[ 97.107243][ T27] audit: type=1800 audit(1580326054.776:26): pid=9719 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 98.053992][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 98.054005][ T27] audit: type=1800 audit(1580326055.756:29): pid=9719 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 98.081641][ T27] audit: type=1800 audit(1580326055.756:30): pid=9719 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.155' (ECDSA) to the list of known hosts. 2020/01/29 19:27:44 fuzzer started 2020/01/29 19:27:46 dialing manager at 10.128.0.26:41885 2020/01/29 19:27:47 syscalls: 2935 2020/01/29 19:27:47 code coverage: enabled 2020/01/29 19:27:47 comparison tracing: enabled 2020/01/29 19:27:47 extra coverage: enabled 2020/01/29 19:27:47 setuid sandbox: enabled 2020/01/29 19:27:47 namespace sandbox: enabled 2020/01/29 19:27:47 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/29 19:27:47 fault injection: enabled 2020/01/29 19:27:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/29 19:27:47 net packet injection: enabled 2020/01/29 19:27:47 net device setup: enabled 2020/01/29 19:27:47 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/29 19:27:47 devlink PCI setup: PCI device 0000:00:10.0 is not available 19:30:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x362, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='statm\x00') preadv(r0, &(0x7f00000017c0), 0x1a2, 0x0) 19:30:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x3c) syzkaller login: [ 268.046714][ T9890] IPVS: ftp: loaded support on port[0] = 21 [ 268.204061][ T9890] chnl_net:caif_netlink_parms(): no params data found [ 268.258677][ T9890] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.266421][ T9890] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.276237][ T9890] device bridge_slave_0 entered promiscuous mode [ 268.286207][ T9890] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.294920][ T9890] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.303525][ T9890] device bridge_slave_1 entered promiscuous mode [ 268.329573][ T9890] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.344104][ T9890] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.370219][ T9890] team0: Port device team_slave_0 added [ 268.371734][ T9893] IPVS: ftp: loaded support on port[0] = 21 [ 268.380421][ T9890] team0: Port device team_slave_1 added [ 268.405162][ T9890] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 268.413129][ T9890] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.444349][ T9890] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 268.460139][ T9890] batman_adv: batadv0: Adding interface: batadv_slave_1 19:30:26 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 268.469154][ T9890] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.530534][ T9890] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 19:30:26 executing program 3: getpid() mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 268.666380][ T9890] device hsr_slave_0 entered promiscuous mode [ 268.703165][ T9890] device hsr_slave_1 entered promiscuous mode [ 268.793519][ T9895] IPVS: ftp: loaded support on port[0] = 21 [ 269.006709][ T9893] chnl_net:caif_netlink_parms(): no params data found [ 269.136404][ T9899] IPVS: ftp: loaded support on port[0] = 21 [ 269.163977][ T9895] chnl_net:caif_netlink_parms(): no params data found 19:30:26 executing program 4: open(0x0, 0x0, 0x0) mremap(&(0x7f000029a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000016b000/0x3000)=nil) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001440)=""/177, 0x18) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 269.183690][ T9890] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 269.285433][ T9890] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 269.355262][ T9890] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 269.420174][ T9890] netdevsim netdevsim0 netdevsim3: renamed from eth3 19:30:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000006400)={&(0x7f0000000300)={0x14, r1, 0x205, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) [ 269.510152][ T9901] IPVS: ftp: loaded support on port[0] = 21 [ 269.562873][ T9893] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.569967][ T9893] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.581764][ T9893] device bridge_slave_0 entered promiscuous mode [ 269.634949][ T9893] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.643894][ T9893] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.651929][ T9893] device bridge_slave_1 entered promiscuous mode [ 269.664401][ T9895] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.671627][ T9895] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.681940][ T9895] device bridge_slave_0 entered promiscuous mode [ 269.730377][ T9895] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.741611][ T9895] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.749944][ T9895] device bridge_slave_1 entered promiscuous mode [ 269.771844][ T9895] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 269.788697][ T9895] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 269.799519][ T9893] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 269.812429][ T9893] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 269.853798][ T9893] team0: Port device team_slave_0 added [ 269.879797][ T9903] IPVS: ftp: loaded support on port[0] = 21 [ 269.887204][ T9893] team0: Port device team_slave_1 added [ 269.897834][ T9895] team0: Port device team_slave_0 added [ 269.906407][ T9895] team0: Port device team_slave_1 added [ 269.958312][ T9899] chnl_net:caif_netlink_parms(): no params data found [ 269.984512][ T9893] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 269.991509][ T9893] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 270.018422][ T9893] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 270.055837][ T9895] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 270.062916][ T9895] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 270.089776][ T9895] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 270.101661][ T9893] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 270.109461][ T9893] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 270.136108][ T9893] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 270.163819][ T9895] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 270.170800][ T9895] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 270.197344][ T9895] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 270.286224][ T9893] device hsr_slave_0 entered promiscuous mode [ 270.323287][ T9893] device hsr_slave_1 entered promiscuous mode [ 270.362906][ T9893] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 270.370718][ T9893] Cannot create hsr debugfs directory [ 270.395879][ T9899] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.406520][ T9899] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.414608][ T9899] device bridge_slave_0 entered promiscuous mode [ 270.468346][ T9899] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.475615][ T9899] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.484384][ T9899] device bridge_slave_1 entered promiscuous mode [ 270.493990][ T9890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.501015][ T9901] chnl_net:caif_netlink_parms(): no params data found [ 270.556780][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.566155][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.618393][ T9895] device hsr_slave_0 entered promiscuous mode [ 270.673323][ T9895] device hsr_slave_1 entered promiscuous mode [ 270.713252][ T9895] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 270.720853][ T9895] Cannot create hsr debugfs directory [ 270.730105][ T9890] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.743877][ T9899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 270.757351][ T9899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 270.838624][ T9899] team0: Port device team_slave_0 added [ 270.847488][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.859056][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.868027][ T3224] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.875313][ T3224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.908546][ T9901] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.916065][ T9901] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.924302][ T9901] device bridge_slave_0 entered promiscuous mode [ 270.934627][ T9899] team0: Port device team_slave_1 added [ 270.940385][ T9901] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.947784][ T9901] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.957872][ T9901] device bridge_slave_1 entered promiscuous mode [ 270.969282][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.025992][ T9899] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 271.033321][ T9899] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.059354][ T9899] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 271.074331][ T9899] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 271.081301][ T9899] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.108036][ T9899] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 271.121839][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.134385][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.143794][ T3198] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.150860][ T3198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.161051][ T9901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.194752][ T9901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.228923][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.237719][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.247744][ T9903] chnl_net:caif_netlink_parms(): no params data found [ 271.304933][ T9899] device hsr_slave_0 entered promiscuous mode [ 271.353442][ T9899] device hsr_slave_1 entered promiscuous mode [ 271.392860][ T9899] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 271.400602][ T9899] Cannot create hsr debugfs directory [ 271.460094][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.469442][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.478493][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.487199][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.495878][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.529487][ T9901] team0: Port device team_slave_0 added [ 271.541650][ T9893] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 271.593592][ T9893] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 271.645732][ T9893] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 271.707224][ T9893] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 271.773665][ T9901] team0: Port device team_slave_1 added [ 271.785753][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.794822][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.804123][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.812462][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.856442][ T9890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 271.899488][ T9895] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 271.953618][ T9903] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.960722][ T9903] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.970601][ T9903] device bridge_slave_0 entered promiscuous mode [ 271.979982][ T9903] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.987624][ T9903] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.995880][ T9903] device bridge_slave_1 entered promiscuous mode [ 272.014339][ T9895] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 272.046097][ T9895] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 272.098817][ T9901] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 272.107875][ T9901] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 272.134497][ T9901] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 272.152119][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.160365][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.186980][ T9890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.194990][ T9895] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 272.266722][ T9901] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 272.274877][ T9901] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 272.301142][ T9901] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 272.339801][ T9903] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 272.389060][ T9903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 272.434947][ T9901] device hsr_slave_0 entered promiscuous mode [ 272.483287][ T9901] device hsr_slave_1 entered promiscuous mode [ 272.522840][ T9901] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 272.530433][ T9901] Cannot create hsr debugfs directory [ 272.590727][ T9903] team0: Port device team_slave_0 added [ 272.601751][ T9903] team0: Port device team_slave_1 added [ 272.619435][ T9899] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 272.690125][ T9899] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 272.766277][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.776871][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.801302][ T9899] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 272.851737][ T9899] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 272.943658][ T9903] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 272.950647][ T9903] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 272.977227][ T9903] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 273.003382][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 273.011843][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.020986][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.030179][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.052462][ T9903] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 273.059726][ T9903] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.086819][ T9903] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 273.126258][ T9890] device veth0_vlan entered promiscuous mode [ 273.176566][ T9903] device hsr_slave_0 entered promiscuous mode [ 273.233393][ T9903] device hsr_slave_1 entered promiscuous mode [ 273.292795][ T9903] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 273.300487][ T9903] Cannot create hsr debugfs directory [ 273.314757][ T9893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.341312][ T9890] device veth1_vlan entered promiscuous