Warning: Permanently added '10.128.0.63' (ECDSA) to the list of known hosts. 2021/03/08 08:24:45 fuzzer started 2021/03/08 08:24:45 dialing manager at 10.128.0.169:43011 2021/03/08 08:24:45 syscalls: 3570 2021/03/08 08:24:45 code coverage: enabled 2021/03/08 08:24:45 comparison tracing: enabled 2021/03/08 08:24:45 extra coverage: enabled 2021/03/08 08:24:45 setuid sandbox: enabled 2021/03/08 08:24:45 namespace sandbox: enabled 2021/03/08 08:24:45 Android sandbox: /sys/fs/selinux/policy does not exist 2021/03/08 08:24:45 fault injection: enabled 2021/03/08 08:24:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/08 08:24:45 net packet injection: enabled 2021/03/08 08:24:45 net device setup: enabled 2021/03/08 08:24:45 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/03/08 08:24:45 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/08 08:24:45 USB emulation: enabled 2021/03/08 08:24:45 hci packet injection: enabled 2021/03/08 08:24:45 wifi device emulation: enabled 2021/03/08 08:24:45 802.15.4 emulation: enabled 2021/03/08 08:24:45 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/08 08:24:46 fetching corpus: 50, signal 30676/34419 (executing program) 2021/03/08 08:24:46 fetching corpus: 100, signal 49403/54816 (executing program) 2021/03/08 08:24:46 fetching corpus: 150, signal 59869/66873 (executing program) 2021/03/08 08:24:46 fetching corpus: 200, signal 68157/76739 (executing program) 2021/03/08 08:24:46 fetching corpus: 250, signal 74182/84340 (executing program) 2021/03/08 08:24:46 fetching corpus: 300, signal 83683/95238 (executing program) 2021/03/08 08:24:46 fetching corpus: 350, signal 96473/109250 (executing program) 2021/03/08 08:24:46 fetching corpus: 400, signal 103356/117449 (executing program) 2021/03/08 08:24:46 fetching corpus: 450, signal 115988/131121 (executing program) 2021/03/08 08:24:46 fetching corpus: 500, signal 120444/136864 (executing program) 2021/03/08 08:24:46 fetching corpus: 550, signal 125417/143132 (executing program) 2021/03/08 08:24:47 fetching corpus: 600, signal 129373/148349 (executing program) 2021/03/08 08:24:47 fetching corpus: 650, signal 135196/155361 (executing program) 2021/03/08 08:24:47 fetching corpus: 700, signal 138666/160069 (executing program) 2021/03/08 08:24:47 fetching corpus: 750, signal 143802/166283 (executing program) 2021/03/08 08:24:47 fetching corpus: 800, signal 151412/174777 (executing program) 2021/03/08 08:24:47 fetching corpus: 850, signal 154786/179276 (executing program) 2021/03/08 08:24:47 fetching corpus: 900, signal 158540/184078 (executing program) 2021/03/08 08:24:47 fetching corpus: 950, signal 162054/188654 (executing program) 2021/03/08 08:24:47 fetching corpus: 1000, signal 165287/192906 (executing program) 2021/03/08 08:24:47 fetching corpus: 1050, signal 168348/197019 (executing program) 2021/03/08 08:24:47 fetching corpus: 1100, signal 172348/201897 (executing program) 2021/03/08 08:24:47 fetching corpus: 1150, signal 173889/204592 (executing program) 2021/03/08 08:24:48 fetching corpus: 1200, signal 177534/209118 (executing program) 2021/03/08 08:24:48 fetching corpus: 1250, signal 181272/213718 (executing program) 2021/03/08 08:24:48 fetching corpus: 1300, signal 183974/217318 (executing program) 2021/03/08 08:24:48 fetching corpus: 1350, signal 188466/222561 (executing program) 2021/03/08 08:24:48 fetching corpus: 1400, signal 191193/226209 (executing program) 2021/03/08 08:24:48 fetching corpus: 1450, signal 193477/229409 (executing program) 2021/03/08 08:24:48 fetching corpus: 1500, signal 197188/233832 (executing program) 2021/03/08 08:24:48 fetching corpus: 1550, signal 199908/237373 (executing program) 2021/03/08 08:24:48 fetching corpus: 1600, signal 202785/241009 (executing program) 2021/03/08 08:24:48 fetching corpus: 1650, signal 206992/245726 (executing program) 2021/03/08 08:24:49 fetching corpus: 1700, signal 209912/249322 (executing program) 2021/03/08 08:24:49 fetching corpus: 1750, signal 212868/252926 (executing program) 2021/03/08 08:24:49 fetching corpus: 1800, signal 216660/257324 (executing program) 2021/03/08 08:24:49 fetching corpus: 1850, signal 218118/259695 (executing program) 2021/03/08 08:24:49 fetching corpus: 1900, signal 221101/263299 (executing program) 2021/03/08 08:24:49 fetching corpus: 1950, signal 224752/267471 (executing program) 2021/03/08 08:24:49 fetching corpus: 2000, signal 226348/269838 (executing program) 2021/03/08 08:24:49 fetching corpus: 2050, signal 228445/272653 (executing program) 2021/03/08 08:24:49 fetching corpus: 2100, signal 230580/275468 (executing program) 2021/03/08 08:24:49 fetching corpus: 2150, signal 233703/279112 (executing program) 2021/03/08 08:24:49 fetching corpus: 2200, signal 235311/281458 (executing program) 2021/03/08 08:24:50 fetching corpus: 2250, signal 238034/284696 (executing program) 2021/03/08 08:24:50 fetching corpus: 2300, signal 239932/287250 (executing program) 2021/03/08 08:24:50 fetching corpus: 2350, signal 241689/289704 (executing program) 2021/03/08 08:24:50 fetching corpus: 2400, signal 244281/292761 (executing program) 2021/03/08 08:24:50 fetching corpus: 2450, signal 246424/295476 (executing program) 2021/03/08 08:24:50 fetching corpus: 2500, signal 248574/298141 (executing program) 2021/03/08 08:24:50 fetching corpus: 2550, signal 249859/300120 (executing program) 2021/03/08 08:24:50 fetching corpus: 2600, signal 251839/302634 (executing program) 2021/03/08 08:24:50 fetching corpus: 2650, signal 253852/305304 (executing program) 2021/03/08 08:24:50 fetching corpus: 2700, signal 255884/307880 (executing program) 2021/03/08 08:24:50 fetching corpus: 2750, signal 258159/310554 (executing program) 2021/03/08 08:24:50 fetching corpus: 2800, signal 259556/312581 (executing program) 2021/03/08 08:24:51 fetching corpus: 2850, signal 260917/314528 (executing program) 2021/03/08 08:24:51 fetching corpus: 2900, signal 263398/317335 (executing program) 2021/03/08 08:24:51 fetching corpus: 2950, signal 265825/320108 (executing program) 2021/03/08 08:24:51 fetching corpus: 3000, signal 266767/321746 (executing program) 2021/03/08 08:24:51 fetching corpus: 3050, signal 268670/324065 (executing program) 2021/03/08 08:24:51 fetching corpus: 3100, signal 269978/325989 (executing program) 2021/03/08 08:24:51 fetching corpus: 3150, signal 270993/327616 (executing program) 2021/03/08 08:24:51 fetching corpus: 3200, signal 272704/329743 (executing program) 2021/03/08 08:24:51 fetching corpus: 3250, signal 275119/332374 (executing program) 2021/03/08 08:24:51 fetching corpus: 3300, signal 277307/334872 (executing program) 2021/03/08 08:24:51 fetching corpus: 3350, signal 279015/336939 (executing program) 2021/03/08 08:24:51 fetching corpus: 3400, signal 280615/338927 (executing program) 2021/03/08 08:24:52 fetching corpus: 3450, signal 282166/340905 (executing program) 2021/03/08 08:24:52 fetching corpus: 3500, signal 283150/342428 (executing program) 2021/03/08 08:24:52 fetching corpus: 3550, signal 285520/344979 (executing program) 2021/03/08 08:24:52 fetching corpus: 3600, signal 287110/346975 (executing program) 2021/03/08 08:24:52 fetching corpus: 3650, signal 290057/349836 (executing program) 2021/03/08 08:24:52 fetching corpus: 3700, signal 291936/351884 (executing program) 2021/03/08 08:24:52 fetching corpus: 3750, signal 293423/353760 (executing program) 2021/03/08 08:24:52 fetching corpus: 3800, signal 295559/356024 (executing program) 2021/03/08 08:24:52 fetching corpus: 3850, signal 296763/357596 (executing program) 2021/03/08 08:24:52 fetching corpus: 3900, signal 298007/359201 (executing program) 2021/03/08 08:24:52 fetching corpus: 3950, signal 300504/361632 (executing program) 2021/03/08 08:24:52 fetching corpus: 4000, signal 301453/363027 (executing program) 2021/03/08 08:24:53 fetching corpus: 4050, signal 303056/364883 (executing program) 2021/03/08 08:24:53 fetching corpus: 4100, signal 304816/366775 (executing program) 2021/03/08 08:24:53 fetching corpus: 4150, signal 306110/368371 (executing program) 2021/03/08 08:24:53 fetching corpus: 4200, signal 307903/370393 (executing program) 2021/03/08 08:24:53 fetching corpus: 4250, signal 309167/371928 (executing program) 2021/03/08 08:24:53 fetching corpus: 4300, signal 310488/373532 (executing program) 2021/03/08 08:24:53 fetching corpus: 4350, signal 311933/375176 (executing program) 2021/03/08 08:24:53 fetching corpus: 4400, signal 313400/376858 (executing program) 2021/03/08 08:24:53 fetching corpus: 4450, signal 314527/378261 (executing program) 2021/03/08 08:24:53 fetching corpus: 4500, signal 316309/380099 (executing program) 2021/03/08 08:24:53 fetching corpus: 4550, signal 317837/381774 (executing program) 2021/03/08 08:24:53 fetching corpus: 4600, signal 319474/383413 (executing program) 2021/03/08 08:24:54 fetching corpus: 4650, signal 320497/384734 (executing program) 2021/03/08 08:24:54 fetching corpus: 4700, signal 321770/386212 (executing program) 2021/03/08 08:24:54 fetching corpus: 4750, signal 324452/388483 (executing program) 2021/03/08 08:24:54 fetching corpus: 4800, signal 325585/389873 (executing program) 2021/03/08 08:24:54 fetching corpus: 4850, signal 326888/391310 (executing program) 2021/03/08 08:24:54 fetching corpus: 4900, signal 327883/392545 (executing program) 2021/03/08 08:24:54 fetching corpus: 4950, signal 329161/393942 (executing program) 2021/03/08 08:24:54 fetching corpus: 5000, signal 330263/395252 (executing program) 2021/03/08 08:24:54 fetching corpus: 5050, signal 331703/396759 (executing program) 2021/03/08 08:24:54 fetching corpus: 5100, signal 332672/397969 (executing program) 2021/03/08 08:24:55 fetching corpus: 5150, signal 333687/399181 (executing program) 2021/03/08 08:24:55 fetching corpus: 5200, signal 334778/400408 (executing program) 2021/03/08 08:24:55 fetching corpus: 5250, signal 336027/401735 (executing program) 2021/03/08 08:24:55 fetching corpus: 5300, signal 337449/403090 (executing program) 2021/03/08 08:24:55 fetching corpus: 5350, signal 338461/404281 (executing program) 2021/03/08 08:24:55 fetching corpus: 5400, signal 339387/405407 (executing program) 2021/03/08 08:24:55 fetching corpus: 5450, signal 340415/406600 (executing program) 2021/03/08 08:24:55 fetching corpus: 5500, signal 341799/407917 (executing program) 2021/03/08 08:24:55 fetching corpus: 5550, signal 342505/408878 (executing program) 2021/03/08 08:24:55 fetching corpus: 5600, signal 343437/409995 (executing program) 2021/03/08 08:24:56 fetching corpus: 5650, signal 344519/411121 (executing program) 2021/03/08 08:24:56 fetching corpus: 5700, signal 345831/412369 (executing program) 2021/03/08 08:24:56 fetching corpus: 5750, signal 346752/413438 (executing program) 2021/03/08 08:24:56 fetching corpus: 5800, signal 347921/414653 (executing program) 2021/03/08 08:24:56 fetching corpus: 5850, signal 349312/415922 (executing program) 2021/03/08 08:24:56 fetching corpus: 5900, signal 351051/417422 (executing program) 2021/03/08 08:24:56 fetching corpus: 