc370"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000140)={0x40, 0x5}) socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) ioctl$SNDRV_PCM_IOCTL_LINK(r0, 0x40044160, &(0x7f0000000080)=0x2) 22:01:53 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) [ 240.890121][ T9387] /dev/looW0: Can't open blockdev [ 240.935920][ T9388] /dev/looW0: Can't open blockdev 22:01:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x1b}}) sendmsg$alg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f00000000c0)="369aacdfc288d6da2fc70df339a6f248bc79ae124cb6f833c6dbf9a9391923aac82435", 0x23}, {&(0x7f0000001240)="6ad104c84e6d686c3c48c33982554e5e76ff42b57110260184f06e633bc2d249f382a32c489733e099c9722e208d3e76e7bf241887085b6df873755844eee18f5cb38895c8f412d424e94509c1f1d5c610038cf5764ebcac0ff72497f5b0cecf5837089db8380f94319d4d29f0951111fe871a7a0f1861ed95d0651a700b3a9b1e91f0128dd03ee390058956c69d2a00cbcaad1da4d2c2bb436ef8a18431bc35fa9ce463dd5f96b77aa4cbe71a614050d89d5c49b101ccbc50743aab2600107771fdc6c4f58d9c21f3b652fc06f1", 0xce}, {&(0x7f0000000140)="b9939d6a307577cb175acf0a62740d32cfd15d03dc9349d849a0097fa01f15b6851d3e5a73e5959c772c73a1aea02b5ff66c34da01ac40e72b5aa55af66781", 0x3f}, {&(0x7f0000001340)="ad591baabab9583fa632b15eba2cecc353f4d02a11e17e386510aeac1ef3ff27eafa12e7f7bd5133b543cad1541a89afe9963e9384b51c87fe1ed840ceab675d508ca54dbb615f6a62e3dfe8f43eca8072852cb8f4b4fa7717396bcf8cb08a2acfe74f7b", 0x64}, {&(0x7f00000013c0)="7f6c760173937b79dd3636ec3165cd65d6136d812bc4c7fd76f362cdd913122c3b41c461e06b2b06180365516cdbe838216f0568c3d5f1b07bc1536533f954499664c0335c4796d84a9c9115084a30d16aa2cd20fbe5403108d4c66a1ef51d1c8ce6b277577b5534cd62a4c61fa63f6fd9424fa399aae81051bccab8303f6bc0a9b3cd202a4882a7447e2f1e7c40", 0x8e}, {&(0x7f0000001480)="61006658a2760ac479837bc2512abe13ad0b685bbeb790f95b214047412ab91dd34d126befbdada8f2dfcbcff4341718e544d23683f822c635de34b9da3f79cbe2c79081c988e164a893d058b72e7d41bd8515a6aaa0b02facbef4118a032498ecb8313e5ef3817ff282ab2d3de4235eb3da0cb5c20f54b672671b30149b2fbd9ff9b5785a529f92653e91592ad943", 0x8f}], 0x7, &(0x7f0000001540)=[@op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10, 0x117, 0x4, 0x80000000}, @assoc={0x10, 0x117, 0x4, 0x5}, @iv={0x80, 0x117, 0x2, 0x6e, "b7fc8f5222fd7bd30dcf171fd3371c0df94d34fa63f96496a27286fad2445acfb1535ab4f2029e1b95ecdbae08bb1a77304396a5054eaffaa6735284dd782246025172356781631537105e730bd89446cc732e1c606fabe437a8c3140d7003e6dff0f57ffcdbccb4b34eb56110de"}], 0xb0, 0x4040080}, 0x0) chmod(&(0x7f0000000080)='./file0/file0\x00', 0x1df) symlink(&(0x7f0000000100)='./file0/file1/file0\x00', &(0x7f0000000200)='./file0/file0\x00') setuid(0xee01) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file1\x00') 22:01:53 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) 22:01:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000440)="44100901000000000000000100", 0xd) sendto$inet(r1, &(0x7f0000000000)="00080100000000", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0xfffffffffffffeb8) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000080)=0x5, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:01:54 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) 22:01:54 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 22:01:54 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 22:01:54 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001600ff8e334f274658e3ee00000000000000000014000a"], 0x2c}}, 0x0) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x43, 0x0, 0x0, 0x1}, 0x10) sendmmsg$alg(r0, &(0x7f00000000c0), 0x49249249249265a, 0x0) [ 242.441226][ T9418] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 22:01:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x3e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x8}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x1b}}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000000c0)={0x8, 0x1, 0x8, 0x0, 0x5, 0x1, 0x5}, 0xc) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x0, 0x76f}) ioctl$KDSETMODE(r0, 0x4b3a, 0x1) 22:01:55 