mode [ 273.391037][ T9895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.409933][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 273.424775][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.432520][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.444262][ T9893] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.468315][ T9895] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.497002][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 273.505192][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.514335][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.522062][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.531264][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.541234][ T2690] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.548372][ T2690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.556263][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.565108][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.573761][ T2690] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.580872][ T2690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.588974][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.646785][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.657973][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.667239][ T3223] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.674375][ T3223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.682362][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 273.691887][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.700808][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.709693][ T3223] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.716946][ T3223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.732091][ T9901] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 273.788203][ T9901] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 273.847214][ T9901] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 273.906739][ T9901] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 273.965605][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.983111][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.991769][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.029653][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.038570][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.047840][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.084745][ T9890] device veth0_macvtap entered promiscuous mode [ 274.097876][ T9890] device veth1_macvtap entered promiscuous mode [ 274.105721][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 274.115019][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 274.123323][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.131973][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.140653][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.149436][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.158863][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.167901][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.190181][ T9899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.220687][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.229997][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.238640][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.247525][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.256906][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.265821][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.274472][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.283017][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.300473][ T9893] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 274.314061][ T9893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 274.340600][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.349423][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.358456][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.366704][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.374669][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.383155][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.399451][ T9890] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 274.416626][ T9890] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 274.432181][ T9899] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.440201][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 274.449540][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.458677][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 274.467458][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.492154][ T9903] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 274.550531][ T9903] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 274.589766][ T9903] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 274.655751][ T9895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 274.675866][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.686482][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.695591][ T2690] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.703051][ T2690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.711781][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.720666][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.729283][ T2690] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.736382][ T2690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.744673][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.763033][ T9903] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 274.822819][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.831635][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 274.849334][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 274.896001][ T9895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 274.903790][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.914401][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 274.922521][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 274.938378][ T9893] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 275.019880][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 275.034243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.054721][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 19:30:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r10, 0x0) r11 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r11, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 275.105534][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 275.131238][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.154316][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 275.172230][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.181404][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 275.190229][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 275.232656][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 275.241409][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.251093][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 275.261018][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 275.278229][ T9899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 275.291146][ T9901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.312569][ T9895] device veth0_vlan entered promiscuous mode 19:30:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r10, 0x0) r11 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r11, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 275.339152][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 275.348937][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.369736][ T9895] device veth1_vlan entered promiscuous mode [ 275.413784][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.421699][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.440510][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 275.458197][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 275.470550][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.482425][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.495510][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 19:30:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r10, 0x0) r11 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r11, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 275.525483][ T9893] device veth0_vlan entered promiscuous mode [ 275.541150][ T9901] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.555864][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 275.570054][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.590887][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.599614][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.607932][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.638463][ T9899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 275.694934][ T9903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.702891][ T9893] device veth1_vlan entered promiscuous mode [ 275.714048][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 275.724431][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.733577][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 19:30:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r10, 0x0) r11 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r11, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 275.742193][ T3198] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.749401][ T3198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.759244][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.803648][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.818507][ T3198] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.825706][ T3198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.833654][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 275.842949][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:30:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r10, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 275.935666][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.954267][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 275.971037][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.980514][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 275.995635][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.006563][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.014966][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.023394][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 19:30:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r10, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 276.035828][ T9895] device veth0_macvtap entered promiscuous mode [ 276.080248][ T9895] device veth1_macvtap entered promiscuous mode [ 276.102646][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 276.119107][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 276.129567][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 276.145936][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.159490][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.169840][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.179357][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 276.188650][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.197880][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.207476][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.221559][ T9893] device veth0_macvtap entered promiscuous mode 19:30:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r10, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 276.232010][ T9903] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.252235][ T9901] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 276.268340][ T9901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 276.287347][ T9893] device veth1_macvtap entered promiscuous mode [ 276.296549][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 276.306186][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 276.314856][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 276.329626][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.370493][ T9895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.388145][ T9895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.401090][ T9895] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 276.428633][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.437778][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.448894][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.457993][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.467958][ T2690] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.475235][ T2690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.483526][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.521284][ T9895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.532035][ T9895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.545872][ T9895] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 276.561440][ T9899] device veth0_vlan entered promiscuous mode [ 276.570814][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.580104][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.589016][ T2690] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.596187][ T2690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.605093][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.614376][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 276.621912][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.630028][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.638958][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 276.647681][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 276.657422][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.674934][ T9901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 276.693731][ T9893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.705034][ T9893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.715732][ T9893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.726853][ T9893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.740395][ T9893] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 276.752518][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.761137][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.769563][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.780810][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.790054][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.808710][ T9899] device veth1_vlan entered promiscuous