5950, signal 351941/418401 (executing program) 2021/03/08 08:24:56 fetching corpus: 6000, signal 352818/419352 (executing program) 2021/03/08 08:24:56 fetching corpus: 6050, signal 353803/420373 (executing program) 2021/03/08 08:24:56 fetching corpus: 6100, signal 354852/421446 (executing program) 2021/03/08 08:24:56 fetching corpus: 6150, signal 355930/422526 (executing program) 2021/03/08 08:24:57 fetching corpus: 6200, signal 356821/423507 (executing program) 2021/03/08 08:24:57 fetching corpus: 6250, signal 358125/424717 (executing program) 2021/03/08 08:24:57 fetching corpus: 6300, signal 359155/425719 (executing program) 2021/03/08 08:24:57 fetching corpus: 6350, signal 360124/426707 (executing program) 2021/03/08 08:24:57 fetching corpus: 6400, signal 361580/427902 (executing program) 2021/03/08 08:24:57 fetching corpus: 6450, signal 362434/428821 (executing program) 2021/03/08 08:24:57 fetching corpus: 6500, signal 363372/429807 (executing program) 2021/03/08 08:24:57 fetching corpus: 6550, signal 364073/430649 (executing program) 2021/03/08 08:24:57 fetching corpus: 6600, signal 365419/431803 (executing program) 2021/03/08 08:24:57 fetching corpus: 6650, signal 366154/432623 (executing program) 2021/03/08 08:24:57 fetching corpus: 6700, signal 367104/433532 (executing program) 2021/03/08 08:24:58 fetching corpus: 6750, signal 368349/434561 (executing program) 2021/03/08 08:24:58 fetching corpus: 6800, signal 369276/435474 (executing program) 2021/03/08 08:24:58 fetching corpus: 6850, signal 370266/436373 (executing program) 2021/03/08 08:24:58 fetching corpus: 6900, signal 371117/437219 (executing program) 2021/03/08 08:24:58 fetching corpus: 6950, signal 371947/437999 (executing program) 2021/03/08 08:24:58 fetching corpus: 7000, signal 373110/439001 (executing program) 2021/03/08 08:24:58 fetching corpus: 7050, signal 374078/439851 (executing program) 2021/03/08 08:24:58 fetching corpus: 7100, signal 374658/440558 (executing program) 2021/03/08 08:24:58 fetching corpus: 7150, signal 376098/441601 (executing program) 2021/03/08 08:24:59 fetching corpus: 7200, signal 377156/442487 (executing program) 2021/03/08 08:24:59 fetching corpus: 7250, signal 377948/443238 (executing program) 2021/03/08 08:24:59 fetching corpus: 7300, signal 378805/444047 (executing program) 2021/03/08 08:24:59 fetching corpus: 7350, signal 379519/444773 (executing program) 2021/03/08 08:24:59 fetching corpus: 7400, signal 380413/445507 (executing program) 2021/03/08 08:24:59 fetching corpus: 7450, signal 382077/446624 (executing program) 2021/03/08 08:24:59 fetching corpus: 7500, signal 382583/447261 (executing program) 2021/03/08 08:24:59 fetching corpus: 7550, signal 383456/448014 (executing program) 2021/03/08 08:24:59 fetching corpus: 7600, signal 384184/448739 (executing program) 2021/03/08 08:24:59 fetching corpus: 7650, signal 385052/449490 (executing program) 2021/03/08 08:25:00 fetching corpus: 7700, signal 385878/450192 (executing program) 2021/03/08 08:25:00 fetching corpus: 7750, signal 386497/450818 (executing program) 2021/03/08 08:25:00 fetching corpus: 7800, signal 387439/451532 (executing program) 2021/03/08 08:25:00 fetching corpus: 7850, signal 388685/452423 (executing program) 2021/03/08 08:25:00 fetching corpus: 7900, signal 389410/453115 (executing program) 2021/03/08 08:25:00 fetching corpus: 7950, signal 390327/453833 (executing program) 2021/03/08 08:25:00 fetching corpus: 8000, signal 391011/454505 (executing program) 2021/03/08 08:25:00 fetching corpus: 8050, signal 391775/455141 (executing program) 2021/03/08 08:25:00 fetching corpus: 8100, signal 392698/455868 (executing program) 2021/03/08 08:25:00 fetching corpus: 8150, signal 393452/456475 (executing program) 2021/03/08 08:25:00 fetching corpus: 8200, signal 394347/457146 (executing program) 2021/03/08 08:25:00 fetching corpus: 8250, signal 395380/457823 (executing program) 2021/03/08 08:25:01 fetching corpus: 8300, signal 396189/458430 (executing program) 2021/03/08 08:25:01 fetching corpus: 8350, signal 396991/459035 (executing program) 2021/03/08 08:25:01 fetching corpus: 8400, signal 398047/459771 (executing program) 2021/03/08 08:25:01 fetching corpus: 8450, signal 398744/460373 (executing program) 2021/03/08 08:25:01 fetching corpus: 8500, signal 399328/460924 (executing program) 2021/03/08 08:25:01 fetching corpus: 8550, signal 400255/461541 (executing program) 2021/03/08 08:25:01 fetching corpus: 8600, signal 400969/462117 (executing program) 2021/03/08 08:25:01 fetching corpus: 8650, signal 401835/462693 (executing program) 2021/03/08 08:25:01 fetching corpus: 8700, signal 402560/463245 (executing program) 2021/03/08 08:25:01 fetching corpus: 8750, signal 403285/463794 (executing program) 2021/03/08 08:25:02 fetching corpus: 8800, signal 404361/464426 (executing program) 2021/03/08 08:25:02 fetching corpus: 8850, signal 405184/464975 (executing program) 2021/03/08 08:25:02 fetching corpus: 8900, signal 405751/465486 (executing program) 2021/03/08 08:25:02 fetching corpus: 8950, signal 406393/465994 (executing program) 2021/03/08 08:25:02 fetching corpus: 9000, signal 407201/466519 (executing program) 2021/03/08 08:25:02 fetching corpus: 9050, signal 407817/466987 (executing program) 2021/03/08 08:25:02 fetching corpus: 9100, signal 408769/467568 (executing program) 2021/03/08 08:25:02 fetching corpus: 9150, signal 409354/468014 (executing program) 2021/03/08 08:25:02 fetching corpus: 9200, signal 410172/468565 (executing program) 2021/03/08 08:25:02 fetching corpus: 9250, signal 410799/469037 (executing program) 2021/03/08 08:25:02 fetching corpus: 9300, signal 411272/469439 (executing program) 2021/03/08 08:25:03 fetching corpus: 9350, signal 412351/469927 (executing program) 2021/03/08 08:25:03 fetching corpus: 9400, signal 413000/470372 (executing program) 2021/03/08 08:25:03 fetching corpus: 9450, signal 413846/470865 (executing program) 2021/03/08 08:25:03 fetching corpus: 9500, signal 414635/471381 (executing program) 2021/03/08 08:25:03 fetching corpus: 9550, signal 415660/471894 (executing program) 2021/03/08 08:25:03 fetching corpus: 9600, signal 416488/472365 (executing program) 2021/03/08 08:25:03 fetching corpus: 9650, signal 417230/472782 (executing program) 2021/03/08 08:25:03 fetching corpus: 9700, signal 418237/473278 (executing program) 2021/03/08 08:25:03 fetching corpus: 9750, signal 419090/473710 (executing program) 2021/03/08 08:25:03 fetching corpus: 9800, signal 419794/474134 (executing program) 2021/03/08 08:25:03 fetching corpus: 9850, signal 420438/474611 (executing program) 2021/03/08 08:25:03 fetching corpus: 9900, signal 421037/475008 (executing program) 2021/03/08 08:25:04 fetching corpus: 9950, signal 421635/475381 (executing program) 2021/03/08 08:25:04 fetching corpus: 10000, signal 422288/475718 (executing program) 2021/03/08 08:25:04 fetching corpus: 10050, signal 422891/476059 (executing program) 2021/03/08 08:25:04 fetching corpus: 10100, signal 423304/476361 (executing program) 2021/03/08 08:25:04 fetching corpus: 10150, signal 424147/476779 (executing program) 2021/03/08 08:25:04 fetching corpus: 10200, signal 424556/477096 (executing program) 2021/03/08 08:25:04 fetching corpus: 10250, signal 425000/477487 (executing program) 2021/03/08 08:25:04 fetching corpus: 10300, signal 425984/477951 (executing program) 2021/03/08 08:25:04 fetching corpus: 10350, signal 426394/478254 (executing program) 2021/03/08 08:25:04 fetching corpus: 10400, signal 426897/478590 (executing program) 2021/03/08 08:25:04 fetching corpus: 10450, signal 427648/478896 (executing program) 2021/03/08 08:25:05 fetching corpus: 10500, signal 428478/479256 (executing program) 2021/03/08 08:25:05 fetching corpus: 10550, signal 429175/479572 (executing program) 2021/03/08 08:25:05 fetching corpus: 10600, signal 429779/479915 (executing program) 2021/03/08 08:25:05 fetching corpus: 10650, signal 430479/480223 (executing program) 2021/03/08 08:25:05 fetching corpus: 10700, signal 431218/480532 (executing program) 2021/03/08 08:25:05 fetching corpus: 10750, signal 431787/480812 (executing program) 2021/03/08 08:25:05 fetching corpus: 10800, signal 432563/481117 (executing program) 2021/03/08 08:25:05 fetching corpus: 10850, signal 433072/481404 (executing program) 2021/03/08 08:25:05 fetching corpus: 10900, signal 433799/481742 (executing program) 2021/03/08 08:25:05 fetching corpus: 10950, signal 434395/482022 (executing program) 2021/03/08 08:25:05 fetching corpus: 11000, signal 434836/482270 (executing program) 2021/03/08 08:25:05 fetching corpus: 11050, signal 435317/482530 (executing program) 2021/03/08 08:25:05 fetching corpus: 11100, signal 435912/482839 (executing program) 2021/03/08 08:25:06 fetching corpus: 11150, signal 436786/483114 (executing program) 2021/03/08 08:25:06 fetching corpus: 11200, signal 437329/483384 (executing program) 2021/03/08 08:25:06 fetching corpus: 11250, signal 438017/483635 (executing program) 2021/03/08 08:25:06 fetching corpus: 11300, signal 438564/483848 (executing program) 2021/03/08 08:25:06 fetching corpus: 11350, signal 439040/484075 (executing program) 2021/03/08 08:25:06 fetching corpus: 11400, signal 439466/484299 (executing program) 2021/03/08 08:25:06 fetching corpus: 11450, signal 440447/484549 (executing program) 2021/03/08 08:25:06 fetching corpus: 11500, signal 441166/484752 (executing program) 2021/03/08 08:25:06 fetching corpus: 11550, signal 441794/484951 (executing program) 2021/03/08 08:25:06 fetching corpus: 11600, signal 442469/485156 (executing program) 2021/03/08 08:25:06 fetching corpus: 11650, signal 442988/485344 (executing program) 2021/03/08 08:25:07 fetching corpus: 11700, signal 443743/485538 (executing program) 2021/03/08 08:25:07 fetching corpus: 11750, signal 444221/485717 (executing program) 2021/03/08 08:25:07 fetching corpus: 11800, signal 444755/485900 (executing program) 2021/03/08 08:25:07 fetching corpus: 11850, signal 445351/486170 (executing program) 2021/03/08 08:25:07 fetching corpus: 11900, signal 446081/486322 (executing program) 2021/03/08 08:25:07 fetching corpus: 11950, signal 446596/486325 (executing program) [ 71.565770][ T3260] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.572733][ T3260] ieee802154 phy1 wpan1: encryption failed: -22 2021/03/08 08:25:07 fetching corpus: 12000, signal 447013/486325 (executing program) 2021/03/08 08:25:07 fetching corpus: 12050, signal 448449/486335 (executing program) 2021/03/08 08:25:07 fetching corpus: 12100, signal 449026/486338 (executing program) 2021/03/08 08:25:07 fetching corpus: 12150, signal 449581/486345 (executing program) 2021/03/08 08:25:07 fetching corpus: 12200, signal 450170/486354 (executing program) 2021/03/08 08:25:07 fetching corpus: 12250, signal 450762/486360 (executing program) 2021/03/08 08:25:08 fetching corpus: 12300, signal 451444/486370 (executing program) 2021/03/08 08:25:08 fetching corpus: 12350, signal 451921/486379 (executing program) 2021/03/08 08:25:08 fetching corpus: 