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 22:01:55 executing program 1: r0 = openat$full(0xffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x48880, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @remote, 0x800001}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000380)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x10000}}, 0x10) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0xbddfc53e11597951, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x4c0, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) keyctl$chown(0x4, r4, 0xee00, 0x0) keyctl$set_timeout(0xf, r4, 0x4) r5 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x2, 0xfffffffd, @dev={0xfe, 0x80, [], 0x1b}, 0xffffffff}, {0xa, 0x4e23, 0x2, @local, 0xfeffffff}, 0x0, [0x6f, 0x0, 0x0, 0x3, 0x10009, 0x806da7, 0x8004, 0x1]}, 0x5c) setsockopt$inet6_int(r5, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0x4003a, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f}, {0xa, 0x4e24, 0x0, @mcast1, 0x3ff}, 0x7, [0x9, 0x2, 0x1, 0x1, 0x4d0e, 0x800, 0x8, 0x8ab4]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e23, 0xfffffffd, @dev={0xfe, 0x80, [], 0x33}, 0x2}, {0xa, 0x0, 0x0, @mcast1, 0x3}, 0x7, [0x6, 0x0, 0x1, 0x1, 0x7ff, 0x7fff, 0x8, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xc9, 0x0, 0x0) [ 243.195629][ T9434] IPVS: ftp: loaded support on port[0] = 21 [ 243.314200][ T9434] IPVS: ftp: loaded support on port[0] = 21 22:01:56 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 22:01:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000084, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="1b0000000000000000000000007b07cad3e1747b5bfc5bd8fbe8f4f24067c655bd8abfcf7dd9ea3c00"/52]}) shutdown(r2, 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 243.847025][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 243.869469][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:01:56 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x1b}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$iso9660(&(0x7f0000000280)='iso9660\x00', &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, 0x0, 0x40c0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}, {@block={'block'}}], [{@fsmagic={'fsmagic', 0x3d, 0xfff}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) socket$inet6_tcp(0xa, 0x1, 0x0) 22:01:56 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) [ 244.027590][ T885] tipc: TX() has been purged, node left! 22:01:56 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2f, 0x0, 0x93, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x0, 0x76f}) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0xa, &(0x7f0000000000)=[{0x9, 0x5}, {0xaf2e, 0x5}, {0x1, 0x7ff}, {0x0, 0xff}, {0x7fff, 0x800}, {0xf3c3, 0x40}, {0x0, 0x1f6d}, {0x8000, 0x7}, {0x7}, {0x3, 0x7fff}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x1b}}) connect$pptp(r2, &(0x7f0000000140)={0x18, 0x2, {0x2, @loopback}}, 0x1e) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40047451, 0x0) 22:01:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2f, 0x0, 0x93, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x0, 0x76f}) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0xa, &(0x7f0000000000)=[{0x9, 0x5}, {0xaf2e, 0x5}, {0x1, 0x7ff}, {0x0, 0xff}, {0x7fff, 0x800}, {0xf3c3, 0x40}, {0x0, 0x1f6d}, {0x8000, 0x7}, {0x7}, {0x3, 0x7fff}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x1b}}) connect$pptp(r2, &(0x7f0000000140)={0x18, 0x2, {0x2, @loopback}}, 0x1e) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40047451, 0x0) 22:01:57 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 22:01:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2f, 0x0, 0x93, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x0, 0x76f}) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0xa, &(0x7f0000000000)=[{0x9, 0x5}, {0xaf2e, 0x5}, {0x1, 0x7ff}, {0x0, 0xff}, {0x7fff, 0x800}, {0xf3c3, 0x40}, {0x0, 0x1f6d}, {0x8000, 0x7}, {0x7}, {0x3, 0x7fff}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x1b}}) connect$pptp(r2, &(0x7f0000000140)={0x18, 