mode [ 276.821567][ T9893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.842740][ T9893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.859653][ T9893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.870614][ T9893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.900255][ T9893] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 276.937465][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.953711][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 276.963615][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.980164][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.989968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 277.015748][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 277.036422][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.071638][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.080979][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.099548][ T9903] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 277.119189][ T9903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 277.152974][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.161547][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.170573][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 277.181747][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.231581][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.246517][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.257639][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 277.270186][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 277.291283][ T9903] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 277.306189][ T9899] device veth0_macvtap entered promiscuous mode [ 277.351086][ T9901] device veth0_vlan entered promiscuous mode [ 277.397088][ T9899] device veth1_macvtap entered promiscuous mode [ 277.417826][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 277.435712][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.445244][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 277.454940][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.465069][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.473371][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.500652][ T9901] device veth1_vlan entered promiscuous mode 19:30:35 executing program 1: r0 = getpid() r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000003c0)=0x17642c4) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x1}}, 0x28) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 19:30:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r10, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 277.561636][ T9899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 277.583859][ T9899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.601055][ T9899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 277.637784][ T9899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.659961][ T9899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 277.671267][ T9899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.686217][ T9899] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 277.713797][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 277.722334][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 277.768104][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.778031][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.805803][ T9899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.818157][ T9899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.828144][ T9899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.838785][ T9899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.849306][ T9899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.860310][ T9899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.872456][ T9899] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 277.888823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 277.898471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.907472][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.918248][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.927344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 277.937414][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 277.951577][ T9901] device veth0_macvtap entered promiscuous mode [ 277.990590][ T9901] device veth1_macvtap entered promiscuous mode [ 278.008317][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 278.018718][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 278.030279][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 278.040579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 278.049046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 278.072644][ T9903] device veth0_vlan entered promiscuous mode [ 278.108882][ T9901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.123916][ T9901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.137016][ T9901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.148384][ T9901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 19:30:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x34c, 0x1c0, 0xdc, 0x0, 0x0, 0x0, 0x2b8, 0x2b8, 0x2b8, 0x2b8, 0x2b8, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xdc}, @common=@unspec=@NFLOG={0x6c, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "6a4e2208e9349cb075a56180ec20acd5bcfbb98bbd94cb9b8b7bf2c500f7a2cea54a0ea96a0c18ec0bb6bc50ac9d70537d3900"}}}, {{@uncond, 0x0, 0xc0, 0xe4, 0x0, {}, [@common=@ttl={{0x24, 'ttl\x00'}}, @common=@addrtype={{0x2c, 'addrtype\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0xd4, 0xf8, 0x0, {}, [@common=@inet=@iprange={{0x64, 'iprange\x00'}, {@ipv6=@local, @ipv4, @ipv4=@multicast2, @ipv6=@mcast1}}]}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3a8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='veth1_to_team\x00', 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 278.158796][ T9901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.169306][ T9901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.181212][ T9901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.192209][ T9901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.205525][ T9901] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 278.218589][ T9903] device veth1_vlan entered promiscuous mode [ 278.227345][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 278.240094][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 278.250360][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 278.270838][ T9901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.289081][ T9901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.300214][ T9901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.310966][ T9901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.321283][ T9901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.331839][ T9901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.343086][ T9901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.353757][ T9901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.365439][ T9901] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 278.393114][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 278.402413][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 