12400, signal 453313/486381 (executing program) 2021/03/08 08:25:08 fetching corpus: 12450, signal 454102/486394 (executing program) 2021/03/08 08:25:08 fetching corpus: 12500, signal 454948/486401 (executing program) 2021/03/08 08:25:08 fetching corpus: 12550, signal 455329/486411 (executing program) 2021/03/08 08:25:08 fetching corpus: 12600, signal 455961/486411 (executing program) 2021/03/08 08:25:08 fetching corpus: 12650, signal 456562/486412 (executing program) 2021/03/08 08:25:08 fetching corpus: 12700, signal 457273/486488 (executing program) 2021/03/08 08:25:08 fetching corpus: 12750, signal 457718/486513 (executing program) 2021/03/08 08:25:08 fetching corpus: 12800, signal 458386/486525 (executing program) 2021/03/08 08:25:08 fetching corpus: 12850, signal 458760/486565 (executing program) 2021/03/08 08:25:08 fetching corpus: 12900, signal 459312/486640 (executing program) 2021/03/08 08:25:08 fetching corpus: 12950, signal 460089/486640 (executing program) 2021/03/08 08:25:09 fetching corpus: 13000, signal 460773/486749 (executing program) 2021/03/08 08:25:09 fetching corpus: 13050, signal 461173/486750 (executing program) 2021/03/08 08:25:09 fetching corpus: 13100, signal 461983/486760 (executing program) 2021/03/08 08:25:09 fetching corpus: 13150, signal 462429/486763 (executing program) 2021/03/08 08:25:09 fetching corpus: 13200, signal 463206/486885 (executing program) 2021/03/08 08:25:09 fetching corpus: 13250, signal 463697/486887 (executing program) 2021/03/08 08:25:09 fetching corpus: 13300, signal 464138/486919 (executing program) 2021/03/08 08:25:09 fetching corpus: 13350, signal 464757/486922 (executing program) 2021/03/08 08:25:09 fetching corpus: 13400, signal 465155/486923 (executing program) 2021/03/08 08:25:09 fetching corpus: 13450, signal 465863/486958 (executing program) 2021/03/08 08:25:09 fetching corpus: 13500, signal 466346/487016 (executing program) 2021/03/08 08:25:09 fetching corpus: 13550, signal 466752/487016 (executing program) 2021/03/08 08:25:09 fetching corpus: 13600, signal 467190/487020 (executing program) 2021/03/08 08:25:09 fetching corpus: 13650, signal 467874/487023 (executing program) 2021/03/08 08:25:10 fetching corpus: 13700, signal 468667/487034 (executing program) 2021/03/08 08:25:10 fetching corpus: 13750, signal 469006/487040 (executing program) 2021/03/08 08:25:10 fetching corpus: 13800, signal 469354/487057 (executing program) 2021/03/08 08:25:10 fetching corpus: 13850, signal 469655/487074 (executing program) 2021/03/08 08:25:10 fetching corpus: 13900, signal 470350/487086 (executing program) 2021/03/08 08:25:10 fetching corpus: 13950, signal 470936/487101 (executing program) 2021/03/08 08:25:11 fetching corpus: 14000, signal 471356/487104 (executing program) 2021/03/08 08:25:11 fetching corpus: 14050, signal 471939/487184 (executing program) 2021/03/08 08:25:11 fetching corpus: 14100, signal 472284/487186 (executing program) 2021/03/08 08:25:11 fetching corpus: 14150, signal 472595/487187 (executing program) 2021/03/08 08:25:11 fetching corpus: 14200, signal 472884/487197 (executing program) 2021/03/08 08:25:11 fetching corpus: 14250, signal 473498/487199 (executing program) 2021/03/08 08:25:11 fetching corpus: 14300, signal 473932/487201 (executing program) 2021/03/08 08:25:11 fetching corpus: 14350, signal 474488/487212 (executing program) 2021/03/08 08:25:11 fetching corpus: 14400, signal 475034/487240 (executing program) 2021/03/08 08:25:11 fetching corpus: 14450, signal 475547/487240 (executing program) 2021/03/08 08:25:11 fetching corpus: 14500, signal 475980/487244 (executing program) 2021/03/08 08:25:11 fetching corpus: 14550, signal 476385/487246 (executing program) 2021/03/08 08:25:11 fetching corpus: 14600, signal 476831/487252 (executing program) 2021/03/08 08:25:12 fetching corpus: 14650, signal 477259/487254 (executing program) 2021/03/08 08:25:12 fetching corpus: 14700, signal 477606/487255 (executing program) 2021/03/08 08:25:12 fetching corpus: 14750, signal 478014/487259 (executing program) 2021/03/08 08:25:12 fetching corpus: 14800, signal 478674/487267 (executing program) 2021/03/08 08:25:12 fetching corpus: 14837, signal 479074/487268 (executing program) 2021/03/08 08:25:12 fetching corpus: 14837, signal 479074/487268 (executing program) 2021/03/08 08:25:14 starting 6 fuzzer processes 08:25:14 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f00000001c0)={0x2, 0x0, 0x0, {0x79b9}}) 08:25:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x34, 0x0, 0x35, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:25:14 executing program 2: fanotify_init(0x8, 0x0) 08:25:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4020ae76, &(0x7f0000000000)) 08:25:15 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0x0, 0xd0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0xffffffff, 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev, 0x0, 0x1d}}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c8) 08:25:15 executing program 5: r0 = socket(0x22, 0x2, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 79.739556][ T8396] IPVS: ftp: loaded support on port[0] = 21 [ 79.857887][ T8396] chnl_net:caif_netlink_parms(): no params data found [ 79.940979][ T8398] IPVS: ftp: loaded support on port[0] = 21 [ 80.005169][ T8396] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.015886][ T8396] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.024981][ T8396] device bridge_slave_0 entered promiscuous mode [ 80.036924][ T8396] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.045844][ T8396] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.054974][ T8396] device bridge_slave_1 entered promiscuous mode [ 80.143195][ T8396] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.158595][ T8398] chnl_net:caif_netlink_parms(): no params data found [ 80.178005][ T8396] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.211064][ T8396] team0: Port device team_slave_0 added [ 80.224408][ T8396] team0: Port device team_slave_1 added [ 80.246273][ T8400] IPVS: ftp: loaded support on port[0] = 21 [ 80.277313][ T8396] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 80.289511][ T8396] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 80.339842][ T8396] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 80.405408][ T8396] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 80.420782][ T8396] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 80.448708][ T8396] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 80.489919][ T8402] IPVS: ftp: loaded support on port[0] = 21 [ 80.506720][ T8398] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.515261][ T8398] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.551478][ T8398] device bridge_slave_0 entered promiscuous mode [ 80.585795][ T8396] device hsr_slave_0 entered promiscuous mode [ 80.597980][ T8396] device hsr_slave_1 entered promiscuous mode [ 80.612768][ T8398] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.620587][ T8398] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.631136][ T8398] device bridge_slave_1 entered promiscuous mode [ 80.674241][ T8404] IPVS: ftp: loaded support on port[0] = 21 [ 80.688187][ T8398] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.711747][ T8398] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.883248][ T8398] team0: Port device team_slave_0 added [ 80.942109][ T8406] IPVS: ftp: loaded support on port[0] = 21 [ 80.949390][ T8398] team0: Port device team_slave_1 added [ 81.030388][ T8400] chnl_net:caif_netlink_parms(): no params data found [ 81.115521][ T8398] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.138756][ T8398] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.170795][ T8398] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.187985][ T8398] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 81.195152][ T8398] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.222314][ T8398] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 81.308233][ T8404] chnl_net:caif_netlink_parms(): no params data found [ 81.345307][ T8398] device hsr_slave_0 entered promiscuous mode [ 81.352666][ T8398] device hsr_slave_1 entered promiscuous mode [ 81.359429][ T8398] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 81.367931][ T8398] Cannot create hsr debugfs directory [ 81.377712][ T8402] chnl_net:caif_netlink_parms(): no params data found [ 81.453725][ T8400] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.461230][ T8400] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.470994][ T8400] device bridge_slave_0 entered promiscuous mode [ 81.479949][ T8400] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.489012][ T8400] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.497819][ T8400] device bridge_slave_1 entered promiscuous mode [ 81.577997][ T8400] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.593880][ T8396] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.607246][ T8396] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.620349][ T8396] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.638220][ T8400] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.669683][ T8396] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.723618][ T4842] Bluetooth: hci0: command 0x0409 tx timeout [ 81.741328][ T8402] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.758219][ T8402] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.769232][ T8402] device bridge_slave_0 entered promiscuous mode [ 81.788927][ T8402] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.798006][ T8402] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.808328][ T8402] device bridge_slave_1 entered promiscuous mode [ 81.819350][ T8400] team0: Port device team_slave_0 added [ 81.834767][ T8404] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.842758][ T8404] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.850993][ T8404] device bridge_slave_0 entered promiscuous mode [ 81.889861][ T8400] team0: Port device team_slave_1 added [ 81.910760][ T8400] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.919894][ T8400] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.952632][ T8400] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.964073][ T4842] Bluetooth: hci1: command 0x0409 tx timeout [ 81.973862][ T8404] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.981502][ T8404] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.991630][ T8404] device bridge_slave_1 entered promiscuous mode [ 82.005469][ T8402] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.035472][ T8400] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.050157][ T8400] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.078467][ T8400] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.097558][ T8406] chnl_net:caif_netlink_parms(): no params data found [ 82.112973][ T8402] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.123138][ T4842] Bluetooth: hci2: command 0x0409 tx timeout [ 82.187321][ T8402] team0: Port device