0x2, {0x2, @loopback}}, 0x1e) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40047451, 0x0) 22:01:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00004cd4000000", @ANYRES32=r7, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070005"], 0x3c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r7], 0x28}}, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r9) setfsgid(r9) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000dc0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x104}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r7}, @IFLA_HSR_SLAVE2={0x8, 0x2, r1}]}}}]}, 0x40}}, 0x0) 22:01:57 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000380)={0x18, 0x0, {0x1, @remote, 'macsec0\x00'}}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) [ 245.282642][ T9514] device veth0_to_hsr entered promiscuous mode [ 245.607141][ T9514] device batadv0 entered promiscuous mode 22:01:58 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read(r0, &(0x7f0000000000)=""/234, 0xea) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x2, 0x7, 0x7ff}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9}}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='\\g'], 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 22:01:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'\x00', 0x6}) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x1b}}) fsync(r2) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000400)=""/256, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x20, 0x400, 0xc}, 0x40) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x1b}}) dup3(r3, r0, 0x0) [ 245.851526][ C1] ===================================================== [ 245.858502][ C1] BUG: KMSAN: uninit-value in batadv_bla_tx+0x2675/0x3730 [ 245.865598][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.7.0-rc4-syzkaller #0 [ 245.873723][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.883761][ C1] Call Trace: [ 245.887048][ C1] dump_stack+0x1c9/0x220 [ 245.891378][ C1] kmsan_report+0xf7/0x1e0 [ 245.895779][ C1] __msan_warning+0x58/0xa0 [ 245.900352][ C1] batadv_bla_tx+0x2675/0x3730 [ 245.905104][ C1] ? do_get_thread_area+0x550/0x560 [ 245.910299][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 245.915488][ C1] batadv_interface_tx+0x67c/0x2450 [ 245.920674][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 245.926731][ C1] ? batadv_softif_is_valid+0xb0/0xb0 [ 245.932087][ C1] dev_hard_start_xmit+0x531/0xab0 [ 245.937188][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 245.942374][ C1] __dev_queue_xmit+0x2f8d/0x3b20 [ 245.947380][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 245.952572][ C1] ? skb_clone+0x404/0x5d0 [ 245.956975][ C1] dev_queue_xmit+0x4b/0x60 [ 245.961489][ C1] hsr_forward_skb+0x2614/0x30d0 [ 245.966416][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 245.971531][ C1] hsr_handle_frame+0x3be/0x500 [ 245.976372][ C1] ? hsr_port_exists+0x90/0x90 [ 245.981121][ C1] __netif_receive_skb_core+0x21ce/0x5870 [ 245.986825][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 245.992016][ C1] ? kmsan_internal_set_origin+0x75/0xb0 [ 245.997636][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 246.002733][ C1] process_backlog+0x936/0x1410 [ 246.007585][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 246.013637][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 246.018831][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 246.024024][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 246.029289][ C1] net_rx_action+0x786/0x1aa0 [ 246.033961][ C1] ? net_tx_action+0xc30/0xc30 [ 246.038722][ C1] __do_softirq+0x311/0x83d [ 246.043214][ C1] ? ksoftirqd_should_run+0x30/0x30 [ 246.048394][ C1] ? takeover_tasklets+0x8f0/0x8f0 [ 246.053485][ C1] run_ksoftirqd+0x25/0x40 [ 246.057885][ C1] smpboot_thread_fn+0x493/0x980 [ 246.062818][ C1] kthread+0x4b5/0x4f0 [ 246.066872][ C1] ? cpu_report_death+0x180/0x180 [ 246.071887][ C1] ? kthread_blkcg+0xf0/0xf0 [ 246.076463][ C1] ret_from_fork+0x35/0x40 [ 246.080863][ C1] [ 246.083169][ C1] Uninit was stored to memory at: [ 246.088177][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 246.093881][ C1] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 246.099946][ C1] kmsan_memcpy_metadata+0xb/0x10 [ 246.104972][ C1] __msan_memcpy+0x43/0x50 [ 246.109377][ C1] pskb_expand_head+0x38b/0x1b00 [ 246.114298][ C1] __skb_pad+0x47f/0x900 [ 246.118522][ C1] send_hsr_supervision_frame+0x122d/0x1500 [ 246.124397][ C1] hsr_announce+0x1e2/0x370 [ 246.128889][ C1] call_timer_fn+0x218/0x510 [ 246.133458][ C1] __run_timers+0xcff/0x1210 [ 246.138028][ C1] run_timer_softirq+0x2d/0x50 [ 246.142771][ C1] __do_softirq+0x311/0x83d [ 246.147246][ C1] [ 246.149551][ C1] Uninit was created at: [ 246.153776][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 246.159387][ C1] kmsan_alloc_page+0xb9/0x180 [ 246.164130][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 246.169657][ C1] page_frag_alloc+0x3ae/0x910 [ 246.174403][ C1] __netdev_alloc_skb+0x703/0xbb0 [ 246.179412][ C1] batadv_iv_ogm_queue_add+0x10da/0x1900 [ 246.185026][ C1] batadv_iv_ogm_schedule+0x10cb/0x1430 [ 246.190639][ C1] batadv_iv_send_outstanding_bat_ogm_packet+0xbae/0xd50 [ 246.197641][ C1] process_one_work+0x1555/0x1f40 [ 246.202659][ C1] worker_thread+0xef6/0x2450 [ 246.207317][ C1] kthread+0x4b5/0x4f0 [ 246.211368][ C1] ret_from_fork+0x35/0x40 [ 246.215769][ C1] ===================================================== [ 246.222678][ C1] Disabling lock debugging due to kernel taint [ 246.228805][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 246.235378][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G B 5.7.0-rc4-syzkaller #0 [ 246.244896][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.254929][ C1] Call Trace: [ 246.258206][ C1] dump_stack+0x1c9/0x220 [ 246.262534][ C1] panic+0x3d5/0xc3e [ 246.266444][ C1] kmsan_report+0x1df/0x1e0 [ 246.270932][ C1] __msan_warning+0x58/0xa0 [ 246.275430][ C1] batadv_bla_tx+0x2675/0x3730 [ 246.280265][ C1] ? do_get_thread_area+0x550/0x560 [ 246.285459][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 246.290660][ C1] batadv_interface_tx+0x67c/0x2450 [ 246.295846][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 246.301917][ C1] ? batadv_softif_is_valid+0xb0/0xb0 [ 246.307271][ C1] dev_hard_start_xmit+0x531/0xab0 [ 246.312369][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 246.317554][ C1] __dev_queue_xmit+0x2f8d/0x3b20 [ 246.322563][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 246.327756][ C1] ? skb_clone+0x404/0x5d0 [ 246.332158][ C1] dev_queue_xmit+0x4b/0x60 [ 246.336647][ C1] hsr_forward_skb+0x2614/0x30d0 [ 246.341571][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 246.346694][ C1] hsr_handle_frame+0x3be/0x500 [ 246.351531][ C1] ? hsr_port_exists+0x90/0x90 [ 246.356278][ C1] __netif_receive_skb_core+0x21ce/0x5870 [ 246.361983][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 246.367169][ C1] ? kmsan_internal_set_origin+0x75/0xb0 [ 246.372790][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 246.377887][ C1] process_backlog+0x936/0x1410 [ 246.382723][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 246.388771][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 246.393879][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 246.399075][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 246.404342][ C1] net_rx_action+0x786/0x1aa0 [ 246.409012][ C1] ? net_tx_action+0xc30/0xc30 [ 246.413761][ C1] __do_softirq+0x311/0x83d [ 246.418254][ C1] ? ksoftirqd_should_run+0x30/0x30 [ 246.423433][ C1] ? takeover_tasklets+0x8f0/0x8f0 [ 246.428526][ C1] run_ksoftirqd+0x25/0x40 [ 246.432926][ C1] smpboot_thread_fn+0x493/0x980 [ 246.437856][ C1] kthread+0x4b5/0x4f0 [ 246.441907][ C1] ? cpu_report_death+0x180/0x180 [ 246.446917][ C1] ? kthread_blkcg+0xf0/0xf0 [ 246.451504][ C1] ret_from_fork+0x35/0x40 [ 246.457189][ C1] Kernel Offset: 0xd000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 246.468748][ C1] Rebooting in 86400 seconds..