278.411730][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 278.456863][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 278.474112][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 278.506694][ T9903] device veth0_macvtap entered promiscuous mode [ 278.524961][ T9903] device veth1_macvtap entered promiscuous mode [ 278.592078][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.649348][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.668287][ C1] hrtimer: interrupt took 28261 ns [ 278.671704][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.684603][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.695356][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.707471][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.717850][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.728883][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.739687][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.751307][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.764967][ T9903] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 278.776963][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 278.787858][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 278.834981][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 278.854116][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 278.867299][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.879334][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.890139][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.901637][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.911976][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.922642][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.932561][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.943814][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.954072][ T9903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.964569][ T9903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.980010][ T9903] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 278.993559][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 279.002391][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 19:30:38 executing program 4: open(0x0, 0x0, 0x0) mremap(&(0x7f000029a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000016b000/0x3000)=nil) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001440)=""/177, 0x18) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:30:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x24, r2, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_PEER_PORT={0x6}, @FOU_ATTR_PEER_V4={0x8, 0x8, @empty=0xe0000000}]}, 0x24}}, 0x0) 19:30:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) 19:30:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) r10 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r10, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000006400)={&(0x7f0000000300)={0x14, r1, 0x205, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 19:30:38 executing program 5: open(0x0, 0x0, 0x0) mremap(&(0x7f000029a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000016b000/0x3000)=nil) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001440)=""/177, 0x18) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:30:38 executing program 2: get_robust_list(0x0, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) 19:30:38 executing program 3: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) keyctl$read(0xb, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:30:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockname(r1, &(0x7f0000000080)=@pppol2tp, &(0x7f0000000100)=0x80) 19:30:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r10, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:38 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x0) recvmmsg(r0, &(0x7f0000007080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000100, 0x0) 19:30:38 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}], 0x6) 19:30:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x5c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x5c}, 0x1, 0xf00}, 0x0) 19:30:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r1, r0, 0x0, 0x7fffffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201}) 19:30:39 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}], 0x6) 19:30:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) r10 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r10, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:39 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) clock_gettime(0x0, &(0x7f0000000100)={0x0}) sendmsg$can_bcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x5, 0x7ab0715dca68fab7, 0x0, {r1}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "51d5205e4ca4b888d40047c373217650aca3af680c0859767c815dad738690b20cf465f6ef18683b77224a9922dd0c52d6f5d97258d9a57813437b6fc92af87b"}}, 0x80}}, 0x0) [ 282.204305][T10056] IPv6: ADDRCONF(NETDEV_CHANGE): rose0: link becomes ready [ 282.888764][ T27] audit: type=1800 audit(1580326240.586:31): pid=10050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="cpuacct.usage_user" dev="sda1" ino=16523 res=0 19:30:41 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vxcan1\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f000000ef80)=ANY=[@ANYBLOB="01000000020800001000000010000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000020000000000000000000000790eaada477f17eb046695eea58af88d0ba3b8f5ca34f33a9a82d81e455bc6ca3479893215467e3bb85ea1247aafde2b17277187bd8fc023bb972d19343108b0"], 0x2000f000}}, 0x0) 19:30:41 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}], 0x6) 19:30:41 executing program 3: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xfffffffffffffe07, 0x0, 0x0, 0xfffffe53) 19:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r9, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:41 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'rose0\x00'}) 19:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r9, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:41 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}], 0x6) 19:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r8, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:41 executing program 3: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xfffffffffffffe07, 0x0, 0x0, 0xfffffe53) 19:30:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r8, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:41 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000006c0), 0x10) connect$can_bcm(r0, &(0x7f0000000000), 0x10) 19:30:41 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'rose0\x00'}) 19:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:41 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:41 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000006c0), 0x10) connect$can_bcm(r0, &(0x7f0000000000), 0x10) 19:30:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:41 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 19:30:42 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000006c0), 0x10) connect$can_bcm(r0, &(0x7f0000000000), 0x10) 19:30:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$cont(0x20, r0, 0x0, 0x0) 19:30:42 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4de) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0}, 