team_slave_0 added [ 82.200843][ T8404] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.229752][ T8402] team0: Port device team_slave_1 added [ 82.240751][ T8400] device hsr_slave_0 entered promiscuous mode [ 82.249322][ T8400] device hsr_slave_1 entered promiscuous mode [ 82.257852][ T8400] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 82.268091][ T8400] Cannot create hsr debugfs directory [ 82.276894][ T8404] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.288766][ T8398] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.308053][ T8398] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.356428][ T8404] team0: Port device team_slave_0 added [ 82.365405][ T8404] team0: Port device team_slave_1 added [ 82.373322][ T8398] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.380501][ T4050] Bluetooth: hci3: command 0x0409 tx timeout [ 82.401531][ T8402] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.412346][ T8402] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.446578][ T8402] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.477989][ T8398] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.510770][ T8402] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.518847][ T8402] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.549169][ T8402] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.572009][ T8404] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.581524][ T8404] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.609653][ T8404] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.618847][ T9324] Bluetooth: hci4: command 0x0409 tx timeout [ 82.625100][ T8404] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.634782][ T8404] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.663243][ T8404] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.687139][ T8406] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.698196][ T8406] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.708057][ T8406] device bridge_slave_0 entered promiscuous mode [ 82.761039][ T8402] device hsr_slave_0 entered promiscuous mode [ 82.767730][ T8] Bluetooth: hci5: command 0x0409 tx timeout [ 82.775714][ T8402] device hsr_slave_1 entered promiscuous mode [ 82.783562][ T8402] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 82.791356][ T8402] Cannot create hsr debugfs directory [ 82.801238][ T8406] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.811172][ T8406] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.823739][ T8406] device bridge_slave_1 entered promiscuous mode [ 82.850431][ T8404] device hsr_slave_0 entered promiscuous mode [ 82.859016][ T8404] device hsr_slave_1 entered promiscuous mode [ 82.867378][ T8404] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 82.876269][ T8404] Cannot create hsr debugfs directory [ 82.901738][ T8396] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.925416][ T8406] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.016022][ T8406] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.046825][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.057042][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.080514][ T8396] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.124082][ T8406] team0: Port device team_slave_0 added [ 83.174632][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.189730][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.199883][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.207914][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.218882][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.228970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.238542][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.246146][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.256320][ T8406] team0: Port device team_slave_1 added [ 83.296418][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.304715][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.337992][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.353319][ T8406] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 83.360572][ T8406] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 83.389986][ T8406] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 83.410643][ T8406] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 83.418582][ T8406] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 83.447225][ T8406] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 83.472400][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.481665][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.492559][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.504419][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.513932][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.524004][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.573155][ T8402] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 83.583187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.591198][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.604272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.618698][ T8398] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.628948][ T8406] device hsr_slave_0 entered promiscuous mode [ 83.638239][ T8406] device hsr_slave_1 entered promiscuous mode [ 83.646438][ T8406] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 83.655638][ T8406] Cannot create hsr debugfs directory [ 83.663398][ T8396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.677624][ T8402] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 83.686969][ T8402] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 83.704670][ T8402] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 83.749004][ T8398] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.769093][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.777313][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.806792][ T3182] Bluetooth: hci0: command 0x041b tx timeout [ 83.807456][ T8396] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.824204][ T8400] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 83.834464][ T8400] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 83.848471][ T8400] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 83.859777][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 83.869037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 83.880878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.890988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.904739][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.912214][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.926362][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.950563][ T8400] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 83.976665][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.986784][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.997073][ T9640] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.004448][ T9640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.012847][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.033068][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 84.043122][ T9640] Bluetooth: hci1: command 0x041b tx timeout [ 84.049820][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 84.059142][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 84.070291][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 84.084862][ T8404] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 84.094513][ T8404] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 84.107830][ T8404] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 84.149577][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 84.159120][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 84.169928][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.179829][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.190269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.200430][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.210095][ T8404] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 84.217722][ T4842] Bluetooth: hci2: command 0x041b tx timeout [ 84.248436][ T8398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.288664][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.303803][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.350478][ T4842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.359468][ T4842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.370224][ T8396] device veth0_vlan entered promiscuous mode [ 84.396227][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.406128][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.435199][ T8396] device veth1_vlan entered promiscuous mode [ 84.453175][ T4050] Bluetooth: hci3: command 0x041b tx timeout [ 84.483353][ T4842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 84.492612][ T4842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 84.500342][ T4842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 84.515824][ T8398] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.555619][ T8400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.601342][ T8402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.622730][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 84.631184][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.641378][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.657653][ T8396] device veth0_macvtap entered promiscuous mode [ 84.670398][ T8406] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 84.682361][ T3160] Bluetooth: hci4: command 0x041b tx timeout [ 84.705376][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 84.714959][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 84.725084][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.734264][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.743365][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 84.755058][ T8400] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.768783][ T8402] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.778573][ T8406] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 84.790573][ T8406] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 84.816707][ T8398] device veth0_vlan entered promiscuous mode [ 84.826857][ T8396] device veth1_macvtap entered promiscuous mode [ 84.841247][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 84.855615][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.867240][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.883628][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.896665][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.907821][ T5] Bluetooth: hci5: command 0x041b tx timeout [ 84.919784][ T8406] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 