0x0) 19:30:42 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000006c0), 0x10) connect$can_bcm(r0, &(0x7f0000000000), 0x10) 19:30:42 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) 19:30:42 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_PORT_TO={0x6}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) 19:30:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105482) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x0) pwritev(r1, &(0x7f0000000440)=[{&(0x7f0000000480)="a8", 0xfede}], 0x1, 0x81000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write(r0, &(0x7f0000000000), 0x52698b21) 19:30:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 19:30:42 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000), 0x4) sendmsg$tipc(r0, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000b00)=[{{&(0x7f00000001c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/192, 0xc0}], 0x1}}], 0x1, 0x0, 0x0) 19:30:42 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) [ 285.133055][ C0] ================================================================== [ 285.141552][ C0] BUG: KASAN: slab-out-of-bounds in bitmap_port_gc+0x112/0x4f0 [ 285.149101][ C0] Read of size 8 at addr ffff8880a360a240 by task udevd/9860 [ 285.156489][ C0] [ 285.158825][ C0] CPU: 0 PID: 9860 Comm: udevd Not tainted 5.5.0-rc6-next-20200116-syzkaller #0 [ 285.167840][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.177894][ C0] Call Trace: [ 285.181179][ C0] [ 285.184160][ C0] dump_stack+0x197/0x210 [ 285.188604][ C0] ? bitmap_port_gc+0x112/0x4f0 [ 285.195364][ C0] print_address_description.constprop.0.cold+0xd4/0x30b [ 285.202389][ C0] ? bitmap_port_gc+0x112/0x4f0 [ 285.207352][ C0] ? bitmap_port_gc+0x112/0x4f0 [ 285.212243][ C0] __kasan_report.cold+0x1b/0x32 [ 285.217170][ C0] ? bitmap_port_gc+0x112/0x4f0 [ 285.222040][ C0] kasan_report+0x12/0x20 [ 285.226425][ C0] check_memory_region+0x134/0x1a0 [ 285.231539][ C0] __kasan_check_read+0x11/0x20 [ 285.236401][ C0] bitmap_port_gc+0x112/0x4f0 [ 285.241160][ C0] call_timer_fn+0x1ac/0x780 [ 285.245797][ C0] ? bitmap_port_test+0x170/0x170 [ 285.250869][ C0] ? msleep_interruptible+0x150/0x150 [ 285.256239][ C0] ? run_timer_softirq+0x6b1/0x1790 [ 285.261521][ C0] ? trace_hardirqs_on+0x67/0x240 [ 285.266559][ C0] ? bitmap_port_test+0x170/0x170 [ 285.271599][ C0] ? bitmap_port_test+0x170/0x170 [ 285.276629][ C0] run_timer_softirq+0x6c3/0x1790 [ 285.281668][ C0] ? add_timer+0x930/0x930 [ 285.286149][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 285.292314][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 285.297899][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 285.303889][ C0] ? trace_hardirqs_on+0x67/0x240 [ 285.309509][ C0] __do_softirq+0x262/0x98c [ 285.314097][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 285.319127][ C0] irq_exit+0x19b/0x1e0 [ 285.323307][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 285.328848][ C0] apic_timer_interrupt+0xf/0x20 [ 285.334692][ C0] [ 285.337798][ C0] RIP: 0010:tomoyo_domain_quota_is_ok+0x335/0x540 [ 285.344688][ C0] Code: 89 f7 e8 be 19 0c fe 45 85 ff 74 09 e8 34 18 0c fe 41 83 c6 01 e8 2b 18 0c fe 8d 73 01 bf 10 00 00 00 83 c3 01 e8 5b 19 0c fe <83> fb 10 75 bf e9 a5 fd ff ff 41 bc 01 00 00 00 eb 93 45 31 ed eb [ 285.364408][ C0] RSP: 0018:ffffc90001fa7870 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 285.373470][ C0] RAX: 0000000000000000 RBX: 000000000000000d RCX: ffffffff83697fb5 [ 285.381435][ C0] RDX: 000000000000000d RSI: 0000000000000010 RDI: 0000000000000001 [ 285.389399][ C0] RBP: ffffc90001fa78b0 R08: ffff88808bbee480 R09: fffffbfff17464f1 [ 285.397558][ C0] R10: fffffbfff17464f0 R11: ffffffff8ba32787 R12: ffff88809a3bb000 [ 285.405868][ C0] R13: 0000000000000022 R14: 0000000000000267 R15: 0000000000000000 [ 285.413849][ C0] ? tomoyo_domain_quota_is_ok+0x335/0x540 [ 285.419733][ C0] tomoyo_supervisor+0x286/0xe60 [ 285.424678][ C0] ? tomoyo_update_stat+0x80/0x80 [ 285.429733][ C0] ? __kasan_check_read+0x11/0x20 [ 285.434971][ C0] ? mark_lock+0xc2/0x1220 [ 285.439555][ C0] ? kfree+0x226/0x2c0 [ 285.443635][ C0] ? tomoyo_realpath_from_path+0x1a7/0x660 [ 285.449438][ C0] ? kfree+0x226/0x2c0 [ 285.453602][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.459948][ C0] ? tomoyo_check_path_acl+0x91/0x130 [ 285.465332][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 285.471572][ C0] ? tomoyo_check_acl+0x229/0x3e0 [ 285.476589][ C0] tomoyo_path_permission+0x263/0x360 [ 285.482781][ C0] ? tomoyo_fill_path_info+0x23c/0x430 [ 285.488339][ C0] tomoyo_path_perm+0x318/0x430 [ 285.493340][ C0] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 285.499430][ C0] ? __d_lookup+0x618/0x750 [ 285.504069][ C0] ? __d_lookup+0x42a/0x750 [ 285.508852][ C0] tomoyo_path_unlink+0x9b/0xe0 [ 285.513831][ C0] ? tomoyo_path_rmdir+0xe0/0xe0 [ 285.518830][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.525570][ C0] security_path_unlink+0xfa/0x160 [ 285.531191][ C0] do_unlinkat+0x3b7/0x6d0 [ 285.535599][ C0] ? __ia32_sys_rmdir+0x40/0x40 [ 285.540455][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.546686][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.552931][ C0] ? getname_flags+0x277/0x5b0 [ 285.557698][ C0] __x64_sys_unlink+0x42/0x50 [ 285.562422][ C0] do_syscall_64+0xfa/0x790 [ 285.566915][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.572967][ C0] RIP: 0033:0x7f426b01c5d7 [ 285.577365][ C0] Code: 48 3d 00 f0 ff ff 77 03 48 98 c3 48 8b 15 59 38 2b 00 f7 d8 64 89 02 48 83 c8 ff c3 90 90 90 90 90 90 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 31 38 2b 00 31 d2 48 29 c2 64 [ 285.597326][ C0] RSP: 002b:00007ffd3b93e758 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 285.606027][ C0] RAX: ffffffffffffffda RBX: 0000000002243f60 RCX: 00007f426b01c5d7 [ 285.613993][ C0] RDX: 00007ffd3b93e782 RSI: 000000000041cce6 RDI: 00007ffd3b93e770 [ 285.622224][ C0] RBP: 000000000222b250 R08: 0000000000000000 R09: 0000000000000001 [ 285.630181][ C0] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000000005f [ 285.638237][ C0] R13: 0000000000625500 R14: 000000000222b250 R15: 000000000000000b [ 285.646572][ C0] [ 285.649098][ C0] Allocated by task 10113: [ 285.653865][ C0] save_stack+0x23/0x90 [ 285.658102][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 285.663720][ C0] kasan_kmalloc+0x9/0x10 [ 285.668058][ C0] __kmalloc+0x163/0x770 [ 285.672294][ C0] ip_set_alloc+0x38/0x5e [ 285.676610][ C0] bitmap_port_create+0x3dc/0x7c0 [ 285.681630][ C0] ip_set_create+0x6f1/0x1500 [ 285.686533][ C0] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 285.691475][ C0] netlink_rcv_skb+0x177/0x450 [ 285.696803][ C0] nfnetlink_rcv+0x1ba/0x460 [ 285.701497][ C0] netlink_unicast+0x59e/0x7e0 [ 285.706684][ C0] netlink_sendmsg+0x91c/0xea0 [ 285.711546][ C0] sock_sendmsg+0xd7/0x130 [ 285.715967][ C0] ____sys_sendmsg+0x753/0x880 [ 285.723060][ C0] ___sys_sendmsg+0x100/0x170 [ 285.727806][ C0] __sys_sendmsg+0x105/0x1d0 [ 285.732379][ C0] __x64_sys_sendmsg+0x78/0xb0 [ 285.737308][ C0] do_syscall_64+0xfa/0x790 [ 285.741805][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.747678][ C0] [ 285.750060][ C0] Freed by task 9900: [ 285.754191][ C0] save_stack+0x23/0x90 [ 285.758345][ C0] __kasan_slab_free+0x102/0x150 [ 285.763274][ C0] kasan_slab_free+0xe/0x10 [ 285.767850][ C0] kfree+0x10a/0x2c0 [ 285.771858][ C0] tomoyo_check_open_permission+0x19e/0x3e0 [ 285.777743][ C0] tomoyo_file_open+0xa9/0xd0 [ 285.782406][ C0] security_file_open+0x71/0x300 [ 285.787470][ C0] do_dentry_open+0x365/0x1350 [ 285.792356][ C0] vfs_open+0xa0/0xd0 [ 285.796427][ C0] path_openat+0x12fd/0x34d0 [ 285.801794][ C0] do_filp_open+0x192/0x260 [ 285.806369][ C0] do_sys_openat2+0x633/0x840 [ 285.811115][ C0] do_sys_open+0xfc/0x190 [ 285.815476][ C0] __x64_sys_open+0x7e/0xc0 [ 285.819980][ C0] do_syscall_64+0xfa/0x790 [ 285.825093][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.830967][ C0] [ 285.833282][ C0] The buggy address belongs to the object at ffff8880a360a240 [ 285.833282][ C0] which belongs to the cache kmalloc-32 of size 32 [ 285.847151][ C0] The buggy address is located 0 bytes inside of [ 285.847151][ C0] 32-byte region [ffff8880a360a240, ffff8880a360a260) [ 285.860177][ C0] The buggy address belongs to the page: [ 285.865813][ C0] page:ffffea00028d8280 refcount:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff8880a360afc1 [ 285.876995][ C0] flags: 0xfffe0000000200(slab) [ 285.883885][ C0] raw: 00fffe0000000200 ffffea000276e308 ffffea00027e0a88 ffff8880aa4001c0 [ 285.895204][ C0] raw: ffff8880a360afc1 ffff8880a360a000 000000010000003f 0000000000000000 [ 285.903951][ C0] page dumped because: kasan: bad access detected [ 285.910578][ C0] [ 285.912945][ C0] Memory state around the buggy address: [ 285.918616][ C0] ffff8880a360a100: fb fb fb fb fc fc fc fc 06 fc fc fc fc fc fc fc [ 285.926766][ C0] ffff8880a360a180: 06 fc fc fc fc fc fc fc 06 fc fc fc fc fc fc fc [ 285.934869][ C0] >ffff8880a360a200: 06 fc fc fc fc fc fc fc 04 fc fc fc fc fc fc fc [ 285.943168][ C0] ^ [ 285.949404][ C0] ffff8880a360a280: 06 fc fc fc fc fc fc fc 06 fc fc fc fc fc fc fc [ 285.957838][ C0] ffff8880a360a300: 06 fc fc fc fc fc fc fc 06 fc fc fc fc fc fc fc [ 285.966883][ C0] ================================================================== [ 285.975061][ C0] Disabling lock debugging due to kernel taint [ 285.981471][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 285.988107][ C0] CPU: 0 PID: 9860 Comm: udevd Tainted: G B 5.5.0-rc6-next-20200116-syzkaller #0 [ 285.998969][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.010207][ C0] Call Trace: [ 286.013496][ C0] [ 286.016347][ C0] dump_stack+0x197/0x210 [ 286.020666][ C0] panic+0x2e3/0x75c [ 286.024572][ C0] ? add_taint.cold+0x16/0x16 [ 286.029276][ C0] ? retint_kernel+0x2b/0x2b [ 286.033866][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 286.039076][ C0] ? bitmap_port_gc+0x112/0x4f0 [ 286.043965][ C0] end_report+0x47/0x4f [ 286.048112][ C0] ? bitmap_port_gc+0x112/0x4f0 [ 286.052986][ C0] __kasan_report.cold+0xe/0x32 [ 286.057882][ C0] ? bitmap_port_gc+0x112/0x4f0 [ 286.062738][ C0] kasan_report+0x12/0x20 [ 286.067166][ C0] check_memory_region+0x134/0x1a0 [ 286.072369][ C0] __kasan_check_read+0x11/0x20 [ 286.077203][ C0] bitmap_port_gc+0x112/0x4f0 [ 286.081864][ C0] call_timer_fn+0x1ac/0x780 [ 286.086433][ C0] ? bitmap_port_test+0x170/0x170 [ 286.091577][ C0] ? msleep_interruptible+0x150/0x150 [ 286.097017][ C0] ? run_timer_softirq+0x6b1/0x1790 [ 286.102715][ C0] ? trace_hardirqs_on+0x67/0x240 [ 286.108077][ C0] ? bitmap_port_test+0x170/0x170 [ 286.113184][ C0] ? bitmap_port_test+0x170/0x170 [ 286.118346][ C0] run_timer_softirq+0x6c3/0x1790 [ 286.123427][ C0] ? add_timer+0x930/0x930 [ 286.127876][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 286.134016][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 286.139695][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 286.145674][ C0] ? trace_hardirqs_on+0x67/0x240 [ 286.150717][ C0] __do_softirq+0x262/0x98c [ 286.155211][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 286.160044][ C0] irq_exit+0x19b/0x1e0 [ 286.164212][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 286.169746][ C0] apic_timer_interrupt+0xf/0x20 [ 286.174675][ C0] [ 286.177607][ C0] RIP: 0010:tomoyo_domain_quota_is_ok+0x335/0x540 [ 286.184138][ C0] Code: 89 f7 e8 be 19 0c fe 45 85 ff 74 09 e8 34 18 0c fe 41 83 c6 01 e8 2b 18 0c fe 8d 73 01 bf 10 00 00 00 83 c3 01 e8 5b 19 0c fe <83> fb 10 75 bf e9 a5 fd ff ff 41 bc 01 00 00 00 eb 93 45 31 ed eb [ 286.203726][ C0] RSP: 0018:ffffc90001fa7870 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 286.212351][ C0] RAX: 0000000000000000 RBX: 000000000000000d RCX: ffffffff83697fb5 [ 286.220370][ C0] RDX: 000000000000000d RSI: 0000000000000010 RDI: 0000000000000001 [ 286.228333][ C0] RBP: ffffc90001fa78b0 R08: ffff88808bbee480 R09: fffffbfff17464f1 [ 286.236525][ C0] R10: fffffbfff17464f0 R11: ffffffff8ba32787 R12: ffff88809a3bb000 [ 286.244983][ C0] R13: 0000000000000022 R14: 0000000000000267 R15: 0000000000000000 [ 286.253142][ C0] ? tomoyo_domain_quota_is_ok+0x335/0x540 [ 286.259381][ C0] tomoyo_supervisor+0x286/0xe60 [ 286.264334][ C0] ? tomoyo_update_stat+0x80/0x80 [ 286.269487][ C0] ? __kasan_check_read+0x11/0x20 [ 286.274501][ C0] ? mark_lock+0xc2/0x1220 [ 286.279050][ C0] ? kfree+0x226/0x2c0 [ 286.283237][ C0] ? tomoyo_realpath_from_path+0x1a7/0x660 [ 286.290027][ C0] ? kfree+0x226/0x2c0 [ 286.294100][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.300329][ C0] ? tomoyo_check_path_acl+0x91/0x130 [ 286.306060][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 286.312298][ C0] ? tomoyo_check_acl+0x229/0x3e0 [ 286.317315][ C0] tomoyo_path_permission+0x263/0x360 [ 286.322685][ C0] ? tomoyo_fill_path_info+0x23c/0x430 [ 286.328174][ C0] tomoyo_path_perm+0x318/0x430 [ 286.333019][ C0] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 286.339182][ C0] ? __d_lookup+0x618/0x750 [ 286.343715][ C0] ? __d_lookup+0x42a/0x750 [ 286.348209][ C0] tomoyo_path_unlink+0x9b/0xe0 [ 286.353137][ C0] ? tomoyo_path_rmdir+0xe0/0xe0 [ 286.358685][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.365293][ C0] security_path_unlink+0xfa/0x160 [ 286.370398][ C0] do_unlinkat+0x3b7/0x6d0 [ 286.374827][ C0] ? __ia32_sys_rmdir+0x40/0x40 [ 286.379840][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.386100][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.392623][ C0] ? getname_flags+0x277/0x5b0 [ 286.397447][ C0] __x64_sys_unlink+0x42/0x50 [ 286.402110][ C0] do_syscall_64+0xfa/0x790 [ 286.406960][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.414019][ C0] RIP: 0033:0x7f426b01c5d7 [ 286.418441][ C0] Code: 48 3d 00 f0 ff ff 77 03 48 98 c3 48 8b 15 59 38 2b 00 f7 d8 64 89 02 48 83 c8 ff c3 90 90 90 90 90 90 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 31 38 2b 00 31 d2 48 29 c2 64 [ 286.438248][ C0] RSP: 002b:00007ffd3b93e758 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 286.446709][ C0] RAX: ffffffffffffffda RBX: 0000000002243f60 RCX: 00007f426b01c5d7 [ 286.454692][ C0] RDX: 00007ffd3b93e782 RSI: 000000000041cce6 RDI: 00007ffd3b93e770 [ 286.463015][ C0] RBP: 000000000222b250 R08: 0000000000000000 R09: 0000000000000001 [ 286.472179][ C0] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000000005f [ 286.480922][ C0] R13: 0000000000625500 R14: 000000000222b250 R15: 000000000000000b [ 286.490411][ C0] Kernel Offset: disabled [ 286.494740][ C0] Rebooting in 86400 seconds..