84.955921][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.966251][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.975772][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.985455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.995200][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.003250][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.014301][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.023722][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.032590][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.039861][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.048002][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.057143][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.066228][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.073503][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.081491][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.120064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.128988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.140842][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.150746][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.160354][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.168120][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.178340][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.189348][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.199638][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 85.209439][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.220897][ T8404] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.235043][ T8398] device veth1_vlan entered promiscuous mode [ 85.266965][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.275757][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.286113][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 85.296691][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.305970][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 85.314961][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.325204][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.334920][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.344865][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.354317][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.363196][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.380115][ T8396] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 85.400496][ T8396] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 85.420510][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 85.431183][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 85.441656][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 85.451301][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.461026][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 85.471355][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 85.497420][ T8402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.510833][ T8396] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.521445][ T8396] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.531257][ T8396] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.543517][ T8396] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.574005][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.584794][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.594906][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.605223][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.628967][ T8404] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.640152][ T8400] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 85.655292][ T8400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.674422][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 85.683750][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 85.693268][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.702617][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.714002][ T8398] device veth0_macvtap entered promiscuous mode [ 85.775462][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 85.801073][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 85.811420][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 85.829155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 85.839954][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 85.853393][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.867755][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.879129][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.887612][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.901225][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.913571][ T9705] Bluetooth: hci0: command 0x040f tx timeout [ 85.926698][ T8402] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.939546][ T8398] device veth1_macvtap entered promiscuous mode [ 85.963449][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 85.981300][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.998203][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.009596][ T4050] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.016983][ T4050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.029459][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.045026][ T8400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.103778][ T8406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.131533][ T9608] Bluetooth: hci1: command 0x040f tx timeout [ 86.174518][ T8398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 86.191260][ T8398] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 86.204943][ T8398] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 86.226880][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 86.237947][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 86.248798][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.259432][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.269820][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.279636][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.290652][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.292458][ T9503] Bluetooth: hci2: command 0x040f tx timeout [ 86.300358][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 86.314813][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 86.348452][ T8406] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.358096][ T8398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 86.372508][ T8398] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 86.386066][ T8398] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 86.400553][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.408637][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.417447][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.425727][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 86.435155][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 86.448461][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 86.464073][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.487417][ T8402] device veth0_vlan entered promiscuous mode [ 86.501140][ T8398] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.511532][ T8398] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.522064][ T8398] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.531066][ T8398] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.540885][ T4842] Bluetooth: hci3: command 0x040f tx timeout [ 86.556881][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 86.566243][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 86.575671][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.585685][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.595411][ T9503] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.602676][ T9503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.611378][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 86.620460][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.630644][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.640286][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.649783][ T9503] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.657212][ T9503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.666665][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.676896][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 86.686379][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.695092][ T9503] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 86.710292][ T8402] device veth1_vlan entered promiscuous mode [ 86.720555][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 86.732399][ T9324] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 86.742698][ T9324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 86.744906][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 86.751221][ T9324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 86.772369][ T4050] Bluetooth: hci4: command 0x040f tx timeout [ 86.783238][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 86.826938][ T8404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 86.837498][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 86.848204][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.858901][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.868441][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.877752][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.887895][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.952310][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.972202][ T8402] device veth0_macvtap entered promiscuous mode [ 87.004593][ T9608] Bluetooth: hci5: command 0x040f tx timeout [ 87.017172][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 87.036794][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 87.048694][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 87.058983][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 87.070222][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 87.079993][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.092416][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.102365][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.113095][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 87.138739][ T8400] device veth0_vlan entered promiscuous mode [ 87.168251][ T8402] device veth1_macvtap entered promiscuous mode [ 87.186520][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 87.198134][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 87.207990][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.221954][ T8404] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 87.248892][ T8406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 87.263387][ T193] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.274969][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.275305][ T193] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.293828][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.302504][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 87.325093][ T8400] device veth1_vlan entered promiscuous mode [ 87.389442][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.402963][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.416195][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 87.500180][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 87.512790][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 87.525100][ T8406] 8021q: adding VLAN 0 to HW filter on device batadv0 08:25:23 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f00000001c0)={0x2, 0x0, 0x0, {0x79b9}}) [ 87.587439][ T8400] device veth0_macvtap entered promiscuous mode [ 87.607892][ T8402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 87.620065][ T8402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.632263][ T8402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 87.645238][ T8402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.673860][ T8402] batman_adv: batadv0: Interface activated: batadv_slave_0 08:25:23 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f00000001c0)={0x2, 0x0, 0x0, {0x79b9}}) [ 87.701498][ T25] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.710067][ T25] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.732165][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 87.743224][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 87.764840][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 87.793802][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 87.807780][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:25:23 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f00000001c0)={0x2, 0x0, 0x0, {0x79b9}}) [ 87.817564][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 87.840529][ T8400] device veth1_macvtap entered promiscuous mode [ 87.865582][ T8402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 87.880160][ T8402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.905084][ T8402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 87.925135][ T8402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 87.948032][ T8402] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 87.964553][ T3182] Bluetooth: hci0: command 0x0419 tx timeout 08:25:23 executing program 0: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) [ 88.020586][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 88.040940][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 88.067322][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 08:25:23 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x34, 0x0, 0x35, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 88.098415][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 88.119665][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 88.142880][ T8402] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.176234][ T8402] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.197179][ T8402] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.211484][ T3160] Bluetooth: hci1: command 0x0419 tx timeout [ 88.229810][ T8402] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.255391][ T38] audit: type=1804 audit(1615191924.075:2): pid=9789 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/4/bus" dev="sda1" ino=14189 res=1 errno=0 08:25:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x34, 0x0, 0x35, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 88.282902][ C1] hrtimer: interrupt took 35164 ns [ 88.332632][ T8400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 88.355694][ T8400] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.367756][ T9324] Bluetooth: hci2: command 0x0419 tx timeout 08:25:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x34, 0x0, 0x35, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 88.398164][ T8400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 88.418227][ T8400] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.455155][ T38] audit: type=1804 audit(1615191924.275:3): pid=9789 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/4/bus" dev="sda1" ino=14189 res=1 errno=0 [ 88.465248][ T8400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 88.505921][ T8400] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.520127][ T8400] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 88.535611][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 88.545640][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 08:25:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x1a2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) [ 88.559965][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 88.590079][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 88.613662][ T8404] device veth0_vlan entered promiscuous mode [ 88.624160][ T9324] Bluetooth: hci3: command 0x0419 tx timeout [ 88.719330][ T8400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 88.800072][ T8400] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 88.845287][ T7] Bluetooth: hci4: command 0x0419 tx timeout [ 88.891604][ T8400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 88.971531][ T8400] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 89.082296][ T7] Bluetooth: hci5: command 0x0419 tx timeout [ 89.090796][ T8400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 89.185490][ T8400] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 89.211769][ T38] audit: type=1804 audit(1615191925.025:4): pid=9799 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/4/bus" dev="sda1" ino=14189 res=1 errno=0 [ 89.254799][ T8400] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 89.281869][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.290273][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.363250][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 89.372254][ T38] audit: type=1804 audit(1615191925.185:5): pid=9801 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/4/bus" dev="sda1" ino=14189 res=1 errno=0 [ 89.398344][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 89.412021][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 89.430357][ T38] audit: type=1804 audit(1615191925.185:6): pid=9786 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/4/bus" dev="sda1" ino=14189 res=1 errno=0 [ 89.458332][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 89.507862][ T8404] device veth1_vlan entered promiscuous mode [ 89.545941][ T8400] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.567692][ T8400] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.597071][ T8400] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.617563][ T8400] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.719231][ T8406] device veth0_vlan entered promiscuous mode [ 89.777946][ T8404] device veth0_macvtap entered promiscuous mode [ 89.813127][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 89.856621][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.867455][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 89.877218][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 89.906547][ T8406] device veth1_vlan entered promiscuous mode [ 89.938750][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.946866][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.956615][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 89.966714][ T9670] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 90.006559][ T8404] device veth1_macvtap entered promiscuous mode [ 90.100774][ T8404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.119768][ T25] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.142849][ T25] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.180890][ T8404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.216730][ T8404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.238715][ T8404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.263540][ T8404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.283228][ T8404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.303057][ T8404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.314305][ T8404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.326569][ T8404] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 90.347791][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 90.372859][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 90.380930][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 90.400038][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.411055][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.432242][ T8406] device veth0_macvtap entered promiscuous mode [ 90.440415][ T8404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 90.454015][ T8404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.465015][ T8404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 90.477634][ T8404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.488139][ T8404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 90.499149][ T8404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.510515][ T8404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 90.522582][ T8404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.535030][ T8404] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 90.547968][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 90.568155][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.584180][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 90.595681][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 90.606625][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 90.619129][ T8406] device veth1_macvtap entered promiscuous mode [ 90.632261][ T25] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.642157][ T25] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.642339][ T8404] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.664650][ T8404] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.674918][ T8404] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.685300][ T8404] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.709004][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 90.725934][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 90.759306][ T25] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.795599][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.796355][ T25] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.810546][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.826079][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.837135][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.851341][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.862858][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.873296][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.887125][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.898025][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.908760][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.920453][ T8406] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 90.965101][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 90.973277][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.986360][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.998706][ T258] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.999763][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 91.019861][ T258] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.032486][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.043161][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 91.054291][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.065055][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 91.078251][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.089019][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 91.100045][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.110104][ T8406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 91.121146][ T8406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.132894][ T8406] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 91.149199][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 91.175849][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 91.201561][ T9861] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 91.205584][ T3182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 91.264776][ T8406] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.295277][ T8406] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.317860][ T8406] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.332854][ T8406] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 08:25:27 executing program 2: fanotify_init(0x8, 0x0) 08:25:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x1a2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) [ 91.479970][ T258] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.507025][ T258] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.595929][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 91.617061][ T193] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.631570][ T193] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.663815][ T9640] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 91.708111][ T258] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.743016][ T258] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.800022][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 91.835120][ T28] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.848744][ T28] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.866223][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 91.881245][ T9917] ipt_CLUSTERIP: bad num_local_nodes 29 [ 91.894371][ T9920] ipt_CLUSTERIP: bad num_local_nodes 29 08:25:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4020ae76, &(0x7f0000000000)) 08:25:27 executing program 5: r0 = socket(0x22, 0x2, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 08:25:27 executing program 0: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) 08:25:27 executing program 2: fanotify_init(0x8, 0x0) 08:25:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x1a2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 08:25:27 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0x0, 0xd0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0xffffffff, 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev, 0x0, 0x1d}}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c8) 08:25:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4020ae76, &(0x7f0000000000)) 08:25:28 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0x0, 0xd0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0xffffffff, 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev, 0x0, 0x1d}}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c8) [ 92.111915][ T9935] ipt_CLUSTERIP: bad num_local_nodes 29 [ 92.135478][ T38] audit: type=1804 audit(1615191927.956:7): pid=9938 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/5/bus" dev="sda1" ino=14213 res=1 errno=0 08:25:28 executing program 2: fanotify_init(0x8, 0x0) 08:25:28 executing program 5: r0 = socket(0x22, 0x2, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 08:25:28 executing program 2: r0 = socket(0x22, 0x2, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 92.440148][ T9959] ipt_CLUSTERIP: bad num_local_nodes 29 08:25:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x1a2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) [ 92.499786][ T38] audit: type=1804 audit(1615191928.316:8): pid=9950 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/5/bus" dev="sda1" ino=14213 res=1 errno=0 08:25:28 executing program 5: r0 = socket(0x22, 0x2, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 08:25:28 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0x0, 0xd0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0xffffffff, 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev, 0x0, 0x1d}}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c8) 08:25:28 executing program 0: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) 08:25:28 executing program 2: r0 = socket(0x22, 0x2, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 08:25:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4020ae76, &(0x7f0000000000)) 08:25:28 executing program 5: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) 08:25:28 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) [ 92.801494][ T9976] ipt_CLUSTERIP: bad num_local_nodes 29 [ 92.855085][ T38] audit: type=1804 audit(1615191928.676:9): pid=9980 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/6/bus" dev="sda1" ino=14206 res=1 errno=0 08:25:28 executing program 2: r0 = socket(0x22, 0x2, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 93.051164][ T38] audit: type=1804 audit(1615191928.746:10): pid=9984 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir471761748/syzkaller.D9I8HJ/4/bus" dev="sda1" ino=14214 res=1 errno=0 08:25:29 executing program 3: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) 08:25:29 executing program 2: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) [ 93.649819][ T38] audit: type=1804 audit(1615191928.846:11): pid=9990 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir115574354/syzkaller.3Nb1IB/4/bus" dev="sda1" ino=14220 res=1 errno=0 08:25:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x1a2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 08:25:29 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) [ 94.006771][ T38] audit: type=1804 audit(1615191928.876:12): pid=9980 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/6/bus" dev="sda1" ino=14206 res=1 errno=0 08:25:30 executing program 0: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) [ 94.793377][ T38] audit: type=1804 audit(1615191929.146:13): pid=9997 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir471761748/syzkaller.D9I8HJ/4/bus" dev="sda1" ino=14214 res=1 errno=0 [ 95.279881][ T38] audit: type=1804 audit(1615191929.376:14): pid=10006 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir115574354/syzkaller.3Nb1IB/4/bus" dev="sda1" ino=14220 res=1 errno=0 08:25:31 executing program 2: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) [ 95.799395][ T38] audit: type=1804 audit(1615191929.686:15): pid=10012 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir362795141/syzkaller.XdmPvp/4/bus" dev="sda1" ino=14204 res=1 errno=0 08:25:31 executing program 5: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) 08:25:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x1a2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 08:25:31 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x3a, &(0x7f0000000280)={0xa, 0x7, 0x4}) r2 = fork() tkill(r2, 0x14) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0xc00) r3 = socket$netlink(0x10, 0x3, 0xc) read(r3, &(0x7f0000000040)=""/224, 0xe0) sendmsg$netlink(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="0409000002013f"], 0x1104}], 0x1}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x2c, 0x2) [ 96.039613][ T38] audit: type=1804 audit(1615191929.906:16): pid=10014 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir963659201/syzkaller.jUtNEh/7/bus" dev="sda1" ino=14215 res=1 errno=0 [ 96.454865][ T38] audit: type=1804 audit(1615191930.076:17): pid=10014 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir963659201/syzkaller.jUtNEh/7/bus" dev="sda1" ino=14215 res=1 errno=0 08:25:32 executing program 3: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) [ 97.269110][ T38] audit: type=1804 audit(1615191930.216:18): pid=10023 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir115574354/syzkaller.3Nb1IB/5/bus" dev="sda1" ino=14222 res=1 errno=0 [ 97.404761][T10071] netlink: 2288 bytes leftover after parsing attributes in process `syz-executor.0'. [ 97.953772][ T38] audit: type=1804 audit(1615191930.286:19): pid=10024 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir362795141/syzkaller.XdmPvp/4/bus" dev="sda1" ino=14204 res=1 errno=0 08:25:34 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) [ 98.132379][T10070] netlink: 2112 bytes leftover after parsing attributes in process `syz-executor.0'. [ 98.411630][ T38] audit: type=1804 audit(1615191930.836:20): pid=10037 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir115574354/syzkaller.3Nb1IB/5/bus" dev="sda1" ino=14222 res=1 errno=0 [ 98.882436][ T38] audit: type=1804 audit(1615191930.946:21): pid=10038 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/7/bus" dev="sda1" ino=14206 res=1 errno=0 08:25:34 executing program 2: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) [ 99.321906][ T38] audit: type=1804 audit(1615191931.456:22): pid=10043 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir094911446/syzkaller.4ijoCZ/7/bus" dev="sda1" ino=14206 res=1 errno=0 08:25:35 executing program 5: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) 08:25:35 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x3a, &(0x7f0000000280)={0xa, 0x7, 0x4}) r2 = fork() tkill(r2, 0x14) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0xc00) r3 = socket$netlink(0x10, 0x3, 0xc) read(r3, &(0x7f0000000040)=""/224, 0xe0) sendmsg$netlink(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="0409000002013f"], 0x1104}], 0x1}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x2c, 0x2) [ 99.825422][ T38] audit: type=1804 audit(1615191932.026:23): pid=10048 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir963659201/syzkaller.jUtNEh/8/bus" dev="sda1" ino=14196 res=1 errno=0 08:25:35 executing program 3: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x44, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xd0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1b8042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='rootfs\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r5, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x92da, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) fallocate(r3, 0x0, 0x0, 0x10000101) 08:25:35 executing program 4: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x3a, &(0x7f0000000280)={0xa, 0x7, 0x4}) r2 = fork() tkill(r2, 0x14) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0xc00) r3 = socket$netlink(0x10, 0x3, 0xc) read(r3, &(0x7f0000000040)=""/224, 0xe0) sendmsg$netlink(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="0409000002013f"], 0x1104}], 0x1}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x2c, 0x2) [ 100.108905][ T38] audit: type=1804 audit(1615191932.316:24): pid=10054 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir963659201/syzkaller.jUtNEh/8/bus" dev="sda1" ino=14196 res=1 errno=0 [ 100.419016][ T38] audit: type=1804 audit(1615191932.576:25): pid=10055 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir471761748/syzkaller.D9I8HJ/5/bus" dev="sda1" ino=14217 res=1 errno=0 [ 100.722508][T10119] netlink: 2288 bytes leftover after parsing attributes in process `syz-executor.0'. [ 100.757850][T10121] netlink: 2288 bytes leftover after parsing attributes in process `syz-executor.4'. [ 101.051685][ T38] audit: type=1804 audit(1615191932.626:26): pid=10057 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir471761748/syzkaller.D9I8HJ/5/bus" dev="sda1" ino=14217 res=1 errno=0 [ 101.357415][ T38] audit: type=1804 audit(1615191932.826:27): pid=10057 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir471761748/syzkaller.D9I8HJ/5/bus" dev="sda1" ino=14217 res=1 errno=0 08:25:37 executing program 5: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x3a, &(0x7f0000000280)={0xa, 0x7, 0x4}) r2 = fork() tkill(r2, 0x14) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0xc00) r3 = socket$netlink(0x10, 0x3, 0xc) read(r3, &(0x7f0000000040)=""/224, 0xe0) sendmsg$netlink(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="0409000002013f"], 0x1104}], 0x1}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x2c, 0x2) [ 101.686667][ T38] audit: type=1804 audit(1615191933.296:28): pid=10074 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir362795141/syzkaller.XdmPvp/5/bus" dev="sda1" ino=14212 res=1 errno=0 [ 101.873286][ T38] audit: type=1804 audit(1615191933.827:29): pid=10080 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir362795141/syzkaller.XdmPvp/5/bus" dev="sda1" ino=14212 res=1 errno=0 [ 101.911485][ T38] audit: type=1804 audit(1615191934.307:30): pid=10084 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir115574354/syzkaller.3Nb1IB/6/bus" dev="sda1" ino=14221 res=1 errno=0 [ 102.086327][T10131] netlink: 2288 bytes leftover after parsing attributes in process `syz-executor.5'. 08:25:38 executing program 3: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x3a, &(0x7f0000000280)={0xa, 0x7, 0x4}) r2 = fork() tkill(r2, 0x14) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0xc00) r3 = socket$netlink(0x10, 0x3, 0xc) read(r3, &(0x7f0000000040)=""/224, 0xe0) sendmsg$netlink(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="0409000002013f"], 0x1104}], 0x1}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x2c, 0x2) 08:25:38 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x3a, &(0x7f0000000280)={0xa, 0x7, 0x4}) r2 = fork() tkill(r2, 0x14) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0xc00) r3 = socket$netlink(0x10, 0x3, 0xc) read(r3, &(0x7f0000000040)=""/224, 0xe0) sendmsg$netlink(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="0409000002013f"], 0x1104}], 0x1}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x2c, 0x2) [ 102.746461][T10145] netlink: 2288 bytes leftover after parsing attributes in process `syz-executor.3'. [ 102.866103][T10147] netlink: 2288 bytes leftover after parsing attributes in process `syz-executor.0'. [ 132.998831][ T3260] ieee802154 phy0 wpan0: encryption failed: -22 [ 133.005887][ T3260] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.446219][ T3260] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.452584][ T3260] ieee802154 phy1 wpan1: encryption failed: -22 [ 206.754728][ T5] Bluetooth: hci4: command 0x0406 tx timeout [ 206.774689][ T20] Bluetooth: hci0: command 0x0406 tx timeout [ 206.792824][ T20] Bluetooth: hci1: command 0x0406 tx timeout [ 206.799364][ T20] Bluetooth: hci2: command 0x0406 tx timeout [ 206.810178][ T20] Bluetooth: hci3: command 0x0406 tx timeout [ 206.816859][ T20] Bluetooth: hci5: command 0x0406 tx timeout [ 254.599079][ T1655] INFO: task syz-executor.1:10060 blocked for more than 143 seconds. [ 254.599111][ T1655] Not tainted 5.12.0-rc2-syzkaller #0 [ 254.599121][ T1655] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 254.599128][ T1655] task:syz-executor.1 state:D stack:26128 pid:10060 ppid: 8398 flags:0x00004004 [ 254.599162][ T1655] Call Trace: [ 254.599173][ T1655] __schedule+0x999/0xe70 [ 254.646620][ T1655] schedule+0x14b/0x200 [ 254.650925][ T1655] io_uring_cancel_task_requests+0x15e4/0x1900 [ 254.658776][ T1655] ? init_wait_entry+0xd0/0xd0 [ 254.663621][ T1655] __io_uring_files_cancel+0xe7/0x170 [ 254.674697][ T1655] do_exit+0x258/0x2340 [ 254.682163][ T1655] ? get_signal+0x161f/0x1ef0 [ 254.688764][ T1655] ? rcu_read_lock_sched_held+0x41/0xb0 [ 254.707582][ T1655] do_group_exit+0x168/0x2d0 [ 254.722341][ T1655] ? lockdep_hardirqs_on+0x8d/0x130 [ 254.727726][ T1655] get_signal+0x1734/0x1ef0 [ 254.732658][ T1655] arch_do_signal_or_restart+0x3c/0x610 [ 254.742434][ T1655] ? _raw_spin_unlock_irq+0x1f/0x40 [ 254.747781][ T1655] ? task_work_run+0x1aa/0x1c0 [ 254.753378][ T1655] exit_to_user_mode_prepare+0xac/0x1e0 [ 254.759295][ T1655] ? trace_irq_disable_rcuidle+0x11/0x170 [ 254.765669][ T1655] syscall_exit_to_user_mode+0x48/0x180 [ 254.771591][ T1655] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 254.777976][ T1655] RIP: 0033:0x465f69 [ 254.783005][ T1655] RSP: 002b:00007f1f03d03188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 254.793252][ T1655] RAX: 0000000000000200 RBX: 000000000056bf60 RCX: 0000000000465f69 [ 254.801383][ T1655] RDX: 0000000000000000 RSI: 0000000000000302 RDI: 0000000000000003 [ 254.810573][ T1655] RBP: 00000000004bfa67 R08: 0000000000000000 R09: 0000000000000000 [ 254.820328][ T1655] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 254.830527][ T1655] R13: 00007ffdf88e76ef R14: 00007f1f03d03300 R15: 0000000000022000 [ 254.840468][ T1655] [ 254.840468][ T1655] Showing all locks held in the system: [ 254.848416][ T1655] 2 locks held by kworker/u4:6/299: [ 254.854140][ T1655] #0: ffff888010869138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6f4/0xfd0 [ 254.866845][ T1655] #1: ffffc90001e2fd78 ((work_completion)(&ctx->exit_work)){+.+.}-{0:0}, at: process_one_work+0x733/0xfd0 [ 254.880566][ T1655] 1 lock held by khungtaskd/1655: [ 254.886607][ T1655] #0: ffffffff8c70fe00 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 254.896692][ T1655] 2 locks held by in:imklog/8095: [ 254.902359][ T1655] #0: ffff88802209b770 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x24e/0x2f0 [ 254.912195][ T1655] #1: ffffffff8c7de128 (remove_cache_srcu){....}-{0:0}, at: rcu_lock_acquire+0x0/0x30 [ 254.922532][ T1655] [ 254.925690][ T1655] ============================================= [ 254.925690][ T1655] [ 254.936432][ T1655] NMI backtrace for cpu 1 [ 254.941496][ T1655] CPU: 1 PID: 1655 Comm: khungtaskd Not tainted 5.12.0-rc2-syzkaller #0 [ 254.950543][ T1655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.961739][ T1655] Call Trace: [ 254.965614][ T1655] dump_stack+0x176/0x24e [ 254.970468][ T1655] ? trace_vector_free_moved+0x170/0x1a0 [ 254.976163][ T1655] nmi_cpu_backtrace+0x16c/0x190 [ 254.981144][ T1655] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 254.987387][ T1655] nmi_trigger_cpumask_backtrace+0x191/0x2f0 [ 254.993696][ T1655] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 255.000733][ T1655] watchdog+0xce9/0xd30 [ 255.004973][ T1655] ? hungtask_pm_notify+0x50/0x50 [ 255.010088][ T1655] kthread+0x39a/0x3c0 [ 255.014280][ T1655] ? hungtask_pm_notify+0x50/0x50 [ 255.019679][ T1655] ? kthread_blkcg+0xd0/0xd0 [ 255.024297][ T1655] ret_from_fork+0x1f/0x30 [ 255.029043][ T1655] Sending NMI from CPU 1 to CPUs 0: [ 255.034488][ C0] NMI backtrace for cpu 0 [ 255.034495][ C0] CPU: 0 PID: 4823 Comm: systemd-journal Not tainted 5.12.0-rc2-syzkaller #0 [ 255.034500][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.034504][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x33/0x60 [ 255.034509][ C0] Code: 80 ef 01 00 65 8b 15 d4 41 89 7e f7 c2 00 01 ff 00 74 11 f7 c2 00 01 00 00 74 35 83 b9 d4 14 00 00 00 74 2c 8b 91 b0 14 00 00 <83> fa 02 75 21 48 8b 91 b8 14 00 00 48 8b 32 48 8d 7e 01 8b 89 b4 [ 255.034516][ C0] RSP: 0018:ffffc9000a937f18 EFLAGS: 00000046 [ 255.034524][ C0] RAX: ffffffff817eab26 RBX: 0000000000000001 RCX: ffff888022ddb780 [ 255.034528][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 255.034532][ C0] RBP: 0000000000000000 R08: ffffffff812be043 R09: ffffed10045bb6f1 [ 255.034536][ C0] R10: ffffed10045bb6f1 R11: 0000000000000000 R12: 0000000000000000 [ 255.034541][ C0] R13: 0000000000000000 R14: ffff888022ddb780 R15: ffffc9000a937f58 [ 255.034545][ C0] FS: 00007f45d66fe8c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 255.034550][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 255.034554][ C0] CR2: 00007f45d3b1d000 CR3: 0000000026583000 CR4: 00000000001506f0 [ 255.034558][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 255.034563][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 255.034567][ C0] Call Trace: [ 255.034569][ C0] trace_hardirqs_on_prepare+0x6/0x70 [ 255.034572][ C0] syscall_exit_to_user_mode+0x4d/0x180 [ 255.034576][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 255.034579][ C0] RIP: 0033:0x7f45d5996f17 [ 255.034584][ C0] Code: ff ff ff 48 8b 4d a0 0f b7 51 fe 48 8b 4d a8 66 89 54 08 fe e9 1a ff ff ff 66 2e 0f 1f 84 00 00 00 00 00 b8 27 00 00 00 0f 05 0f 1f 84 00 00 00 00 00 b8 6e 00 00 00 0f 05 c3 0f 1f 84 00 00 [ 255.034592][ C0] RSP: 002b:00007fffae103f18 EFLAGS: 00000202 ORIG_RAX: 0000000000000027 [ 255.034599][ C0] RAX: 00000000000012d7 RBX: 000055c8f181f1e0 RCX: 00007f45d5996f17 [ 255.034603][ C0] RDX: 00000000ffffffff RSI: 00007fffae103fa0 RDI: 000055c8f181f1e0 [ 255.034607][ C0] RBP: 00000000000012d7 R08: 00007fffae19c080 R09: 0000000000000000 [ 255.034612][ C0] R10: 00007fffae19c0a8 R11: 0000000000000202 R12: 00007fffae103fa0 [ 255.034616][ C0] R13: 00007fffae103f98 R14: 000055c8f0b82958 R15: 0005bd0236d21aab [ 255.038158][ T1655] Kernel panic - not syncing: hung_task: blocked tasks [ 255.274849][ T1655] CPU: 1 PID: 1655 Comm: khungtaskd Not tainted 5.12.0-rc2-syzkaller #0 [ 255.283175][ T1655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.293827][ T1655] Call Trace: [ 255.297106][ T1655] dump_stack+0x176/0x24e [ 255.301436][ T1655] panic+0x291/0x800 [ 255.305400][ T1655] ? nmi_trigger_cpumask_backtrace+0x236/0x2f0 [ 255.311841][ T1655] ? nmi_trigger_cpumask_backtrace+0x29b/0x2f0 [ 255.318271][ T1655] ? nmi_trigger_cpumask_backtrace+0x236/0x2f0 [ 255.324593][ T1655] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2f0 [ 255.330842][ T1655] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 255.337085][ T1655] watchdog+0xd29/0xd30 [ 255.341514][ T1655] ? hungtask_pm_notify+0x50/0x50 [ 255.346877][ T1655] kthread+0x39a/0x3c0 [ 255.351036][ T1655] ? hungtask_pm_notify+0x50/0x50 [ 255.356186][ T1655] ? kthread_blkcg+0xd0/0xd0 [ 255.360939][ T1655] ret_from_fork+0x1f/0x30 [ 255.370523][ T1655] Kernel Offset: disabled [ 255.375303][ T1655] Rebooting in 86400 seconds..